Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:deb/debian/pdns-recursor@4.4.2-3
purl pkg:deb/debian/pdns-recursor@4.4.2-3
Next non-vulnerable version 5.2.9-0+deb13u1
Latest non-vulnerable version 5.4.1-1
Risk 3.4
Vulnerabilities affecting this package (21)
Vulnerability Summary Fixed by
VCID-26wf-1bqp-sbff
Aliases:
CVE-2026-33601
If you use the zoneToCache function with a malicious authoritative server, an attacker can send a zone that result in a null pointer dereference, caused by a missing consistency check and leading to a denial of service.
5.2.8-0+deb13u1
Affected by 9 other vulnerabilities.
5.2.9-0+deb13u1
Affected by 0 other vulnerabilities.
5.4.1-1
Affected by 0 other vulnerabilities.
VCID-2ugc-uygs-hqb8
Aliases:
CVE-2025-59024
Crafted delegations or IP fragments can poison cached delegations in Recursor.
5.2.8-0+deb13u1
Affected by 9 other vulnerabilities.
VCID-5afe-ws96-nqh9
Aliases:
CVE-2026-33258
By publishing and querying a crafted zone an attacker can cause allocation of large entries in the negative and aggressive NSEC(3) caches.
5.2.8-0+deb13u1
Affected by 9 other vulnerabilities.
5.2.9-0+deb13u1
Affected by 0 other vulnerabilities.
5.4.1-1
Affected by 0 other vulnerabilities.
VCID-66sa-bc5p-jqde
Aliases:
CVE-2023-50387
Multiple vulnerabilities have been discovered in Dnsmasq, the worst of which could lead to a denial of service.
4.8.8-1+deb12u1
Affected by 15 other vulnerabilities.
VCID-7dc3-qdk8-k7b2
Aliases:
CVE-2022-27227
In PowerDNS Authoritative Server before 4.4.3, 4.5.x before 4.5.4, and 4.6.x before 4.6.1 and PowerDNS Recursor before 4.4.8, 4.5.x before 4.5.8, and 4.6.x before 4.6.1, insufficient validation of an IXFR end condition causes incomplete zone transfers to be handled as successful transfers.
4.8.8-1+deb12u1
Affected by 15 other vulnerabilities.
VCID-8tar-s444-zfac
Aliases:
CVE-2022-37428
PowerDNS Recursor up to and including 4.5.9, 4.6.2 and 4.7.1, when protobuf logging is enabled, has Improper Cleanup upon a Thrown Exception, leading to a denial of service (daemon crash) via a DNS query that leads to an answer with specific properties.
4.8.8-1+deb12u1
Affected by 15 other vulnerabilities.
VCID-anab-r9ty-1yh1
Aliases:
CVE-2026-33600
An RPZ sent by a malicious authoritative server can result in a null pointer dereference, caused by a missing consistency check and leading to a denial of service.
5.2.8-0+deb13u1
Affected by 9 other vulnerabilities.
5.2.9-0+deb13u1
Affected by 0 other vulnerabilities.
5.4.1-1
Affected by 0 other vulnerabilities.
VCID-cdzz-8tc8-jucu
Aliases:
CVE-2025-59023
Crafted delegations or IP fragments can poison cached delegations in Recursor.
5.2.8-0+deb13u1
Affected by 9 other vulnerabilities.
VCID-chzq-qej6-rkdq
Aliases:
CVE-2026-33257
An attacker can send a web request that causes unlimited memory allocation in the internal web server, leading to a denial of service. The internal web server is disabled by default.
5.2.8-0+deb13u1
Affected by 9 other vulnerabilities.
5.2.9-0+deb13u1
Affected by 0 other vulnerabilities.
5.4.0-1
Affected by 7 other vulnerabilities.
5.4.1-1
Affected by 0 other vulnerabilities.
VCID-k3re-ss39-zugm
Aliases:
CVE-2026-33262
An attacker can send replies that result in a null pointer dereference, caused by a missing consistency check and leading to a denial of service. Cookies are disabled by default.
5.2.9-0+deb13u1
Affected by 0 other vulnerabilities.
5.4.1-1
Affected by 0 other vulnerabilities.
VCID-m445-c6a1-uugf
Aliases:
CVE-2026-0398
Crafted zones can lead to increased resource usage and crafted CNAME chains can lead to cache poisoning in Recursor.
5.2.8-0+deb13u1
Affected by 9 other vulnerabilities.
VCID-mkcs-362g-t7aq
Aliases:
CVE-2023-26437
Denial of service vulnerability in PowerDNS Recursor allows authoritative servers to be marked unavailable.This issue affects Recursor: through 4.6.5, through 4.7.4 , through 4.8.3.
