CVE-2026-33608

NameCVE-2026-33608
DescriptionAn attacker can send a notify request that causes a new secondary domain to be added to the bind backend, but causes said backend to update its configuration to an invalid one, leading to the backend no longer able to run on the next restart, requiring manual operation to fix it.
SourceCVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDSA-6233-1
Debian Bugs1135373

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
pdns (PTS)bullseye4.4.1-1vulnerable
bookworm4.7.3-2vulnerable
trixie4.9.7-1vulnerable
trixie (security)4.9.14-0+deb13u1fixed
forky, sid5.0.3-1vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
pdnssourcebullseye(unfixed)end-of-life
pdnssourcebookworm(unfixed)end-of-life
pdnssourcetrixie4.9.14-0+deb13u1DSA-6233-1
pdnssource(unstable)(unfixed)1135373

Notes

[bookworm] - pdns <end-of-life> (See #1119290)
[bullseye] - pdns <end-of-life> (see DLA 4471)
https://docs.powerdns.com/authoritative/security-advisories/powerdns-advisory-2026-05.html#incomplete-domain-name-sanitization-during-bind-autosecondary-zone-transfer

Search for package or bug name: Reporting problems