Source: smartdns
Version: 46.1+dfsg-1
Severity: important
Tags: security upstream
X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>

Hi,

The following vulnerability was published for smartdns.

CVE-2026-1425[0]:
| A security flaw has been discovered in pymumu SmartDNS up to 47.1.
| This vulnerability affects the function
| _dns_decode_rr_head/_dns_decode_SVCB_HTTPS of the file src/dns.c of
| the component SVBC Record Parser. The manipulation results in stack-
| based buffer overflow. It is possible to launch the attack remotely.
| A high complexity level is associated with this attack. It is stated
| that the exploitability is difficult. The patch is identified as
| 2d57c4b4e1add9b4537aeb403f794a084727e1c8. Applying a patch is
| advised to resolve this issue.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2026-1425
    https://www.cve.org/CVERecord?id=CVE-2026-1425
[1] 
https://github.com/pymumu/smartdns/commit/2d57c4b4e1add9b4537aeb403f794a084727e1c8

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

Reply via email to