Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-6235-1 | dnsdist security update |
Mon, 27 Apr 2026 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:powerdns:dnsdist:*:*:*:*:*:*:*:* |
Wed, 22 Apr 2026 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Powerdns
Powerdns dnsdist |
|
| Vendors & Products |
Powerdns
Powerdns dnsdist |
Wed, 22 Apr 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-770 | |
| Metrics |
ssvc
|
Wed, 22 Apr 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An attacker can create a large number of concurrent DoQ or DoH3 connections, causing unlimited memory allocation in DNSdist and leading to a denial of service. DOQ and DoH3 are disabled by default. | |
| Title | Resource exhaustion via DoQ/DoH3 connections | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: OX
Published:
Updated: 2026-04-22T14:51:51.130Z
Reserved: 2026-03-18T10:06:16.572Z
Link: CVE-2026-33254
Updated: 2026-04-22T14:50:08.743Z
Status : Analyzed
Published: 2026-04-22T14:16:53.520
Modified: 2026-04-27T16:58:36.563
Link: CVE-2026-33254
No data.
OpenCVE Enrichment
Updated: 2026-04-22T19:30:24Z
Debian DSA