Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-6234-1 | pdns-recursor security update |
Mon, 27 Apr 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:powerdns:recursor:*:*:*:*:*:*:*:* cpe:2.3:a:powerdns:recursor:5.4.0:*:*:*:*:*:*:* |
Wed, 22 Apr 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 22 Apr 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Powerdns
Powerdns recursor |
|
| Vendors & Products |
Powerdns
Powerdns recursor |
Wed, 22 Apr 2026 11:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-362 CWE-416 |
Wed, 22 Apr 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Having many concurrent transfers of the same RPZ can lead to inconsistent RPZ data, use after free and/or a crash of the recursor. Normally concurrent transfers of the same RPZ zone can only occur with a malfunctioning RPZ provider. | |
| Title | Concurrent modification of RPZ data can lead to denial of servce | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: OX
Published:
Updated: 2026-04-22T18:10:14.046Z
Reserved: 2026-03-18T10:06:16.573Z
Link: CVE-2026-33259
Updated: 2026-04-22T18:04:15.479Z
Status : Analyzed
Published: 2026-04-22T10:16:51.580
Modified: 2026-04-27T17:03:35.660
Link: CVE-2026-33259
No data.
OpenCVE Enrichment
Updated: 2026-04-22T11:47:51Z
Debian DSA