Back

Critical PowerDNS Recursor Vulnerabilities Lead to Denial of Service Risks

Severity: High (Score: 70.5)

Sources: Linuxsecurity

Summary

PowerDNS Recursor, a non-authoritative DNS server, has been updated to address multiple security vulnerabilities. The update includes fixes for CVE-2025-59030, which allows for denial of service due to insufficient validation of incoming notifies over TCP, and CVE-2025-59029, which can cause assertion failures due to crafted DNS records. These vulnerabilities affect users of PowerDNS Recursor versions prior to 5.2.8-1. The vulnerabilities were published on December 9, 2025, and July 21, 2025, respectively. Users are advised to upgrade to the latest version using the 'dnf' update program. The updates were released on April 3, 2026, and are critical for maintaining network security. Failure to apply these updates may expose systems to potential denial of service attacks. Key Points: • PowerDNS Recursor vulnerabilities could lead to denial of service attacks. • CVE-2025-59030 and CVE-2025-59029 are critical issues addressed in the latest update. • Users must upgrade to version 5.2.8-1 to mitigate these risks.

Key Entities

  • DDoS (attack_type)
  • CVE-2025-30192 (cve)
  • CVE-2025-59029 (cve)
  • CVE-2025-59030 (cve)
  • Fedora (company)
  • PowerDNS Recursor (platform)
Loading threat details...

Threat Not Found

The threat cluster you're looking for doesn't exist or has been removed.

Return to Feed