4.8.8-1+deb12u1
Affected by 15 other vulnerabilities.
VCID-mzne-k7ry-pubm
Aliases:
CVE-2026-33259
Having many concurrent transfers of the same RPZ can lead to inconsistent RPZ data, use after free and/or a crash of the recursor. Normally concurrent transfers of the same RPZ zone can only occur with a malfunctioning RPZ provider.
5.2.8-0+deb13u1
Affected by 9 other vulnerabilities.
5.2.9-0+deb13u1
Affected by 0 other vulnerabilities.
5.4.1-1
Affected by 0 other vulnerabilities.
VCID-pfhu-1qdf-p7d5
Aliases:
CVE-2026-33260
An attacker can send a web request that causes unlimited memory allocation in the internal web server, leading to a denial of service. The internal web server is disabled by default.
5.2.8-0+deb13u1
Affected by 9 other vulnerabilities.
5.2.9-0+deb13u1
Affected by 0 other vulnerabilities.
5.4.0-1
Affected by 7 other vulnerabilities.
VCID-pjbp-1jgm-s3cg
Aliases:
CVE-2026-24027
Crafted zones can lead to increased incoming network traffic.
5.2.8-0+deb13u1
Affected by 9 other vulnerabilities.
VCID-umcq-ztbz-qfb2
Aliases:
CVE-2025-59030
An attacker can trigger the removal of cached records by sending a NOTIFY query over TCP.
5.2.8-0+deb13u1
Affected by 9 other vulnerabilities.
VCID-v9yz-hcqv-83gu
Aliases:
CVE-2026-33261
A zone transition from NSEC to NSEC3 might trigger an internal inconsistency and cause a denial of service.
5.2.8-0+deb13u1
Affected by 9 other vulnerabilities.
5.2.9-0+deb13u1
Affected by 0 other vulnerabilities.
5.4.1-1
Affected by 0 other vulnerabilities.
VCID-vprj-j7u6-zbe7
Aliases:
CVE-2023-50868
Multiple vulnerabilities have been discovered in Dnsmasq, the worst of which could lead to a denial of service.
4.8.8-1+deb12u1
Affected by 15 other vulnerabilities.
VCID-wmgd-z2j3-h7d9
Aliases:
CVE-2024-25590
An attacker can publish a zone containing specific Resource Record Sets. Repeatedly processing and caching results for these sets can lead to a denial of service.
4.8.8-1+deb12u1
Affected by 15 other vulnerabilities.
VCID-wywf-pmyt-zud4
Aliases:
CVE-2025-30192
An attacker spoofing answers to ECS enabled requests sent out by the Recursor has a chance of success higher than non-ECS enabled queries. The updated version include various mitigations against spoofing attempts of ECS enabled queries by chaining ECS enabled requests and enforcing stricter validation of the received answers. The most strict mitigation done when the new setting outgoing.edns_subnet_harden (old style name edns-subnet-harden) is enabled.
5.2.8-0+deb13u1
Affected by 9 other vulnerabilities.
VCID-xasd-r2rc-2ufq
Aliases:
CVE-2026-33256
An attacker can send a web request that causes unlimited memory allocation in the internal web server, leading to a denial of service. The internal web server is disabled by default.
5.2.9-0+deb13u1
Affected by 0 other vulnerabilities.
5.4.1-1
Affected by 0 other vulnerabilities.
