Debian Package Tracker
Register | Log in
Subscribe

pdns

Choose email to subscribe with

general
  • source: pdns (main)
  • version: 5.0.3-1
  • maintainer: pdns packagers (DMD)
  • uploaders: Chris Hofstaedtler [DMD] – Marc Haber [DMD]
  • arch: any
  • std-ver: 4.5.1
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • o-o-stable: 4.4.1-1
  • oldstable: 4.7.3-2
  • stable: 4.9.7-1
  • testing: 5.0.3-1
  • unstable: 5.0.3-1
versioned links
  • 4.4.1-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 4.7.3-2: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 4.9.7-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 5.0.3-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • pdns-backend-bind
  • pdns-backend-geoip
  • pdns-backend-ldap
  • pdns-backend-lmdb
  • pdns-backend-lua2
  • pdns-backend-mysql
  • pdns-backend-odbc
  • pdns-backend-pgsql (1 bugs: 0, 0, 1, 0)
  • pdns-backend-pipe
  • pdns-backend-remote
  • pdns-backend-sqlite3
  • pdns-backend-tinydns
  • pdns-ixfrdist
  • pdns-server (3 bugs: 0, 1, 2, 0)
  • pdns-tools
action needed
A new upstream version is available: 5.1.0-alpha1 high
A new upstream version 5.1.0-alpha1 is available, you should consider packaging it.
Created: 2026-03-20 Last update: 2026-04-25 16:30
6 security issues in trixie high

There are 6 open security issues in trixie.

6 important issues:
  • CVE-2026-33257: An attacker can send a web request that causes unlimited memory allocation in the internal web server, leading to a denial of service. The internal web server is disabled by default.
  • CVE-2026-33260: An attacker can send a web request that causes unlimited memory allocation in the internal web server, leading to a denial of service. The internal web server is disabled by default.
  • CVE-2026-33608: An attacker can send a notify request that causes a new secondary domain to be added to the bind backend, but causes said backend to update its configuration to an invalid one, leading to the backend no longer able to run on the next restart, requiring manual operation to fix it.
  • CVE-2026-33609: Incomplete escaping of LDAP queries when running with 8bit-dns enabled allows users to perform queries of internal domain subtrees.
  • CVE-2026-33610: A rogue primary server may cause file descriptor exhaustion and eventually a denial of service, when a PowerDNS secondary server forwards a DNS update request to it.
  • CVE-2026-33611: An operator allowed to use the REST API can cause the Authoritative server to produce invalid HTTPS or SVCB record data, which can in turn cause LMDB database corruption, if using the LMDB backend.
Created: 2026-04-23 Last update: 2026-04-24 18:00
6 security issues in sid high

There are 6 open security issues in sid.

6 important issues:
  • CVE-2026-33257: An attacker can send a web request that causes unlimited memory allocation in the internal web server, leading to a denial of service. The internal web server is disabled by default.
  • CVE-2026-33260: An attacker can send a web request that causes unlimited memory allocation in the internal web server, leading to a denial of service. The internal web server is disabled by default.
  • CVE-2026-33608: An attacker can send a notify request that causes a new secondary domain to be added to the bind backend, but causes said backend to update its configuration to an invalid one, leading to the backend no longer able to run on the next restart, requiring manual operation to fix it.
  • CVE-2026-33609: Incomplete escaping of LDAP queries when running with 8bit-dns enabled allows users to perform queries of internal domain subtrees.
  • CVE-2026-33610: A rogue primary server may cause file descriptor exhaustion and eventually a denial of service, when a PowerDNS secondary server forwards a DNS update request to it.
  • CVE-2026-33611: An operator allowed to use the REST API can cause the Authoritative server to produce invalid HTTPS or SVCB record data, which can in turn cause LMDB database corruption, if using the LMDB backend.
Created: 2026-04-23 Last update: 2026-04-24 18:00
6 security issues in forky high

There are 6 open security issues in forky.

