CVE-2026-27854 in PowerDNS DNSdistinfo

Zusammenfassung (Englisch)

An attacker might be able to trigger a use-after-free by sending crafted DNS queries to a DNSdist using the DNSQuestion:getEDNSOptions method in custom Lua code. In some cases DNSQuestion:getEDNSOptions might refer to a version of the DNS packet that has been modified, thus triggering a use-after-free and potentially a crash resulting in denial of service.

Reservieren

24.02.2026

Veröffentlichung

31.03.2026

Einträge

VulDB provides additional information and datapoints for this CVE:

Interested in the pricing of exploits?

See the underground prices here!