[Git][security-tracker-team/security-tracker][master] Update references for pdns-recursor

Salvatore Bonaccorso (@carnil) carnil at debian.org
Thu Apr 23 06:25:11 BST 2026



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
c2c6df1a by Salvatore Bonaccorso at 2026-04-23T07:24:34+02:00
Update references for pdns-recursor

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -348,30 +348,37 @@ CVE-2026-33601 (If you use the zoneToCache function with a malicious authoritati
 	- pdns-recursor 5.4.1-1
 	[bookworm] - pdns-recursor <end-of-life> (see DSA 6045)
 	[bullseye] - pdns-recursor <end-of-life> (see DSA 6045)
+	NOTE: https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2026-03.html#cve-2026-33600-null-pointer-dereference-in-rpz-transfer
 CVE-2026-33600 (An RPZ sent by a malicious authoritative server can result in a null p ...)
 	- pdns-recursor 5.4.1-1
 	[bookworm] - pdns-recursor <end-of-life> (see DSA 6045)
 	[bullseye] - pdns-recursor <end-of-life> (see DSA 6045)
+	NOTE: https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2026-03.html#cve-2026-33601-insufficient-validation-of-zonemd-record
 CVE-2026-33262 (An attacker can send replies that result in a null pointer dereference ...)
 	- pdns-recursor 5.4.1-1
 	[bookworm] - pdns-recursor <end-of-life> (see DSA 6045)
 	[bullseye] - pdns-recursor <end-of-life> (see DSA 6045)
+	NOTE: https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2026-03.html#cve-2026-33262-insufficient-validation-of-cookie-reply
 CVE-2026-33261 (A zone transition from NSEC to NSEC3 might trigger an internal inconsi ...)
 	- pdns-recursor 5.4.1-1
 	[bookworm] - pdns-recursor <end-of-life> (see DSA 6045)
 	[bullseye] - pdns-recursor <end-of-life> (see DSA 6045)
+	NOTE: https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2026-03.html#cve-2026-33261-null-pointer-access-in-aggressive-nsec-3-cache
 CVE-2026-33259 (Having many concurrent transfers of the same RPZ can lead to inconsist ...)
 	- pdns-recursor 5.4.1-1
 	[bookworm] - pdns-recursor <end-of-life> (see DSA 6045)
 	[bullseye] - pdns-recursor <end-of-life> (see DSA 6045)
+	NOTE: https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2026-03.html#cve-2026-33259-concurrent-modification-of-rpz-data-can-lead-to-denial-of-service
 CVE-2026-33258 (By publishing and querying a crafted zone an attacker can cause alloca ...)
 	- pdns-recursor 5.4.1-1
 	[bookworm] - pdns-recursor <end-of-life> (see DSA 6045)
 	[bullseye] - pdns-recursor <end-of-life> (see DSA 6045)
+	NOTE: https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2026-03.html#cve-2026-33258-crafted-zones-can-cause-increased-resource-usage
 CVE-2026-33256 (An attacker can send a web request that causes unlimited memory alloca ...)
 	- pdns-recursor 5.4.1-1
 	[bookworm] - pdns-recursor <end-of-life> (see DSA 6045)
 	[bullseye] - pdns-recursor <end-of-life> (see DSA 6045)
+	NOTE: https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2026-03.html#cve-2026-33256-unbounded-memory-allocation-by-internal-web-server
 CVE-2026-32885 (DDEV is an open-source tool for running local web development environm ...)
 	TODO: check
 CVE-2026-31530 (In the Linux kernel, the following vulnerability has been resolved:  c ...)
@@ -892,18 +899,24 @@ CVE-2026-33257 (An attacker can send a web request that causes unlimited memory
 	- dnsdist 2.0.4-1
 	[bookworm] - dnsdist <end-of-life> (See #1119290)
 	[bullseye] - dnsdist <end-of-life> (see #1119290)
-	- pdns-recursor 5.4.1-1
+	- pdns-recursor 5.3.0-1
 	[bookworm] - pdns-recursor <end-of-life> (see DSA 6045)
 	[bullseye] - pdns-recursor <end-of-life> (see DSA 6045)
 	NOTE: https://www.dnsdist.org/security-advisories/powerdns-advisory-for-dnsdist-2026-04.html#cve-2026-33257-insufficient-input-validation-of-internal-webserver
+	NOTE: https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2026-03.html#cve-2026-33257-insufficient-input-validation-of-internal-web-server
+	NOTE: According to the advisory affects only PowerDNS Recursor up to and including 5.2.8,
+	NOTE: Mark the first version in unstable after 5.2.9 as the ixed version.
 CVE-2026-33260 (An attacker can send a web request that causes unlimited memory alloca ...)
 	- dnsdist 2.0.4-1
 	[bookworm] - dnsdist <end-of-life> (See #1119290)
 	[bullseye] - dnsdist <end-of-life> (see #1119290)
-	- pdns-recursor 5.4.1-1
+	- pdns-recursor 5.3.0-1
 	[bookworm] - pdns-recursor <end-of-life> (see DSA 6045)
 	[bullseye] - pdns-recursor <end-of-life> (see DSA 6045)
 	NOTE: https://www.dnsdist.org/security-advisories/powerdns-advisory-for-dnsdist-2026-04.html#cve-2026-33260-insufficient-input-validation-of-internal-webserver
+	NOTE: https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2026-03.html#cve-2026-33260-insufficient-input-validation-of-internal-web-server
+	NOTE: According to the advisory affects only PowerDNS Recursor up to and including 5.2.8,
+	NOTE: Mark the first version in unstable after 5.2.9 as the ixed version.
 CVE-2026-33593 (A client can trigger a divide by zero error leading to crash by sendin ...)
 	- dnsdist 2.0.4-1
 	[bookworm] - dnsdist <end-of-life> (See #1119290)



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/c2c6df1acf2a66249dc65e002cfdfe1582fbbd9f

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/c2c6df1acf2a66249dc65e002cfdfe1582fbbd9f
You're receiving this email because of your account on salsa.debian.org. Manage all notifications: https://salsa.debian.org/-/profile/notifications | Help: https://salsa.debian.org/help


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20260423/cbab0fe7/attachment-0001.htm>


More information about the debian-security-tracker-commits mailing list