Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:deb/debian/pdns-recursor@4.4.2-3
purl pkg:deb/debian/pdns-recursor@4.4.2-3
Next non-vulnerable version 5.2.8-0+deb13u1
Latest non-vulnerable version 5.2.8-0+deb13u1
Risk 3.4
Vulnerabilities affecting this package (12)
Vulnerability Summary Fixed by
VCID-2ugc-uygs-hqb8
Aliases:
CVE-2025-59024
Crafted delegations or IP fragments can poison cached delegations in Recursor.
5.2.8-0+deb13u1
Affected by 0 other vulnerabilities.
VCID-66sa-bc5p-jqde
Aliases:
CVE-2023-50387
Multiple vulnerabilities have been discovered in Dnsmasq, the worst of which could lead to a denial of service.
4.8.8-1+deb12u1
Affected by 6 other vulnerabilities.
VCID-7dc3-qdk8-k7b2
Aliases:
CVE-2022-27227
In PowerDNS Authoritative Server before 4.4.3, 4.5.x before 4.5.4, and 4.6.x before 4.6.1 and PowerDNS Recursor before 4.4.8, 4.5.x before 4.5.8, and 4.6.x before 4.6.1, insufficient validation of an IXFR end condition causes incomplete zone transfers to be handled as successful transfers.
4.8.8-1+deb12u1
Affected by 6 other vulnerabilities.
VCID-8tar-s444-zfac
Aliases:
CVE-2022-37428
PowerDNS Recursor up to and including 4.5.9, 4.6.2 and 4.7.1, when protobuf logging is enabled, has Improper Cleanup upon a Thrown Exception, leading to a denial of service (daemon crash) via a DNS query that leads to an answer with specific properties.
4.8.8-1+deb12u1
Affected by 6 other vulnerabilities.
VCID-cdzz-8tc8-jucu
Aliases:
CVE-2025-59023
Crafted delegations or IP fragments can poison cached delegations in Recursor.
5.2.8-0+deb13u1
Affected by 0 other vulnerabilities.
VCID-m445-c6a1-uugf
Aliases:
CVE-2026-0398
Crafted zones can lead to increased resource usage and crafted CNAME chains can lead to cache poisoning in Recursor.
5.2.8-0+deb13u1
Affected by 0 other vulnerabilities.
VCID-mkcs-362g-t7aq
Aliases:
CVE-2023-26437
Denial of service vulnerability in PowerDNS Recursor allows authoritative servers to be marked unavailable.This issue affects Recursor: through 4.6.5, through 4.7.4 , through 4.8.3.
4.8.8-1+deb12u1
Affected by 6 other vulnerabilities.
VCID-pjbp-1jgm-s3cg
Aliases:
CVE-2026-24027
Crafted zones can lead to increased incoming network traffic.
5.2.8-0+deb13u1
Affected by 0 other vulnerabilities.
VCID-umcq-ztbz-qfb2
Aliases:
CVE-2025-59030
An attacker can trigger the removal of cached records by sending a NOTIFY query over TCP.
5.2.8-0+deb13u1
Affected by 0 other vulnerabilities.
VCID-vprj-j7u6-zbe7
Aliases:
CVE-2023-50868
Multiple vulnerabilities have been discovered in Dnsmasq, the worst of which could lead to a denial of service.
4.8.8-1+deb12u1
Affected by 6 other vulnerabilities.
VCID-wmgd-z2j3-h7d9
Aliases:
CVE-2024-25590
An attacker can publish a zone containing specific Resource Record Sets. Repeatedly processing and caching results for these sets can lead to a denial of service.
4.8.8-1+deb12u1
Affected by 6 other vulnerabilities.
VCID-wywf-pmyt-zud4
Aliases:
CVE-2025-30192
An attacker spoofing answers to ECS enabled requests sent out by the Recursor has a chance of success higher than non-ECS enabled queries. The updated version include various mitigations against spoofing attempts of ECS enabled queries by chaining ECS enabled requests and enforcing stricter validation of the received answers. The most strict mitigation done when the new setting outgoing.edns_subnet_harden (old style name edns-subnet-harden) is enabled.
5.2.8-0+deb13u1
Affected by 0 other vulnerabilities.
