CVE-2026-24030
EUVD-2026-1740531.03.2026, 12:16
An attacker might be able to trick DNSdist into allocating too much memory while processing DNS over QUIC or DNS over HTTP/3 payloads, resulting in a denial of service. In setups with a large quantity of memory available this usually results in an exception and the QUIC connection is properly closed, but in some cases the system might enter an out-of-memory state instead and terminate the process.Enginsight
Affected Products (NVD)
| Vendor | Product | Version |
|---|---|---|
| powerdns | dnsdist | 1.9.0 ≤ 𝑥 < 1.9.12 |
| powerdns | dnsdist | 2.0.0 ≤ 𝑥 < 2.0.3 |
𝑥
= Vulnerable software versions
Debian Releases
Common Weakness Enumeration