6 important issues:
  • CVE-2026-33257: An attacker can send a web request that causes unlimited memory allocation in the internal web server, leading to a denial of service. The internal web server is disabled by default.
  • CVE-2026-33260: An attacker can send a web request that causes unlimited memory allocation in the internal web server, leading to a denial of service. The internal web server is disabled by default.
  • CVE-2026-33608: An attacker can send a notify request that causes a new secondary domain to be added to the bind backend, but causes said backend to update its configuration to an invalid one, leading to the backend no longer able to run on the next restart, requiring manual operation to fix it.
  • CVE-2026-33609: Incomplete escaping of LDAP queries when running with 8bit-dns enabled allows users to perform queries of internal domain subtrees.
  • CVE-2026-33610: A rogue primary server may cause file descriptor exhaustion and eventually a denial of service, when a PowerDNS secondary server forwards a DNS update request to it.
  • CVE-2026-33611: An operator allowed to use the REST API can cause the Authoritative server to produce invalid HTTPS or SVCB record data, which can in turn cause LMDB database corruption, if using the LMDB backend.
Created: 2026-04-23 Last update: 2026-04-24 18:00
6 security issues in bookworm high

There are 6 open security issues in bookworm.

6 important issues:
  • CVE-2026-33257: An attacker can send a web request that causes unlimited memory allocation in the internal web server, leading to a denial of service. The internal web server is disabled by default.
  • CVE-2026-33260: An attacker can send a web request that causes unlimited memory allocation in the internal web server, leading to a denial of service. The internal web server is disabled by default.
  • CVE-2026-33608: An attacker can send a notify request that causes a new secondary domain to be added to the bind backend, but causes said backend to update its configuration to an invalid one, leading to the backend no longer able to run on the next restart, requiring manual operation to fix it.
  • CVE-2026-33609: Incomplete escaping of LDAP queries when running with 8bit-dns enabled allows users to perform queries of internal domain subtrees.
  • CVE-2026-33610: A rogue primary server may cause file descriptor exhaustion and eventually a denial of service, when a PowerDNS secondary server forwards a DNS update request to it.
  • CVE-2026-33611: An operator allowed to use the REST API can cause the Authoritative server to produce invalid HTTPS or SVCB record data, which can in turn cause LMDB database corruption, if using the LMDB backend.
Created: 2026-04-23 Last update: 2026-04-24 18:00
lintian reports 18 errors and 9 warnings high
Lintian reports 18 errors and 9 warnings about this package. You should make the package lintian clean getting rid of them.
Created: 2025-12-12 Last update: 2026-02-21 13:00
version in VCS is newer than in repository, is it time to upload? normal
vcswatch reports that this package seems to have a new changelog entry (version 5.0.4-1, distribution unstable) and new commits in its VCS. You should consider whether it's time to make an upload.
Created: 2026-04-22 Last update: 2026-04-22 21:31
Standards version of the package is outdated. wishlist
The package should be updated to follow the last version of Debian Policy (Standards-Version 4.7.4 instead of 4.5.1).
Created: 2021-08-18 Last update: 2026-03-31 15:01
testing migrations
  • This package will soon be part of the auto-yaml-cpp transition. You might want to ensure that your package is ready for it. You can probably find supplementary information in the debian-release archives or in the corresponding release.debian.org bug.