Vulnerabilities fixed by this package (5)
Vulnerability Summary Aliases
VCID-12cd-ky6m-qkdg security update CVE-2020-12244
VCID-3e3b-z5bh-pban An issue has been found in PowerDNS Recursor 4.1.0 up to and including 4.3.0. It allows an attacker (with enough privileges to change the system's hostname) to cause disclosure of uninitialized memory content via a stack-based out-of-bounds read. It only occurs on systems where gethostname() does not have '\0' termination of the returned string if the hostname is larger than the supplied buffer. (Linux systems are not affected because the buffer is always large enough. OpenBSD systems are not affected because the returned hostname always has '\0' termination.) Under some conditions, this issue can lead to the writing of one '\0' byte out-of-bounds on the stack, causing a denial of service or possibly arbitrary code execution. CVE-2020-10030
VCID-htr2-rwgm-47ed A vulnerability in PowerDNS Recursor could lead to a Denial of Service condition. CVE-2020-25829
VCID-n2k6-nfxs-7ydj security update CVE-2020-10995
VCID-s6ds-tuus-n7hr In PowerDNS Recursor versions up to and including 4.3.1, 4.2.2 and 4.1.16, the ACL restricting access to the internal web server is not properly enforced. CVE-2020-14196

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-15T19:05:48.707136+00:00 Debian Oval Importer Fixing VCID-s6ds-tuus-n7hr https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T17:38:11.683981+00:00 Debian Oval Importer Fixing VCID-htr2-rwgm-47ed https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T16:50:06.260357+00:00 Debian Oval Importer Fixing VCID-3e3b-z5bh-pban https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-13T08:42:34.651842+00:00 Debian Importer Affected by VCID-wywf-pmyt-zud4 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:07:47.249993+00:00 Debian Importer Affected by VCID-66sa-bc5p-jqde https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:02:04.436156+00:00 Debian Importer Affected by VCID-wmgd-z2j3-h7d9 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:54:38.942712+00:00 Debian Importer Affected by VCID-mkcs-362g-t7aq https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:52:22.943862+00:00 Debian Importer Affected by VCID-cdzz-8tc8-jucu https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:50:48.100744+00:00 Debian Importer Affected by VCID-pjbp-1jgm-s3cg https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:25:56.450976+00:00 Debian Importer Affected by VCID-8tar-s444-zfac https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:24:42.902223+00:00 Debian Importer Affected by VCID-umcq-ztbz-qfb2 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:14:58.123277+00:00 Debian Importer Affected by VCID-m445-c6a1-uugf https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:05:48.999973+00:00 Debian Importer Affected by VCID-2ugc-uygs-hqb8 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:37:26.900178+00:00 Debian Importer Affected by VCID-7dc3-qdk8-k7b2 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T20:30:39.344408+00:00 Debian Oval Importer Fixing VCID-n2k6-nfxs-7ydj https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T20:30:06.560311+00:00 Debian Oval Importer Fixing VCID-12cd-ky6m-qkdg https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T18:49:42.339418+00:00 Debian Oval Importer Fixing VCID-s6ds-tuus-n7hr https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T17:48:45.611304+00:00 Debian Importer Affected by VCID-vprj-j7u6-zbe7 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:24:24.332862+00:00 Debian Oval Importer Fixing VCID-htr2-rwgm-47ed https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T16:36:52.771658+00:00 Debian Oval Importer Fixing VCID-3e3b-z5bh-pban https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-08T20:10:57.361337+00:00 Debian Oval Importer Fixing VCID-n2k6-nfxs-7ydj https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T20:10:25.095968+00:00 Debian Oval Importer Fixing VCID-12cd-ky6m-qkdg https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T19:48:00.971625+00:00 Debian Importer Affected by VCID-wywf-pmyt-zud4 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:24:54.860974+00:00 Debian Importer Affected by VCID-66sa-bc5p-jqde https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:21:04.960988+00:00 Debian Importer Affected by VCID-wmgd-z2j3-h7d9 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:15:51.944812+00:00 Debian Importer Affected by VCID-mkcs-362g-t7aq https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:14:19.500262+00:00 Debian Importer Affected by VCID-cdzz-8tc8-jucu https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:13:16.319852+00:00 Debian Importer Affected by VCID-pjbp-1jgm-s3cg https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:56:20.640711+00:00 Debian Importer Affected by VCID-8tar-s444-zfac https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:55:30.721357+00:00 Debian Importer Affected by VCID-umcq-ztbz-qfb2 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:49:07.857675+00:00 Debian Importer Affected by VCID-m445-c6a1-uugf https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:42:52.894593+00:00 Debian Importer Affected by VCID-2ugc-uygs-hqb8 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:34:35.881008+00:00 Debian Oval Importer Fixing VCID-s6ds-tuus-n7hr https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T18:24:10.472342+00:00 Debian Importer Affected by VCID-7dc3-qdk8-k7b2 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T17:12:36.936767+00:00 Debian Oval Importer Fixing VCID-htr2-rwgm-47ed https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T16:27:39.502515+00:00 Debian Oval Importer Fixing VCID-3e3b-z5bh-pban https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-04T15:41:57.345365+00:00 Debian Importer Affected by VCID-vprj-j7u6-zbe7 https://security-tracker.debian.org/tracker/data/json 38.1.0