| Name | CVE-2026-1425 |
| Description | A security flaw has been discovered in pymumu SmartDNS up to 47.1. This vulnerability affects the function _dns_decode_rr_head/_dns_decode_SVCB_HTTPS of the file src/dns.c of the component SVBC Record Parser. The manipulation results in stack-based buffer overflow. It is possible to launch the attack remotely. A high complexity level is associated with this attack. It is stated that the exploitability is difficult. The patch is identified as 2d57c4b4e1add9b4537aeb403f794a084727e1c8. Applying a patch is advised to resolve this issue. |
| Source | CVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
| Debian Bugs | 1126538 |
Vulnerable and fixed packages
The table below lists information on source packages.
| Source Package | Release | Version | Status |
|---|
| smartdns (PTS) | bullseye | 33+dfsg-2.1 | vulnerable |
| bookworm | 40+dfsg-1 | vulnerable |
| forky, sid, trixie | 46.1+dfsg-1 | vulnerable |
The information below is based on the following data on fixed versions.
| Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
|---|
| smartdns | source | (unstable) | (unfixed) | | | 1126538 |
Notes
[trixie] - smartdns <no-dsa> (Minor issue)
[bookworm] - smartdns <no-dsa> (Minor issue)
[bullseye] - smartdns <postponed> (Minor issue)
Fixed by: https://github.com/pymumu/smartdns/commit/2d57c4b4e1add9b4537aeb403f794a084727e1c8