Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2026-24028

Опубликовано: 31 мар. 2026
Источник: debian
EPSS Низкий

Описание

An attacker might be able to trigger an out-of-bounds read by sending a crafted DNS response packet, when custom Lua code uses newDNSPacketOverlay to parse DNS packets. The out-of-bounds read might trigger a crash, leading to a denial of service, or access unrelated memory, leading to potential information disclosure.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
dnsdistfixed2.0.3-1package
dnsdistend-of-lifebookwormpackage
dnsdistend-of-lifebullseyepackage

Примечания

  • https://www.dnsdist.org/security-advisories/powerdns-advisory-for-dnsdist-2026-02.html

  • https://downloads.powerdns.com/patches/2026-02/

EPSS

Процентиль: 2%
0.00012
Низкий

Связанные уязвимости

CVSS3: 5.3
ubuntu
1 день назад

[Unknown description]

CVSS3: 5.3
nvd
2 дня назад

An attacker might be able to trigger an out-of-bounds read by sending a crafted DNS response packet, when custom Lua code uses newDNSPacketOverlay to parse DNS packets. The out-of-bounds read might trigger a crash, leading to a denial of service, or access unrelated memory, leading to potential information disclosure.

CVSS3: 5.3
github
2 дня назад

An attacker might be able to trigger an out-of-bounds read by sending a crafted DNS response packet, when custom Lua code uses newDNSPacketOverlay to parse DNS packets. The out-of-bounds read might trigger a crash, leading to a denial of service, or access unrelated memory, leading to potential information disclosure.

EPSS

Процентиль: 2%
0.00012
Низкий