Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:deb/debian/pdns-recursor@4.8.8-1%2Bdeb12u1
purl pkg:deb/debian/pdns-recursor@4.8.8-1%2Bdeb12u1
Next non-vulnerable version 5.2.8-0+deb13u1
Latest non-vulnerable version 5.2.8-0+deb13u1
Risk 2.0
Vulnerabilities affecting this package (6)
Vulnerability Summary Fixed by
VCID-2ugc-uygs-hqb8
Aliases:
CVE-2025-59024
Crafted delegations or IP fragments can poison cached delegations in Recursor.
5.2.8-0+deb13u1
Affected by 0 other vulnerabilities.
VCID-cdzz-8tc8-jucu
Aliases:
CVE-2025-59023
Crafted delegations or IP fragments can poison cached delegations in Recursor.
5.2.8-0+deb13u1
Affected by 0 other vulnerabilities.
VCID-m445-c6a1-uugf
Aliases:
CVE-2026-0398
Crafted zones can lead to increased resource usage and crafted CNAME chains can lead to cache poisoning in Recursor.
5.2.8-0+deb13u1
Affected by 0 other vulnerabilities.
VCID-pjbp-1jgm-s3cg
Aliases:
CVE-2026-24027
Crafted zones can lead to increased incoming network traffic.
5.2.8-0+deb13u1
Affected by 0 other vulnerabilities.
VCID-umcq-ztbz-qfb2
Aliases:
CVE-2025-59030
An attacker can trigger the removal of cached records by sending a NOTIFY query over TCP.
5.2.8-0+deb13u1
Affected by 0 other vulnerabilities.
VCID-wywf-pmyt-zud4
Aliases:
CVE-2025-30192
An attacker spoofing answers to ECS enabled requests sent out by the Recursor has a chance of success higher than non-ECS enabled queries. The updated version include various mitigations against spoofing attempts of ECS enabled queries by chaining ECS enabled requests and enforcing stricter validation of the received answers. The most strict mitigation done when the new setting outgoing.edns_subnet_harden (old style name edns-subnet-harden) is enabled.
5.2.8-0+deb13u1
Affected by 0 other vulnerabilities.
Vulnerabilities fixed by this package (6)
Vulnerability Summary Aliases
VCID-66sa-bc5p-jqde Multiple vulnerabilities have been discovered in Dnsmasq, the worst of which could lead to a denial of service. CVE-2023-50387
VCID-7dc3-qdk8-k7b2 In PowerDNS Authoritative Server before 4.4.3, 4.5.x before 4.5.4, and 4.6.x before 4.6.1 and PowerDNS Recursor before 4.4.8, 4.5.x before 4.5.8, and 4.6.x before 4.6.1, insufficient validation of an IXFR end condition causes incomplete zone transfers to be handled as successful transfers. CVE-2022-27227
VCID-8tar-s444-zfac PowerDNS Recursor up to and including 4.5.9, 4.6.2 and 4.7.1, when protobuf logging is enabled, has Improper Cleanup upon a Thrown Exception, leading to a denial of service (daemon crash) via a DNS query that leads to an answer with specific properties. CVE-2022-37428
VCID-mkcs-362g-t7aq Denial of service vulnerability in PowerDNS Recursor allows authoritative servers to be marked unavailable.This issue affects Recursor: through 4.6.5, through 4.7.4 , through 4.8.3. CVE-2023-26437
VCID-vprj-j7u6-zbe7 Multiple vulnerabilities have been discovered in Dnsmasq, the worst of which could lead to a denial of service. CVE-2023-50868
VCID-wmgd-z2j3-h7d9 An attacker can publish a zone containing specific Resource Record Sets. Repeatedly processing and caching results for these sets can lead to a denial of service. CVE-2024-25590

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-13T08:42:34.655878+00:00 Debian Importer Affected by VCID-wywf-pmyt-zud4 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:07:47.252852+00:00 Debian Importer Fixing VCID-66sa-bc5p-jqde https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:02:04.440207+00:00 Debian Importer Fixing VCID-wmgd-z2j3-h7d9 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:54:38.944561+00:00 Debian Importer Fixing VCID-mkcs-362g-t7aq https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:52:22.947801+00:00 Debian Importer Affected by VCID-cdzz-8tc8-jucu https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:50:48.104269+00:00 Debian Importer Affected by VCID-pjbp-1jgm-s3cg https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:25:56.455005+00:00 Debian Importer Fixing VCID-8tar-s444-zfac https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:24:42.906149+00:00 Debian Importer Affected by VCID-umcq-ztbz-qfb2 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:14:58.125023+00:00 Debian Importer Affected by VCID-m445-c6a1-uugf https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:05:49.002157+00:00 Debian Importer Affected by VCID-2ugc-uygs-hqb8 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:37:26.904369+00:00 Debian Importer Fixing VCID-7dc3-qdk8-k7b2 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:48:45.615438+00:00 Debian Importer Fixing VCID-vprj-j7u6-zbe7 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-08T19:48:00.975729+00:00 Debian Importer Affected by VCID-wywf-pmyt-zud4 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:24:54.865532+00:00 Debian Importer Fixing VCID-66sa-bc5p-jqde https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:21:04.965494+00:00 Debian Importer Fixing VCID-wmgd-z2j3-h7d9 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:15:51.949730+00:00 Debian Importer Fixing VCID-mkcs-362g-t7aq https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:14:19.505475+00:00 Debian Importer Affected by VCID-cdzz-8tc8-jucu https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:13:16.324679+00:00 Debian Importer Affected by VCID-pjbp-1jgm-s3cg https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:56:20.651081+00:00 Debian Importer Fixing VCID-8tar-s444-zfac https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:55:30.725761+00:00 Debian Importer Affected by VCID-umcq-ztbz-qfb2 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:49:07.862474+00:00 Debian Importer Affected by VCID-m445-c6a1-uugf https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:42:52.898885+00:00 Debian Importer Affected by VCID-2ugc-uygs-hqb8 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:24:10.477416+00:00 Debian Importer Fixing VCID-7dc3-qdk8-k7b2 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T15:41:57.350595+00:00 Debian Importer Fixing VCID-vprj-j7u6-zbe7 https://security-tracker.debian.org/tracker/data/json 38.1.0