CVE-2026-1425

NameCVE-2026-1425
DescriptionA security flaw has been discovered in pymumu SmartDNS up to 47.1. This vulnerability affects the function _dns_decode_rr_head/_dns_decode_SVCB_HTTPS of the file src/dns.c of the component SVBC Record Parser. The manipulation results in stack-based buffer overflow. It is possible to launch the attack remotely. A high complexity level is associated with this attack. It is stated that the exploitability is difficult. The patch is identified as 2d57c4b4e1add9b4537aeb403f794a084727e1c8. Applying a patch is advised to resolve this issue.
SourceCVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs1126538

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
smartdns (PTS)bullseye33+dfsg-2.1vulnerable
bookworm40+dfsg-1vulnerable
forky, sid, trixie46.1+dfsg-1vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
smartdnssource(unstable)(unfixed)1126538

Notes

[trixie] - smartdns <no-dsa> (Minor issue)
[bookworm] - smartdns <no-dsa> (Minor issue)
[bullseye] - smartdns <postponed> (Minor issue)
Fixed by: https://github.com/pymumu/smartdns/commit/2d57c4b4e1add9b4537aeb403f794a084727e1c8

Search for package or bug name: Reporting problems