Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:deb/debian/dnsdist@2.0.3-1
purl pkg:deb/debian/dnsdist@2.0.3-1
Vulnerabilities affecting this package (0)
Vulnerability Summary Fixed by
This package is not known to be affected by vulnerabilities.
Vulnerabilities fixed by this package (7)
Vulnerability Summary Aliases
VCID-3qce-a24m-yue1 An attacker might be able to trigger an out-of-bounds write by sending crafted DNS responses to a DNSdist using the DNSQuestion:changeName or DNSResponse:changeName methods in custom Lua code. In some cases the rewritten packet might become larger than the initial response and even exceed 65535 bytes, potentially leading to a crash resulting in denial of service. CVE-2026-27853
VCID-atx2-yc9p-g3c7 An attacker might be able to trick DNSdist into allocating too much memory while processing DNS over QUIC or DNS over HTTP/3 payloads, resulting in a denial of service. In setups with a large quantity of memory available this usually results in an exception and the QUIC connection is properly closed, but in some cases the system might enter an out-of-memory state instead and terminate the process. CVE-2026-24030
VCID-c7az-aw1f-4yah When the early_acl_drop (earlyACLDrop in Lua) option is disabled (default is enabled) on a DNS over HTTPs frontend using the nghttp2 provider, the ACL check is skipped, allowing all clients to send DoH queries regardless of the configured ACL. CVE-2026-24029
VCID-gx8g-nvhj-1kak When the internal webserver is enabled (default is disabled), an attacker might be able to trick an administrator logged to the dashboard into visiting a malicious website and extract information about the running configuration from the dashboard. The root cause of the issue is a misconfiguration of the Cross-Origin Resource Sharing (CORS) policy. CVE-2026-0397
VCID-rf53-w9k3-7ych An attacker might be able to trigger an out-of-bounds read by sending a crafted DNS response packet, when custom Lua code uses newDNSPacketOverlay to parse DNS packets. The out-of-bounds read might trigger a crash, leading to a denial of service, or access unrelated memory, leading to potential information disclosure. CVE-2026-24028
VCID-szpa-skfv-bygh An attacker might be able to trigger a use-after-free by sending crafted DNS queries to a DNSdist using the DNSQuestion:getEDNSOptions method in custom Lua code. In some cases DNSQuestion:getEDNSOptions might refer to a version of the DNS packet that has been modified, thus triggering a use-after-free and potentially a crash resulting in denial of service. CVE-2026-27854
VCID-x5p9-vthx-tud8 An attacker might be able to inject HTML content into the internal web dashboard by sending crafted DNS queries to a DNSdist instance where domain-based dynamic rules have been enabled via either DynBlockRulesGroup:setSuffixMatchRule or DynBlockRulesGroup:setSuffixMatchRuleFFI. CVE-2026-0396

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-16T11:17:17.498805+00:00 Debian Importer Fixing VCID-szpa-skfv-bygh https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:13:07.454599+00:00 Debian Importer Fixing VCID-3qce-a24m-yue1 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:27:05.981273+00:00 Debian Importer Fixing VCID-x5p9-vthx-tud8 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:04:13.944357+00:00 Debian Importer Fixing VCID-gx8g-nvhj-1kak https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:00:44.091091+00:00 Debian Importer Fixing VCID-atx2-yc9p-g3c7 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:48:22.384413+00:00 Debian Importer Fixing VCID-rf53-w9k3-7ych https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:42:24.988999+00:00 Debian Importer Fixing VCID-c7az-aw1f-4yah https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-13T07:40:45.566681+00:00 Debian Importer Fixing VCID-szpa-skfv-bygh https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:37:39.629442+00:00 Debian Importer Fixing VCID-3qce-a24m-yue1 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:03:03.647636+00:00 Debian Importer Fixing VCID-x5p9-vthx-tud8 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:45:24.148098+00:00 Debian Importer Fixing VCID-gx8g-nvhj-1kak https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:42:45.536768+00:00 Debian Importer Fixing VCID-atx2-yc9p-g3c7 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:55:02.028651+00:00 Debian Importer Fixing VCID-rf53-w9k3-7ych https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:51:04.604889+00:00 Debian Importer Fixing VCID-c7az-aw1f-4yah https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-02T17:17:43.122986+00:00 Debian Importer Fixing VCID-gx8g-nvhj-1kak https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:12:27.077956+00:00 Debian Importer Fixing VCID-3qce-a24m-yue1 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:11:16.776351+00:00 Debian Importer Fixing VCID-x5p9-vthx-tud8 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:10:59.392800+00:00 Debian Importer Fixing VCID-szpa-skfv-bygh https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:06:59.836464+00:00 Debian Importer Fixing VCID-rf53-w9k3-7ych https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:06:42.836743+00:00 Debian Importer Fixing VCID-atx2-yc9p-g3c7 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:02:25.968875+00:00 Debian Importer Fixing VCID-c7az-aw1f-4yah https://security-tracker.debian.org/tracker/data/json 38.1.0