CVE-2026-27854 in PowerDNS DNSdistinformation

Résumé (Anglaise)

An attacker might be able to trigger a use-after-free by sending crafted DNS queries to a DNSdist using the DNSQuestion:getEDNSOptions method in custom Lua code. In some cases DNSQuestion:getEDNSOptions might refer to a version of the DNS packet that has been modified, thus triggering a use-after-free and potentially a crash resulting in denial of service.

Réserver

24/02/2026

Divulgation

31/03/2026

Entrées

VulDB provides additional information and datapoints for this CVE:

Do you know our Splunk app?

Download it now for free!