File _patchinfo of Package patchinfo

<patchinfo incident="19390">
  <issue tracker="bnc" id="1259319">VUL-0: CVE-2026-26018: coredns: denial of service in the loop detection plugin due to predictable PRNG combined with fatal error handler</issue>
  <issue tracker="bnc" id="1259320">VUL-0: CVE-2026-26017: coredns: DNS access control bypass due to default execution order of plugins and TOCTOU flaw</issue>
  <issue tracker="bnc" id="1255345">VUL-0: CVE-2025-68156: coredns: github.com/expr-lang/expr/builtin: uncontrolled recursion in expression evaluation can cause a denial of service</issue>
  <issue tracker="cve" id="2025-68121"/>
  <issue tracker="cve" id="2026-26017"/>
  <issue tracker="cve" id="2025-61726"/>
  <issue tracker="cve" id="2025-61731"/>
  <issue tracker="cve" id="2025-68119"/>
  <issue tracker="cve" id="2025-68156"/>
  <issue tracker="cve" id="2025-61728"/>
  <issue tracker="cve" id="2026-26018"/>
  <packager>amanzini</packager>
  <rating>important</rating>
  <category>security</category>
  <summary>Security update for coredns</summary>
  <description>This update for coredns fixes the following issues:

Update to version 1.14.2:

- CVE-2026-26017: Fixed DNS access control bypass due to default execution
  order of plugins and TOCTOU flaw (bsc#1259320).
- CVE-2026-26018: Fixed denial of service in the loop detection plugin due to
  predictable PRNG combined with fatal error handler (bsc#1259319).

Update to version 1.14.1:

- This release primarily addresses security vulnerabilities affecting Go
  versions prior to Go 1.25.6 and Go 1.24.12 (CVE-2025-61728, CVE-2025-61726,
  CVE-2025-68121, CVE-2025-61731, CVE-2025-68119). 

- CVE-2025-68156: Fixed uncontrolled recursion in expression evaluation can
  cause a denial of service (bsc#1255345).
</description>
</patchinfo>
openSUSE Build Service is sponsored by