Hello everyone,

We’ve released PowerDNS Authoritative Server 4.0.6 & 4.1.5 and Recursor 4.0.9 & 
4.1.5.
 
These are security releases with additional minor improvements and bug fixes.

Minimal patches for the releases are available at 
https://downloads.powerdns.com/patches/.

The changelogs look as follows (and can also be read at 
https://blog.powerdns.com/):

# Authoritative Server 4.1.5

This release fixes the following security advisories:

- PowerDNS Security Advisory 2018-03 
(https://doc.powerdns.com/authoritative/security-advisories/powerdns-advisory-2018-03.html)
 (CVE-2018-10851)
- PowerDNS Security Advisory 2018-05 
(https://doc.powerdns.com/authoritative/security-advisories/powerdns-advisory-2018-05.html)
 (CVE-2018-14626)

## Improvements

- Apply alias scopemask after chasing
- Release memory in case of error in the openssl ecdsa constructor
- Switch to devtoolset 7 for el6

## Bug Fixes

- Crafted zone record can cause a denial of service (CVE-2018-10851)
- Packet cache pollution via crafted query (CVE-2018-14626)
- Fix compilation with libressl 2.7.0+
- Actually truncate truncated responses

# Authoritative Server 4.0.6

This release fixes PowerDNS Security Advisory 2018-03 
(https://doc.powerdns.com/authoritative/security-advisories/powerdns-advisory-2018-03.html)
 (CVE-2018-10851).

## Bug fixes

- Crafted zone record can cause a denial of service (CVE-2018-10851)
- Skip v6-dependent test when pdns_test_no_ipv6 is set in environment
- Fix el6 builds

## Improvements

- Prevent cname + other data with dnsupdate
- Switch to devtoolset 7 for el6

# Recursor 4.1.5

This release fixes the following security advisories:

- PowerDNS Security Advisory 2018-04 
(https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2018-04.html)
 (CVE-2018-10851)
- PowerDNS Security Advisory 2018-06 
(https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2018-06.html)
 (CVE-2018-14626)
- PowerDNS Security Advisory 2018-07 
(https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2018-07.html)
 (CVE-2018-14644)

## Improvements

- Add pdnslog to lua configuration scripts (Chris Hofstaedtler)
- Fix compilation with libressl 2.7.0+
- Export outgoing ECS value and server ID in protobuf (if any)
- Switch to devtoolset 7 for el6
- Allow the signature inception to be off by a number of seconds (Kees 
Monshouwer)

## Bug Fixes

- Crafted answer can cause a denial of service (CVE-2018-10851)
- Packet cache pollution via crafted query (CVE-2018-14626)
- Crafted query for meta-types can cause a denial of service (CVE-2018-14644)
- Delay the creation of rpz threads until we have dropped privileges
- Cleanup the netmask trees used for the ecs index on removals
- Make sure that the ecs scope from the auth is < to the source
- Authority records in aa=1 cname answer are authoritative
- Avoid a memory leak in catch-all exception handler
- Don’t require authoritative answers for forward-recurse zones
- Release memory in case of error in the openssl ecdsa constructor
- Convert a few uses to toLogString to print DNSName’s that may be empty in a 
safer manner
- Avoid a crash on DEC Alpha systems
- Clear all caches on (N)TA changes

# Recursor 4.0.9

This release fixes the following security advisories:

- PowerDNS Security Advisory 2018-04 
(https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2018-04.html)
 (CVE-2018-10851)
- PowerDNS Security Advisory 2018-06 
(https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2018-06.html)
 (CVE-2018-14626)
- PowerDNS Security Advisory 2018-07 
(https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2018-07.html)
 (CVE-2018-14644)

## Bug fixes

- Crafted answer can cause a denial of service (CVE-2018-10851)
- Packet cache pollution via crafted query (CVE-2018-14626)
- Crafted query for meta-types can cause a denial of service (CVE-2018-14644)

# Additional Information

The tarballs and signatures are available at 
https://downloads.powerdns.com/releases/ and packages for CentOS 6 and 7, 
Debian Jessie and Stretch, Ubuntu Bionic, Trusty and Xenial are available from 
https://repo.powerdns.com/.  Rapberry PI packages will follow tomorrow.
 
Please send us all feedback and issues you might have via 
https://mailman.powerdns.com/mailman/listinfo/pdns-users, or in case of a bug, 
via https://github.com/PowerDNS/pdns/issues/new.

-- 
Erik Winkels
PowerDNS.COM BV -- https://www.powerdns.com

Attachment: signature.asc
Description: PGP signature

_______________________________________________
Pdns-dev mailing list
Pdns-dev@mailman.powerdns.com
https://mailman.powerdns.com/mailman/listinfo/pdns-dev

Reply via email to