Vulnerabilities fixed by this package (5)
Vulnerability Summary Aliases
VCID-12cd-ky6m-qkdg security update CVE-2020-12244
VCID-3e3b-z5bh-pban An issue has been found in PowerDNS Recursor 4.1.0 up to and including 4.3.0. It allows an attacker (with enough privileges to change the system's hostname) to cause disclosure of uninitialized memory content via a stack-based out-of-bounds read. It only occurs on systems where gethostname() does not have '\0' termination of the returned string if the hostname is larger than the supplied buffer. (Linux systems are not affected because the buffer is always large enough. OpenBSD systems are not affected because the returned hostname always has '\0' termination.) Under some conditions, this issue can lead to the writing of one '\0' byte out-of-bounds on the stack, causing a denial of service or possibly arbitrary code execution. CVE-2020-10030
VCID-htr2-rwgm-47ed A vulnerability in PowerDNS Recursor could lead to a Denial of Service condition. CVE-2020-25829
VCID-n2k6-nfxs-7ydj security update CVE-2020-10995
VCID-s6ds-tuus-n7hr In PowerDNS Recursor versions up to and including 4.3.1, 4.2.2 and 4.1.16, the ACL restricting access to the internal web server is not properly enforced. CVE-2020-14196

Date Actor Action Vulnerability Source VulnerableCode Version
2026-05-02T06:35:23.606459+00:00 Debian Importer Affected by VCID-wywf-pmyt-zud4 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T03:16:42.049625+00:00 Debian Importer Affected by VCID-mkcs-362g-t7aq https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T02:26:39.397215+00:00 Debian Importer Affected by VCID-anab-r9ty-1yh1 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T01:52:43.039334+00:00 Debian Importer Affected by VCID-2ugc-uygs-hqb8 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T00:39:04.295944+00:00 Debian Importer Affected by VCID-7dc3-qdk8-k7b2 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T00:12:32.438758+00:00 Debian Importer Affected by VCID-mzne-k7ry-pubm https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-02T00:04:52.311586+00:00 Debian Importer Affected by VCID-26wf-1bqp-sbff https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:58:08.938474+00:00 Debian Importer Affected by VCID-umcq-ztbz-qfb2 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:45:25.875206+00:00 Debian Importer Affected by VCID-pjbp-1jgm-s3cg https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:35:07.418866+00:00 Debian Importer Affected by VCID-8tar-s444-zfac https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T23:33:49.931478+00:00 Debian Importer Affected by VCID-wmgd-z2j3-h7d9 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:54:38.766940+00:00 Debian Importer Affected by VCID-k3re-ss39-zugm https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:41:43.284567+00:00 Debian Importer Affected by VCID-xasd-r2rc-2ufq https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:24:48.241763+00:00 Debian Importer Affected by VCID-5afe-ws96-nqh9 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:21:18.521935+00:00 Debian Importer Affected by VCID-m445-c6a1-uugf https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:17:42.105748+00:00 Debian Importer Affected by VCID-cdzz-8tc8-jucu https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:15:29.585466+00:00 Debian Importer Affected by VCID-v9yz-hcqv-83gu https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:06:38.354215+00:00 Debian Importer Affected by VCID-chzq-qej6-rkdq https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T22:03:35.089829+00:00 Debian Importer Affected by VCID-pfhu-1qdf-p7d5 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T21:55:33.811163+00:00 Debian Importer Affected by VCID-66sa-bc5p-jqde https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-05-01T21:45:04.835893+00:00 Debian Importer Affected by VCID-vprj-j7u6-zbe7 https://security-tracker.debian.org/tracker/data/json 38.6.0
2026-04-29T12:52:43.522824+00:00 Debian Importer Affected by VCID-chzq-qej6-rkdq https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:44:54.100067+00:00 Debian Importer Affected by VCID-66sa-bc5p-jqde https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-29T12:37:31.071506+00:00 Debian Importer Affected by VCID-vprj-j7u6-zbe7 https://security-tracker.debian.org/tracker/data/json 38.5.0
2026-04-27T06:39:21.033253+00:00 Debian Importer Affected by VCID-mzne-k7ry-pubm https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-27T05:58:05.339425+00:00 Debian Importer Affected by VCID-v9yz-hcqv-83gu https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-27T03:51:44.724268+00:00 Debian Importer Affected by VCID-anab-r9ty-1yh1 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-27T03:08:25.696315+00:00 Debian Importer Affected by VCID-pfhu-1qdf-p7d5 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-27T02:25:57.202737+00:00 Debian Importer Affected by VCID-5afe-ws96-nqh9 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-27T02:03:48.368855+00:00 Debian Importer Affected by VCID-26wf-1bqp-sbff https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-27T00:34:32.390547+00:00 Debian Importer Affected by VCID-k3re-ss39-zugm https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-27T00:12:40.433191+00:00 Debian Importer Affected by VCID-xasd-r2rc-2ufq https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-26T23:48:07.176341+00:00 Debian Importer Affected by VCID-chzq-qej6-rkdq https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:42:18.295163+00:00 Debian Importer Affected by VCID-wywf-pmyt-zud4 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:54:35.111911+00:00 Debian Importer Affected by VCID-66sa-bc5p-jqde https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:46:51.733651+00:00 Debian Importer Affected by VCID-wmgd-z2j3-h7d9 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:36:21.196425+00:00 Debian Importer Affected by VCID-mkcs-362g-t7aq