{"id":"CVE-2023-22617","details":"A remote attacker might be able to cause infinite recursion in PowerDNS Recursor 4.8.0 via a DNS query that retrieves DS records for a misconfigured domain, because QName minimization is used in QM fallback mode. This is fixed in 4.8.1.","modified":"2026-05-18T05:56:26.976320323Z","published":"2023-01-21T00:00:00Z","related":["openSUSE-SU-2024:12628-1"],"database_specific":{"cna_assigner":"mitre","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/22xxx/CVE-2023-22617.json"},"references":[{"type":"WEB","url":"https://docs.powerdns.com/recursor/changelog/4.8.html#change-4.8.1"},{"type":"ADVISORY","url":"https://docs.powerdns.com/recursor/security-advisories/"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/22xxx/CVE-2023-22617.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-22617"},{"type":"ARTICLE","url":"http://www.openwall.com/lists/oss-security/2023/01/20/1"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/powerdns/pdns","events":[{"introduced":"0"},{"last_affected":"84bc8944539bb9082312c703fb19775ffabc79f9"}],"database_specific":{"source":"CPE_FIELD","extracted_events":[{"introduced":"0"},{"last_affected":"4.8.0"}],"cpe":"cpe:2.3:a:powerdns:recursor:4.8.0:*:*:*:*:*:*:*"}}],"versions":["rec-4.8.0","rec-4.8.0-rc1","rec-4.8.0-beta2","rec-4.8.0-beta1","rec-4.9.0-alpha0","rec-4.8.0-alpha1","auth-4.8.0-alpha0","rec-4.7.0-beta1","rec-4.7.0-alpha1","auth-4.7.0-alpha1","auth-4.6.0-beta1","dnsdist-1.8.0-alpha0","dnsdist-1.7.0-beta2","rec-4.6.0-beta2","dnsdist-1.7.0-beta1","rec-4.6.0-beta1","rec-4.6.0-alpha2","dnsdist-1.7.0-alpha2","auth-4.6.0-alpha1","rec-4.6.0-alpha1","dnsdist-1.7.0-alpha1","auth-4.5.0-beta1","auth-4.6.0-alpha0","dnsdist-1.6.0","auth-4.5.0-alpha1","dnsdist-1.7.0-alpha0","dnsdist-1.6.0-rc2","dnsdist-1.6.0-rc1","rec-4.6.0-alpha0","dnsdist-1.6.0-alpha3","rec-4.5.0-beta1","rec-4.5.0-alpha3","rec-4.5.0-alpha2","dnsdist-1.6.0-alpha2","dnsdist-1.6.0-alpha1","rec-4.5.0-alpha1","auth-4.5.0-alpha0","auth-4.4.0-beta1","dnsdist-1.6.0-alpha0","auth-4.4.0-alpha3","auth-4.4.0-alpha2","auth-4.4.0-alpha1","dnsdist-1.5.0","rec-4.5.0-alpha0","rec-4.4.0-beta1","rec-4.4.0-alpha2","dnsdist-1.5.0-rc4","dnsdist-1.5.0-rc3","dnsdist-1.5.0-rc2","rec-4.4.0-alpha1","dnsdist-1.5.0-rc1","dnsdist-1.5.0-alpha1","auth-4.3.0-beta2","rec-4.4.0-alpha0","auth-4.4.0-alpha0","auth-4.3.0-beta1","rec-4.3.0-beta1","auth-4.3.0-alpha1","dnsdist-1.4.0","dnsdist-1.4.0-rc5","rec-4.3.0-alpha3","rec-4.3.0-alpha2","dnsdist-1.4.0-rc4","dnsdist-1.4.0-rc3","rec-4.3.0-alpha1","dnsdist-1.4.0-rc2","dnsdist-1.4.0-rc1","auth-4.2.0-rc2","dnsdist-1.4.0-beta1","rec-4.2.0-rc1","rec-4.2.0-beta1","dnsdist-1.4.0-alpha2","dnsdist-1.4.0-alpha1","auth-4.2.0-rc1","dnsdist-1.3.3","auth-4.2.0-beta1","rec-4.2.0-alpha1","auth-4.2.0-alpha1","dnsdist-1.3.2","dnsdist-1.3.1","dnsdist-1.3.0","dnsdist-1.2.0","auth-4.1.0","rec-4.1.0","rec-4.1.0-rc3","auth-4.1.0-rc3","auth-4.1.0-rc2","rec-4.1.0-rc2","rec-4.1.0-rc1","auth-4.1.0-rc1","rec-4.1.0-alpha1","dnsdist-1.1.0","dnsdist-1.1.0-beta2","dnsdist-1.1.0-beta1","rec-4.0.2","rec-4.0.1","auth-4.0.1","rec-4.0.0","auth-4.0.0","auth-4.0.0-rc1","auth-4.0.0-rc2","rec-4.0.0-rc1","rec-4.0.0-beta1","auth-4.0.0-beta1","auth-4.0.0-alpha3","rec-4.0.0-alpha3","dnsdist-1.0.0","dnsdist-1.0.0-beta1","rec-4.0.0-alpha2","auth-4.0.0-alpha2","dnsdist-1.0.0-alpha2","auth-4.0.0-alpha1","rec-4.0.0-alpha1","dnsdist-1.0.0-alpha1","auth-3.4.0","auth-3.4.0-rc2","rec-3.6.0","auth-3.4.0-rc1","rec-3.5","rec-3.5-rc5","rec-3.5-rc4","rec-3.5-rc3","rec-3.5-rc1","auth-3.2-rc4","auth-3.2-rc3","auth-3.2-rc2","auth-3.2-rc1","auth-3.1-rc3","auth-3.1-rc2","auth-3.1-rc1","rec-3.3.1","rec-3.1.4","rec-3.0.1","rec-3-0-1","rec-3.0","rec-3-0"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-22617.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}