  • This package will soon be part of the auto-libsodium transition. You might want to ensure that your package is ready for it. You can probably find supplementary information in the debian-release archives or in the corresponding release.debian.org bug.
  • This package will soon be part of the auto-openssl transition. You might want to ensure that your package is ready for it. You can probably find supplementary information in the debian-release archives or in the corresponding release.debian.org bug.
news
[rss feed]
  • [2026-02-24] pdns 5.0.3-1 MIGRATED to testing (Debian testing watch)
  • [2026-02-20] Accepted pdns 5.0.3-1 (source) into unstable (Chris Hofstaedtler) (signed by: Christian Hofstaedtler)
  • [2025-12-14] pdns 5.0.2-1 MIGRATED to testing (Debian testing watch)
  • [2025-12-11] Accepted pdns 5.0.2-1 (source) into unstable (Chris Hofstaedtler) (signed by: Christian Hofstaedtler)
  • [2025-11-02] pdns 5.0.1-1 MIGRATED to testing (Debian testing watch)
  • [2025-10-30] Accepted pdns 5.0.1-1 (source) into unstable (Chris Hofstaedtler) (signed by: Christian Hofstaedtler)
  • [2025-08-29] pdns 5.0.0-2 MIGRATED to testing (Debian testing watch)
  • [2025-08-26] Accepted pdns 5.0.0-2 (source) into unstable (Chris Hofstaedtler) (signed by: Christian Hofstaedtler)
  • [2025-08-25] pdns 5.0.0-1 MIGRATED to testing (Debian testing watch)
  • [2025-08-23] Accepted pdns 5.0.0-1 (source) into unstable (Chris Hofstaedtler) (signed by: Christian Hofstaedtler)
  • [2025-07-14] pdns 4.9.7-1 MIGRATED to testing (Debian testing watch)
  • [2025-07-08] Accepted pdns 4.9.7-1 (source) into unstable (Chris Hofstaedtler) (signed by: Christian Hofstaedtler)
  • [2025-03-23] pdns 4.9.4-2 MIGRATED to testing (Debian testing watch)
  • [2025-03-21] Accepted pdns 4.9.4-2 (source) into unstable (Chris Hofstaedtler) (signed by: Christian Hofstaedtler)
  • [2025-02-19] pdns 4.9.4-1 MIGRATED to testing (Debian testing watch)
  • [2025-02-14] Accepted pdns 4.9.4-1 (source) into unstable (Chris Hofstaedtler) (signed by: Christian Hofstaedtler)
  • [2025-01-31] pdns 4.9.3-3 MIGRATED to testing (Debian testing watch)
  • [2025-01-26] pdns 4.9.3-2 MIGRATED to testing (Debian testing watch)
  • [2025-01-25] Accepted pdns 4.9.3-3 (source) into unstable (Chris Hofstaedtler) (signed by: Christian Hofstaedtler)
  • [2025-01-19] Accepted pdns 4.9.3-2 (source) into unstable (Chris Hofstaedtler) (signed by: Christian Hofstaedtler)
  • [2024-12-23] pdns 4.9.3-1 MIGRATED to testing (Debian testing watch)
  • [2024-12-17] Accepted pdns 4.9.3-1 (source) into unstable (Chris Hofstaedtler) (signed by: Christian Hofstaedtler)
  • [2024-12-13] Accepted pdns 4.9.2-2 (source arm64) into unstable (Chris Hofstaedtler) (signed by: Christian Hofstaedtler)
  • [2024-10-07] pdns 4.9.2-1 MIGRATED to testing (Debian testing watch)
  • [2024-10-01] Accepted pdns 4.9.2-1 (source) into unstable (Chris Hofstaedtler) (signed by: Christian Hofstaedtler)
  • [2024-08-17] pdns 4.9.1-3 MIGRATED to testing (Debian testing watch)
  • [2024-08-11] Accepted pdns 4.9.1-3 (source) into unstable (Chris Hofstaedtler) (signed by: Christian Hofstaedtler)
  • [2024-07-22] pdns 4.9.1-2 MIGRATED to testing (Debian testing watch)
  • [2024-07-17] Accepted pdns 4.9.1-2 (source) into unstable (Chris Hofstaedtler) (signed by: Christian Hofstaedtler)
  • [2024-06-18] pdns 4.9.1-1 MIGRATED to testing (Debian testing watch)
  • 1
  • 2
bugs [bug history graph]
  • all: 4
  • RC: 0
  • I&N: 1
  • M&W: 3
  • F&P: 0
  • patch: 0
links
  • homepage
  • lintian (18, 9)
  • buildd: logs, reproducibility, cross
  • popcon
  • browse source code
  • other distros
  • security tracker
  • debci
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 5.0.2-1build1
  • 2 bugs

Debian Package Tracker — Copyright 2013-2025 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing