Bug#1127490: marked as done (pdns-recursor: CVE-2026-24027 CVE-2026-0398)

2026-02-19 Thread Debian Bug Tracking System
Your message dated Thu, 19 Feb 2026 23:04:31 +
with message-id 
and subject line Bug#1127490: fixed in pdns-recursor 5.2.8-0+deb13u1
has caused the Debian Bug report #1127490,
regarding pdns-recursor: CVE-2026-24027 CVE-2026-0398
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
1127490: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1127490
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Source: pdns-recursor
Version: 5.3.4-2
Severity: important
Tags: security upstream
X-Debbugs-Cc: [email protected], Debian Security Team 
Control: found -1 5.2.7-0+deb13u1

Hi,

The following vulnerability was published for pdns-recursor.

CVE-2026-24027[0]:
| Crafted zones can lead to increased incoming network traffic.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2026-24027
https://www.cve.org/CVERecord?id=CVE-2026-24027
[1] 
https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2026-01.html

Regards,
Salvatore
--- End Message ---
--- Begin Message ---
Source: pdns-recursor
Source-Version: 5.2.8-0+deb13u1
Done: Chris Hofstaedtler 

We believe that the bug you reported is fixed in the latest version of
pdns-recursor, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Chris Hofstaedtler  (supplier of updated pdns-recursor package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Wed, 11 Feb 2026 23:05:53 +0100
Source: pdns-recursor
Architecture: source
Version: 5.2.8-0+deb13u1
Distribution: trixie-security
Urgency: medium
Maintainer: pdns-recursor packagers 
Changed-By: Chris Hofstaedtler 
Closes: 1127490
Changes:
 pdns-recursor (5.2.8-0+deb13u1) trixie-security; urgency=medium
 .
   * New upstream version 5.2.8, fixing CVE-2026-24027 CVE-2026-0398
 (Closes: #1127490)
Checksums-Sha1:
 12bde2dac486f1a27d6ac894f66c5813ff375d2e 2808 pdns-recursor_5.2.8-0+deb13u1.dsc
 593722d0ebefe11a42ee32d5943e23568e54d453 1732362 
pdns-recursor_5.2.8.orig.tar.bz2
 0f9ab5aab8fe88f2ba141916f7470f9d56395d3a 16824 
pdns-recursor_5.2.8-0+deb13u1.debian.tar.xz
 2b666ca3eba51d57d03b477c1f03a53771eb00c9 15148 
pdns-recursor_5.2.8-0+deb13u1_arm64.buildinfo
Checksums-Sha256:
 7fc9cf0130aa15b58c64999d6f8a99deeff49b72e94a0ffc940cfc24f34119aa 2808 
pdns-recursor_5.2.8-0+deb13u1.dsc
 f4d30ad7d258b948421b7674a9e51d1a82b23dfad5eaeea04d6fa5c2017ec93f 1732362 
pdns-recursor_5.2.8.orig.tar.bz2
 fed681fc23e2a6fcba3ec406aad5c0b851cd503d5de0db3e22fd615db067de6e 16824 
pdns-recursor_5.2.8-0+deb13u1.debian.tar.xz
 ddf17c7ab7eed535614e8b8e8d7c0535b5b8f62ff997b6bba3bf814ef4b02a29 15148 
pdns-recursor_5.2.8-0+deb13u1_arm64.buildinfo
Files:
 ec7dde15f2e066b2572c6a6b670dc689 2808 net optional 
pdns-recursor_5.2.8-0+deb13u1.dsc
 309e2fee683e4df4ae62d3186fbe7625 1732362 net optional 
pdns-recursor_5.2.8.orig.tar.bz2
 ac4294a71673b6e20dc80e57e38483d2 16824 net optional 
pdns-recursor_5.2.8-0+deb13u1.debian.tar.xz
 673bf1ddd23206b196feaee1028eb93d 15148 net optional 
pdns-recursor_5.2.8-0+deb13u1_arm64.buildinfo

