CVE-2026-27854 — Use After Free in Dnsdist
Severity
4.8MEDIUMNVD
EPSS
0.0%
top 97.08%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMar 31
Description
An attacker might be able to trigger a use-after-free by sending crafted DNS queries to a DNSdist using the DNSQuestion:getEDNSOptions method in custom Lua code. In some cases DNSQuestion:getEDNSOptions might refer to a version of the DNS packet that has been modified, thus triggering a use-after-free and potentially a crash resulting in denial of service.
CVSS vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:LExploitability: 2.2 | Impact: 2.5
Affected Packages2 packages
🔴Vulnerability Details
3OSV▶
CVE-2026-27854: An attacker might be able to trigger a use-after-free by sending crafted DNS queries to a DNSdist using the DNSQuestion:getEDNSOptions method in custo↗2026-03-31
GHSA▶
GHSA-fmwh-v9r8-w9j6: An attacker might be able to trigger a use-after-free by sending crafted DNS queries to a DNSdist using the DNSQuestion:getEDNSOptions method in custo↗2026-03-31
📋Vendor Advisories
1Debian▶
CVE-2026-27854: dnsdist - An attacker might be able to trigger a use-after-free by sending crafted DNS que...↗2026