An issue has been found in PowerDNS DNSDist before 1.3.3 allowing a remote
attacker to craft a DNS query with trailing data such that the addition of
a record by dnsdist, for example an OPT record when adding EDNS Client
Subnet, might result in the trailing data being smuggled to the backend as
a valid record while not seen by dnsdist. This is an issue when dnsdist is
deployed as a DNS Firewall and used to filter some records that should not
be received by the backend. This issue occurs only when either the
'useClientSubnet' or the experimental 'addXPF' parameters are used when
declaring a new backend.
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 16.04 LTS (Xenial Xerus):needs-triage
Ubuntu 18.04 LTS (Bionic Beaver):needs-triage
Ubuntu 18.10 (Cosmic Cuttlefish):needs-triage
Ubuntu 19.04 (Disco Dingo):needs-triage
Ubuntu 19.10 (Eoan):needs-triage
More Information

Updated: 2019-04-26 14:26:56 UTC (commit 30899e40836d26e1bb5f0b072d31fd87b6cf3bd4)