Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2026-24030

Опубликовано: 31 мар. 2026
Источник: debian
EPSS Низкий

Описание

An attacker might be able to trick DNSdist into allocating too much memory while processing DNS over QUIC or DNS over HTTP/3 payloads, resulting in a denial of service. In setups with a large quantity of memory available this usually results in an exception and the QUIC connection is properly closed, but in some cases the system might enter an out-of-memory state instead and terminate the process.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
dnsdistfixed2.0.3-1package
dnsdistend-of-lifebookwormpackage
dnsdistend-of-lifebullseyepackage

Примечания

  • https://www.dnsdist.org/security-advisories/powerdns-advisory-for-dnsdist-2026-02.html

  • https://downloads.powerdns.com/patches/2026-02/

EPSS

Процентиль: 2%
0.00012
Низкий

Связанные уязвимости

CVSS3: 5.3
ubuntu
1 день назад

[Unknown description]

CVSS3: 5.3
nvd
2 дня назад

An attacker might be able to trick DNSdist into allocating too much memory while processing DNS over QUIC or DNS over HTTP/3 payloads, resulting in a denial of service. In setups with a large quantity of memory available this usually results in an exception and the QUIC connection is properly closed, but in some cases the system might enter an out-of-memory state instead and terminate the process.

CVSS3: 5.3
github
2 дня назад

An attacker might be able to trick DNSdist into allocating too much memory while processing DNS over QUIC or DNS over HTTP/3 payloads, resulting in a denial of service. In setups with a large quantity of memory available this usually results in an exception and the QUIC connection is properly closed, but in some cases the system might enter an out-of-memory state instead and terminate the process.

EPSS

Процентиль: 2%
0.00012
Низкий