]> granicus.if.org Git - pdns/commitdiff
docs+secpoll for 21st June CVE release
authorPeter van Dijk <peter.van.dijk@powerdns.com>
Thu, 20 Jun 2019 10:39:16 +0000 (12:39 +0200)
committerPeter van Dijk <peter.van.dijk@powerdns.com>
Thu, 20 Jun 2019 19:32:12 +0000 (21:32 +0200)
docs/changelog/4.0.rst
docs/changelog/4.1.rst
docs/secpoll.zone
docs/security-advisories/powerdns-advisory-2019-04.rst [new file with mode: 0644]
docs/security-advisories/powerdns-advisory-2019-05.rst [new file with mode: 0644]

index 58783145701356b4ee6ad34dcac4a2c3f58ebac4..851e66e3a4b901a2b46d7765b8c0980683440841 100644 (file)
@@ -1,6 +1,15 @@
 Changelogs for 4.0.x
 ====================
 
+PowerDNS Authoritative Server 4.0.8
+-----------------------------------
+
+Released 21st of June 2019
+
+This release fixes PowerDNS Security Advisories
+:doc:`2019-04 <../security-advisories/powerdns-advisory-2019-04>` and
+:doc:`2019-05 <../security-advisories/powerdns-advisory-2019-05>`.
+
 PowerDNS Authoritative Server 4.0.7
 -----------------------------------
 
index 937f821b72c582e34107515106ed9d886d1d066f..23ffe94a642a2786aa97608adb08c9995f2d00c6 100644 (file)
@@ -1,12 +1,40 @@
 Changelogs for 4.1.x
 ====================
 
+.. changelog::
+  :version: 4.1.10
+  :released: June 21st 2019
+
+  This release and 4.1.9 together fix the following security advisories:
+
+  - PowerDNS Security Advisory :doc:`2019-04 <../security-advisories/powerdns-advisory-2019-04>` (CVE-2019-10162)
+  - PowerDNS Security Advisory :doc:`2019-05 <../security-advisories/powerdns-advisory-2019-05>` (CVE-2019-10163)
+
+  .. change::
+    :tags: Bug Fixes
+    :pullreq: 7964
+
+    Do not exit on exception parsing names of name servers to notify.
+
+
 .. changelog::
   :version: 4.1.9
   :released: June 19th 2019
 
   .. change::
-    :tags: Performance
+    :tags: Bug Fixes
+    :pullreq: 7663
+
+    Do not exit on exception resolving addresses to notify.
+
+  .. change::
+    :tags: Bug Fixes
+    :pullreq: 7829
+
+    Avoid very busy looping on lots of notifies.
+
+  .. change::
+    :tags: New Features
     :pullreq: 7922
 
