Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-6235-1 | dnsdist security update |
Fri, 24 Apr 2026 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:powerdns:dnsdist:*:*:*:*:*:*:*:* |
Wed, 22 Apr 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Powerdns
Powerdns dnsdist |
|
| Vendors & Products |
Powerdns
Powerdns dnsdist |
Wed, 22 Apr 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-770 | |
| Metrics |
ssvc
|
Wed, 22 Apr 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A client can trigger excessive memory allocation by generating a lot of queries that are routed to an overloaded DoH backend, causing queries to accumulate into a buffer that will not be released until the end of the connection. | |
| Title | Outgoing DoH excessive memory allocation | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: OX
Published:
Updated: 2026-04-22T14:36:48.875Z
Reserved: 2026-03-23T12:57:56.814Z
Link: CVE-2026-33594
Updated: 2026-04-22T14:36:40.603Z
Status : Analyzed
Published: 2026-04-22T14:16:53.837
Modified: 2026-04-24T16:48:39.007
Link: CVE-2026-33594
No data.
OpenCVE Enrichment
Updated: 2026-04-27T19:30:12Z
Debian DSA