https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:32:59.632477+00:00 Debian Importer Affected by VCID-cdzz-8tc8-jucu https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:30:44.416348+00:00 Debian Importer Affected by VCID-pjbp-1jgm-s3cg https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:57:29.804120+00:00 Debian Importer Affected by VCID-8tar-s444-zfac https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:55:57.144310+00:00 Debian Importer Affected by VCID-umcq-ztbz-qfb2 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:43:09.442348+00:00 Debian Importer Affected by VCID-m445-c6a1-uugf https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:30:45.869343+00:00 Debian Importer Affected by VCID-2ugc-uygs-hqb8 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:53:59.048012+00:00 Debian Importer Affected by VCID-7dc3-qdk8-k7b2 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:38:40.752793+00:00 Debian Importer Affected by VCID-vprj-j7u6-zbe7 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-15T20:50:00.066315+00:00 Debian Oval Importer Fixing VCID-n2k6-nfxs-7ydj https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T20:49:22.999785+00:00 Debian Oval Importer Fixing VCID-12cd-ky6m-qkdg https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T19:05:48.707136+00:00 Debian Oval Importer Fixing VCID-s6ds-tuus-n7hr https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T17:38:11.683981+00:00 Debian Oval Importer Fixing VCID-htr2-rwgm-47ed https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T16:50:06.260357+00:00 Debian Oval Importer Fixing VCID-3e3b-z5bh-pban https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-13T08:42:34.651842+00:00 Debian Importer Affected by VCID-wywf-pmyt-zud4 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:07:47.249993+00:00 Debian Importer Affected by VCID-66sa-bc5p-jqde https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:02:04.436156+00:00 Debian Importer Affected by VCID-wmgd-z2j3-h7d9 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:54:38.942712+00:00 Debian Importer Affected by VCID-mkcs-362g-t7aq https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:52:22.943862+00:00 Debian Importer Affected by VCID-cdzz-8tc8-jucu https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:50:48.100744+00:00 Debian Importer Affected by VCID-pjbp-1jgm-s3cg https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:25:56.450976+00:00 Debian Importer Affected by VCID-8tar-s444-zfac https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:24:42.902223+00:00 Debian Importer Affected by VCID-umcq-ztbz-qfb2 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:14:58.123277+00:00 Debian Importer Affected by VCID-m445-c6a1-uugf https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:05:48.999973+00:00 Debian Importer Affected by VCID-2ugc-uygs-hqb8 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:37:26.900178+00:00 Debian Importer Affected by VCID-7dc3-qdk8-k7b2 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T20:30:39.344408+00:00 Debian Oval Importer Fixing VCID-n2k6-nfxs-7ydj https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T20:30:06.560311+00:00 Debian Oval Importer Fixing VCID-12cd-ky6m-qkdg https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T18:49:42.339418+00:00 Debian Oval Importer Fixing VCID-s6ds-tuus-n7hr https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T17:48:45.611304+00:00 Debian Importer Affected by VCID-vprj-j7u6-zbe7 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:24:24.332862+00:00 Debian Oval Importer Fixing VCID-htr2-rwgm-47ed https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T16:36:52.771658+00:00 Debian Oval Importer Fixing VCID-3e3b-z5bh-pban https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-08T20:10:57.361337+00:00 Debian Oval Importer Fixing VCID-n2k6-nfxs-7ydj https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T20:10:25.095968+00:00 Debian Oval Importer Fixing VCID-12cd-ky6m-qkdg https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T19:48:00.971625+00:00 Debian Importer Affected by VCID-wywf-pmyt-zud4 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:24:54.860974+00:00 Debian Importer Affected by VCID-66sa-bc5p-jqde https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:21:04.960988+00:00 Debian Importer Affected by VCID-wmgd-z2j3-h7d9 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:15:51.944812+00:00 Debian Importer Affected by VCID-mkcs-362g-t7aq https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:14:19.500262+00:00 Debian Importer Affected by VCID-cdzz-8tc8-jucu https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:13:16.319852+00:00 Debian Importer Affected by VCID-pjbp-1jgm-s3cg https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:56:20.640711+00:00 Debian Importer Affected by VCID-8tar-s444-zfac https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:55:30.721357+00:00 Debian Importer Affected by VCID-umcq-ztbz-qfb2 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:49:07.857675+00:00 Debian Importer Affected by VCID-m445-c6a1-uugf https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:42:52.894593+00:00 Debian Importer Affected by VCID-2ugc-uygs-hqb8 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:34:35.881008+00:00 Debian Oval Importer Fixing VCID-s6ds-tuus-n7hr https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T18:24:10.472342+00:00 Debian Importer Affected by VCID-7dc3-qdk8-k7b2 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T17:12:36.936767+00:00 Debian Oval Importer Fixing VCID-htr2-rwgm-47ed https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T16:27:39.502515+00:00 Debian Oval Importer Fixing VCID-3e3b-z5bh-pban https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-04T15:41:57.345365+00:00 Debian Importer Affected by VCID-vprj-j7u6-zbe7 https://security-tracker.debian.org/tracker/data/json 38.1.0