An issue has been found in PowerDNS DNSDist before 1.3.3 allowing a remote
attacker to craft a DNS query with trailing data such that the addition of
a record by dnsdist, for example an OPT record when adding EDNS Client
Subnet, might result in the trailing data being smuggled to the backend as
a valid record while not seen by dnsdist. This is an issue when dnsdist is
deployed as a DNS Firewall and used to filter some records that should not
be received by the backend. This issue occurs only when either the
'useClientSubnet' or the experimental 'addXPF' parameters are used when
declaring a new backend.
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 LTS (Trusty Tahr):DNE
Ubuntu 16.04 LTS (Xenial Xerus):needs-triage
Ubuntu 18.04 LTS (Bionic Beaver):needs-triage
Ubuntu 18.10 (Cosmic Cuttlefish):needs-triage
Ubuntu 19.04 (Disco Dingo):needs-triage
More Information

Updated: 2019-03-19 11:28:40 UTC (commit 15472795df7e9de45b82f2d36b8b419b939f97b2)