[dnsdist] PowerDNS DNSdist 1.9.13 and 2.0.4 Released (Security Release)

Remi Gacogne remi.gacogne at powerdns.com
Wed Apr 22 10:04:03 UTC 2026


Hi,

Today we released two new versions of DNSdist, 1.9.13 and 2.0.4, fixing 
several security issues that have been reported to us. These security 
issues are medium to high severity, and we recommend upgrading quickly.

The issues fixed in these releases are:
- CVE-2026-33254: An attacker can create a large number of concurrent 
DoQ or DoH3 connections, causing unlimited memory allocation in DNSdist 
and leading to a denial of service. DOQ and DoH3 are disabled by default
- CVE-2026-33257: An attacker can send a web request that causes 
unlimited memory allocation in the internal web server, leading to a 
denial of service. The web server is disabled and restricted by an ACL 
by default
- CVE-2026-33260: An attacker can send a web request that causes 
unlimited memory allocation in the internal web server, leading to a 
denial of service. The web server is disabled and restricted by an ACL 
by default
- CVE-2026-33593: A client can trigger a divide by zero error leading to 
crash by sending a crafted DNSCrypt query. DNSCrypt is disabled by default
- CVE-2026-33594: A client can trigger excessive memory allocation by 
generating a lot of queries that are routed to an overloaded DoH 
backend, causing queries to accumulate into a buffer that will not be 
released until the end of the connection. Outgoing DoH is disabled by 
default
- CVE-2026-33595: A client can trigger excessive memory allocation by 
generating a lot of errors responses over a single DoQ and DoH3 
connection, as some resources were not properly released until the end 
of the connection. DOQ and DoH3 are disabled by default
- CVE-2026-33596: A client might theoretically be able to cause a 
mismatch between queries sent to a backend and the received responses by 
sending a flood of perfectly timed queries that are routed to a TCP-only 
or DNS over TLS backend
- CVE-2026-33597: A crafted query containing an invalid DNS label can 
prevent the PRSD detection algorithm executed via 
DynBlockRulesGroup:setSuffixMatchRule or 
DynBlockRulesGroup:setSuffixMatchRuleFFI from being executed
- CVE-2026-33598: A cached crafted response can cause an out-of-bounds 
read if custom Lua code calls getDomainListByAddress() or 
getAddressListByDomain() on a packet cache
- CVE-2026-33599: A rogue backend can send a crafted SVCB response to a 
Discovery of Designated Resolvers request, when requested via either the 
autoUpgrade (Lua) option to newServer or auto_upgrade (YAML) settings. 
DDR upgrade is not enabled by default
- CVE-2026-33602: A rogue backend can send a crafted UDP response with a 
query ID off by one related to the maximum configured value, triggering 
an out-of-bounds write leading to a denial of service

The complete list of changes can be found in the ChangeLogs [1][2]. 
Please see the DNSdist website [3] for the current documentation. The 
upgrade guide is also available there [4]. The full security advisory 
[5] can be found on our website as well.

Please send us all feedback and issues you might have via the mailing 
list, or in case of a bug, via GitHub [6].

The release tarballs [7][8] and their signatures [9][10] are available 
on the downloads website, and packages for several distributions are 
available from our repository [11].

[1]: https://dnsdist.org/changelog.html#change-1.9.13
[2]: https://dnsdist.org/changelog.html#change-2.0.4
[3]: https://dnsdist.org
[4]: https://dnsdist.org/upgrade_guide.html
[5]: 
https://www.dnsdist.org/security-advisories/powerdns-advisory-for-dnsdist-2026-04.html
[6]: https://github.com/PowerDNS/pdns/issues/new/choose
[7]: https://downloads.powerdns.com/releases/dnsdist-1.9.13.tar.bz2
[8]: https://downloads.powerdns.com/releases/dnsdist-1.9.13.tar.bz2.sig
[9]: https://downloads.powerdns.com/releases/dnsdist-2.0.4.tar.xz
[10]: https://downloads.powerdns.com/releases/dnsdist-2.0.4.tar.xz.sig
[11]: https://repo.powerdns.com

Best regards,
-
Remi Gacogne
PowerDNS.COM BV - https://www.powerdns.com/

-------------- next part --------------
A non-text attachment was scrubbed...
Name: OpenPGP_signature.asc
Type: application/pgp-signature
Size: 488 bytes
Desc: OpenPGP digital signature
URL: <http://mailman.powerdns.com/pipermail/dnsdist/attachments/20260422/4f89a9bc/attachment.sig>


More information about the dnsdist mailing list