-BEGIN PGP SIGNATURE-
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=rweJ
-END PGP SIGNATURE-



pgpE9_DR02sE2.pgp
Description: PGP signature
--- End Message ---


Bug#1127490: marked as done (pdns-recursor: CVE-2026-24027 CVE-2026-0398)

2026-02-11 Thread Debian Bug Tracking System
Your message dated Wed, 11 Feb 2026 15:20:28 +
with message-id 
and subject line Bug#1127490: fixed in pdns-recursor 5.3.5-1
has caused the Debian Bug report #1127490,
regarding pdns-recursor: CVE-2026-24027 CVE-2026-0398
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
1127490: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1127490
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Source: pdns-recursor
Version: 5.3.4-2
Severity: important
Tags: security upstream
X-Debbugs-Cc: [email protected], Debian Security Team 
Control: found -1 5.2.7-0+deb13u1

Hi,

The following vulnerability was published for pdns-recursor.

CVE-2026-24027[0]:
| Crafted zones can lead to increased incoming network traffic.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2026-24027
https://www.cve.org/CVERecord?id=CVE-2026-24027
[1] 
https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2026-01.html

Regards,
Salvatore
--- End Message ---
--- Begin Message ---
Source: pdns-recursor
Source-Version: 5.3.5-1
Done: Chris Hofstaedtler 

We believe that the bug you reported is fixed in the latest version of
pdns-recursor, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Chris Hofstaedtler  (supplier of updated pdns-recursor package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Wed, 11 Feb 2026 15:13:35 +0100
Source: pdns-recursor
Architecture: source
Version: 5.3.5-1
Distribution: unstable
Urgency: medium
Maintainer: pdns-recursor packagers 
Changed-By: Chris Hofstaedtler 
Closes: 1127490
Changes:
 pdns-recursor (5.3.5-1) unstable; urgency=medium
 .
   * New upstream version 5.3.5
 Fixes CVE-2026-24027, CVE-2026-0398 (Closes: #1127490)
Checksums-Sha1:
 60431dac51e64a3c9729bcbf6a153a835bc728fb 3176 pdns-recursor_5.3.5-1.dsc
 08e289abf0480ff5af7e47dae2f2d171f81e0d36 1367860 
pdns-recursor_5.3.5.orig.tar.xz
 586c6b362d6e71d8edf913e60cacdc5a9ee2c2b6 18068 
pdns-recursor_5.3.5-1.debian.tar.xz
 4c9861445dcee2e0a528d52bd2db1bce643ce124 25562 
pdns-recursor_5.3.5-1_arm64.buildinfo
Checksums-Sha256:
 726358b398e93565a6eb74e9e8c25e200f41492ecae9c567a30fad264ecbf33a 3176 
pdns-recursor_5.3.5-1.dsc
 74497ae620167d857ce2d5702bd14018e5f4c848e878f29cef51581a74b0d05e 1367860 
pdns-recursor_5.3.5.orig.tar.xz
 5f4480a3a63ce669b9b4906382691a56dd471ba9af4b8148ac92fa20acb3d487 18068 
pdns-recursor_5.3.5-1.debian.tar.xz
 aa3d82a63780f9c84073071f5fe5451d3d0bcedd3e709e79fc6d2223bf08ade9 25562 
pdns-recursor_5.3.5-1_arm64.buildinfo
Files:
 228090460d29c815274aca78a33ec8af 3176 net optional pdns-recursor_5.3.5-1.dsc
 e0321fdbe460bc30c002fa4243bc6c5f 1367860 net optional 
pdns-recursor_5.3.5.orig.tar.xz
 aacccba2c50f58543fd3a719f0f17fc1 18068 net optional 
pdns-recursor_5.3.5-1.debian.tar.xz
 9f31ab14874d9ab64ea9edfacd390ab5 25562 net optional 
pdns-recursor_5.3.5-1_arm64.buildinfo

-BEGIN PGP SIGNATURE-
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=BWt1
-END PGP SIGNATURE-



pgpsZ_rd4bLR_.pgp
Description: PGP signature
--- End Message ---