CVE-2026-27854 in PowerDNS DNSdist
Résumé (Anglaise)
An attacker might be able to trigger a use-after-free by sending crafted DNS queries to a DNSdist using the DNSQuestion:getEDNSOptions method in custom Lua code. In some cases DNSQuestion:getEDNSOptions might refer to a version of the DNS packet that has been modified, thus triggering a use-after-free and potentially a crash resulting in denial of service.
Réserver
24/02/2026
Divulgation
31/03/2026
Entrées
VulDB provides additional information and datapoints for this CVE:
| ID | Vulnérabilité | CWE | Exp | Con | CVE |
|---|---|---|---|---|---|
| 354377 | PowerDNS DNSdist déni de service | 404 | Non défini | Correctif officiel | CVE-2026-27854 |