Your message dated Tue, 09 Dec 2025 11:05:03 +0000
with message-id <[email protected]>
and subject line Bug#1122197: fixed in pdns-recursor 5.3.3-1
has caused the Debian Bug report #1122197,
regarding pdns-recursor: CVE-2025-59030
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)
--
1122197: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1122197
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Source: pdns-recursor
Version: 5.3.1-1
Severity: important
Tags: security upstream
X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>
Hi,
The following vulnerability was published for pdns-recursor.
CVE-2025-59030[0]:
| Insufficient validation of incoming notifies over TCP can lead to a
| denial of service in Recursor
If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.
For further information see:
[0] https://security-tracker.debian.org/tracker/CVE-2025-59030
https://www.cve.org/CVERecord?id=CVE-2025-59030
[1]
https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2025-08.html
Please adjust the affected versions in the BTS as needed.
Regards,
Salvatore
--- End Message ---
--- Begin Message ---
Source: pdns-recursor
Source-Version: 5.3.3-1
Done: Chris Hofstaedtler <[email protected]>
We believe that the bug you reported is fixed in the latest version of
pdns-recursor, which is due to be installed in the Debian FTP archive.
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Chris Hofstaedtler <[email protected]> (supplier of updated pdns-recursor package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Tue, 09 Dec 2025 11:01:36 +0100
Source: pdns-recursor
Architecture: source
Version: 5.3.3-1
Distribution: unstable
Urgency: medium
Maintainer: pdns-recursor packagers <[email protected]>
Changed-By: Chris Hofstaedtler <[email protected]>
Closes: 1122196 1122197
Changes:
pdns-recursor (5.3.3-1) unstable; urgency=medium
.
* New upstream version 5.3.3
Fixes CVE-2025-59029 (Closes: #1122196),
Fixes CVE-2025-59030 (Closes: #1122197).
* Preserve recursor.lua on upgrades, but not as conffile
Checksums-Sha1:
314cc951ba61a2c44ad07976f889b490d079dd2a 3199 pdns-recursor_5.3.3-1.dsc
e426b5f5683ef00f712e2108ef407d1c028e461d 1362768
pdns-recursor_5.3.3.orig.tar.xz
8508e78a722c5dc57cdeee9ff5e20e0559f8c9fa 18192
pdns-recursor_5.3.3-1.debian.tar.xz
fde30dbc91e29cc84b670ef5c849f3e79e7120ef 10741
pdns-recursor_5.3.3-1_source.buildinfo
Checksums-Sha256:
94aee4cb1e07cad5677665e5890b32302962a1ca16c6b6ad4929d15246300027 3199
pdns-recursor_5.3.3-1.dsc
ebeeb454bdf977a7f3947f17f3a4b2a17a37a673db1feb0f2f156b67b93a0329 1362768
pdns-recursor_5.3.3.orig.tar.xz
f032d99145e4f3b66dac9eaed88be7b05c3ac2fd893eaade12b691cd28927825 18192
pdns-recursor_5.3.3-1.debian.tar.xz
f3f5fafc8454e05ea4ff5864f4bfc7172f0e858b028f5f8a4f18d45e81758f03 10741
pdns-recursor_5.3.3-1_source.buildinfo
Files:
0d3b75f51c7ac3244c27d266f4f1fc60 3199 net optional pdns-recursor_5.3.3-1.dsc
8280e929bc23b5d0c0ca00a3b3c344f3 1362768 net optional
pdns-recursor_5.3.3.orig.tar.xz
fa8e8bb2bd10ad95e1cee7ad9f377d15 18192 net optional
pdns-recursor_5.3.3-1.debian.tar.xz
b37c0edb2bceeac5b34f74ea0cc6ba48 10741 net optional
pdns-recursor_5.3.3-1_source.buildinfo
-----BEGIN PGP SIGNATURE-----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=bTKY
-----END PGP SIGNATURE-----
pgpsPVK0DxYJQ.pgp
Description: PGP signature
--- End Message ---