     Add an option to disable superslaving.
index 7d9d0c2bdf8476b858f88ad85075526a468d0410..c5021f691b1d5dc284820049ac84762d441cb4bc 100644 (file)
@@ -1,4 +1,4 @@
-@       86400   IN  SOA pdns-public-ns1.powerdns.com. pieter\.lexis.powerdns.com. 2019061801 10800 3600 604800 10800
+@       86400   IN  SOA pdns-public-ns1.powerdns.com. pieter\.lexis.powerdns.com. 2019062101 10800 3600 604800 10800
 @       3600    IN  NS  pdns-public-ns1.powerdns.com.
 @       3600    IN  NS  pdns-public-ns2.powerdns.com.
 ; Auth
@@ -32,7 +32,8 @@ auth-4.0.4-rc1.security-status                          60 IN TXT "3 Upgrade now
 auth-4.0.4.security-status                              60 IN TXT "3 Upgrade now, see https://doc.powerdns.com/authoritative/security-advisories/powerdns-advisory-2017-04.html"
 auth-4.0.5.security-status                              60 IN TXT "3 Upgrade now, see https://doc.powerdns.com/authoritative/security-advisories/powerdns-advisory-2018-03.html"
 auth-4.0.6.security-status                              60 IN TXT "3 Upgrade now, see https://doc.powerdns.com/authoritative/security-advisories/powerdns-advisory-2019-03.html"
-auth-4.0.7.security-status                              60 IN TXT "1 OK"
+auth-4.0.7.security-status                              60 IN TXT "3 Upgrade now, see https://doc.powerdns.com/authoritative/security-advisories/powerdns-advisory-2018-03.html https://doc.powerdns.com/authoritative/security-advisories/powerdns-advisory-2018-05.html"
+auth-4.0.8.security-status                              60 IN TXT "1 OK"
 auth-4.1.0-rc1.security-status                          60 IN TXT "3 Unsupported pre-release (known vulnerabilities)"
 auth-4.1.0-rc2.security-status                          60 IN TXT "3 Unsupported pre-release (known vulnerabilities)"
 auth-4.1.0-rc3.security-status                          60 IN TXT "3 Unsupported pre-release (known vulnerabilities)"
@@ -43,9 +44,10 @@ auth-4.1.3.security-status                              60 IN TXT "3 Upgrade now
 auth-4.1.4.security-status                              60 IN TXT "3 Upgrade now, see https://doc.powerdns.com/authoritative/security-advisories/powerdns-advisory-2018-03.html https://doc.powerdns.com/authoritative/security-advisories/powerdns-advisory-2018-05.html"
 auth-4.1.5.security-status                              60 IN TXT "3 Upgrade now, see https://doc.powerdns.com/authoritative/security-advisories/powerdns-advisory-2019-03.html"
 auth-4.1.6.security-status                              60 IN TXT "3 Upgrade now, see https://doc.powerdns.com/authoritative/security-advisories/powerdns-advisory-2019-03.html"
-auth-4.1.7.security-status                              60 IN TXT "1 OK"
-auth-4.1.8.security-status                              60 IN TXT "1 OK"
-auth-4.1.9.security-status                              60 IN TXT "1 OK"
+auth-4.1.7.security-status                              60 IN TXT "3 Upgrade now, see https://doc.powerdns.com/authoritative/security-advisories/powerdns-advisory-2019-04.html https://doc.powerdns.com/authoritative/security-advisories/powerdns-advisory-2019-05.html"
+auth-4.1.8.security-status                              60 IN TXT "3 Upgrade now, see https://doc.powerdns.com/authoritative/security-advisories/powerdns-advisory-2019-04.html https://doc.powerdns.com/authoritative/security-advisories/powerdns-advisory-2019-05.html"
+auth-4.1.9.security-status                              60 IN TXT "3 Upgrade now, see https://doc.powerdns.com/authoritative/security-advisories/powerdns-advisory-2019-04.html https://doc.powerdns.com/authoritative/security-advisories/powerdns-advisory-2019-05.html"
+auth-4.1.10.security-status                             60 IN TXT "1 OK"
 auth-4.2.0-alpha1.security-status                       60 IN TXT "3 Upgrade now, see https://doc.powerdns.com/authoritative/security-advisories/powerdns-advisory-2019-03.html"
 auth-4.2.0-beta1.security-status                        60 IN TXT "3 Upgrade now, see https://doc.powerdns.com/authoritative/security-advisories/powerdns-advisory-2019-03.html"
 auth-4.2.0-rc1.security-status                          60 IN TXT "1 OK"
diff --git a/docs/security-advisories/powerdns-advisory-2019-04.rst b/docs/security-advisories/powerdns-advisory-2019-04.rst
new file mode 100644 (file)
index 0000000..c25a3be
--- /dev/null
@@ -0,0 +1,30 @@
+PowerDNS Security Advisory 2019-04: Denial of service via crafted zone records
+==============================================================================
+
+-  CVE: CVE-2019-10162
+-  Date: June 21st 2019
+-  Affects: PowerDNS Authoritative up to and including 4.1.9
+-  Not affected: 4.1.10, 4.0.8
+-  Severity: Medium
+-  Impact: Denial of Service
+-  Exploit: This problem can be triggered via crafted records
+-  Risk of system compromise: No
+-  Solution: Upgrade to a non-affected version
+-  Workaround: run the process inside the guardian or inside a supervisor
+
+An issue has been found in PowerDNS Authoritative Server allowing an
+authorized user to cause the server to exit by inserting a crafted
+record in a MASTER type zone under their control. The issue is due
+to the fact that the Authoritative Server will exit when it runs into a
+parsing error while looking up the NS/A/AAAA records it is about to
+use for an outgoing notify.
+
+This issue has been assigned CVE-2019-10162.
+
+PowerDNS Authoritative up to and including 4.1.9 is affected.
+Please note that at the time of writing, PowerDNS Authoritative 3.4 and
+below are no longer supported, as described in
+https://doc.powerdns.com/authoritative/appendices/EOL.html.
+
+We would like to thank Gert van Dijk for finding and subsequently
+reporting this issue!
diff --git a/docs/security-advisories/powerdns-advisory-2019-05.rst b/docs/security-advisories/powerdns-advisory-2019-05.rst
new file mode 100644 (file)
index 0000000..476cf59
--- /dev/null
@@ -0,0 +1,29 @@
+PowerDNS Security Advisory 2019-05: Denial of service via NOTIFY packets
+========================================================================
+
+-  CVE: CVE-2019-10163
+-  Date: June 21st 2019
+-  Affects: PowerDNS Authoritative up to and including 4.1.8
+-  Not affected: 4.1.9, 4.0.8
+-  Severity: Medium
+-  Impact: Denial of Service
+-  Exploit: This problem can be triggered via the sending of NOTIFY
+   packets from an authorized master
+-  Risk of system compromise: No
+-  Solution: Upgrade to a non-affected version
+
+An issue has been found in PowerDNS Authoritative Server allowing a
+remote, authorized master server to cause a high CPU load or
+even prevent any further updates to any slave zone by sending a
+large number of NOTIFY messages.
+Note that only servers configured as slaves are affected by this issue.
+
+This issue has been assigned CVE-2019-10163.
+
+PowerDNS Authoritative up to and including 4.1.8 is affected.
+Please note that at the time of writing, PowerDNS Authoritative 3.4 and
+below are no longer supported, as described in
+https://doc.powerdns.com/authoritative/appendices/EOL.html.
+
+We would like to thank George Asenov for finding and subsequently
+reporting this issue!