Your message dated Thu, 19 Feb 2026 23:04:31 +0000
with message-id <[email protected]>
and subject line Bug#1127490: fixed in pdns-recursor 5.2.8-0+deb13u1
has caused the Debian Bug report #1127490,
regarding pdns-recursor: CVE-2026-24027 CVE-2026-0398
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)
--
1127490: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1127490
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Source: pdns-recursor
Version: 5.3.4-2
Severity: important
Tags: security upstream
X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>
Control: found -1 5.2.7-0+deb13u1
Hi,
The following vulnerability was published for pdns-recursor.
CVE-2026-24027[0]:
| Crafted zones can lead to increased incoming network traffic.
If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.
For further information see:
[0] https://security-tracker.debian.org/tracker/CVE-2026-24027
https://www.cve.org/CVERecord?id=CVE-2026-24027
[1]
https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2026-01.html
Regards,
Salvatore
--- End Message ---
--- Begin Message ---
Source: pdns-recursor
Source-Version: 5.2.8-0+deb13u1
Done: Chris Hofstaedtler <[email protected]>
We believe that the bug you reported is fixed in the latest version of
pdns-recursor, which is due to be installed in the Debian FTP archive.
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Chris Hofstaedtler <[email protected]> (supplier of updated pdns-recursor package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Wed, 11 Feb 2026 23:05:53 +0100
Source: pdns-recursor
Architecture: source
Version: 5.2.8-0+deb13u1
Distribution: trixie-security
Urgency: medium
Maintainer: pdns-recursor packagers <[email protected]>
Changed-By: Chris Hofstaedtler <[email protected]>
Closes: 1127490
Changes:
pdns-recursor (5.2.8-0+deb13u1) trixie-security; urgency=medium
.
* New upstream version 5.2.8, fixing CVE-2026-24027 CVE-2026-0398
(Closes: #1127490)
Checksums-Sha1:
12bde2dac486f1a27d6ac894f66c5813ff375d2e 2808 pdns-recursor_5.2.8-0+deb13u1.dsc
593722d0ebefe11a42ee32d5943e23568e54d453 1732362
pdns-recursor_5.2.8.orig.tar.bz2
0f9ab5aab8fe88f2ba141916f7470f9d56395d3a 16824
pdns-recursor_5.2.8-0+deb13u1.debian.tar.xz
2b666ca3eba51d57d03b477c1f03a53771eb00c9 15148
pdns-recursor_5.2.8-0+deb13u1_arm64.buildinfo
Checksums-Sha256:
7fc9cf0130aa15b58c64999d6f8a99deeff49b72e94a0ffc940cfc24f34119aa 2808
pdns-recursor_5.2.8-0+deb13u1.dsc
f4d30ad7d258b948421b7674a9e51d1a82b23dfad5eaeea04d6fa5c2017ec93f 1732362
pdns-recursor_5.2.8.orig.tar.bz2
fed681fc23e2a6fcba3ec406aad5c0b851cd503d5de0db3e22fd615db067de6e 16824
pdns-recursor_5.2.8-0+deb13u1.debian.tar.xz
ddf17c7ab7eed535614e8b8e8d7c0535b5b8f62ff997b6bba3bf814ef4b02a29 15148
pdns-recursor_5.2.8-0+deb13u1_arm64.buildinfo
Files:
ec7dde15f2e066b2572c6a6b670dc689 2808 net optional
pdns-recursor_5.2.8-0+deb13u1.dsc
309e2fee683e4df4ae62d3186fbe7625 1732362 net optional
pdns-recursor_5.2.8.orig.tar.bz2
ac4294a71673b6e20dc80e57e38483d2 16824 net optional
pdns-recursor_5.2.8-0+deb13u1.debian.tar.xz
673bf1ddd23206b196feaee1028eb93d 15148 net optional
pdns-recursor_5.2.8-0+deb13u1_arm64.buildinfo
-----BEGIN PGP SIGNATURE-----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=rweJ
-----END PGP SIGNATURE-----
pgpE9_DR02sE2.pgp
Description: PGP signature
--- End Message ---