Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-6235-1 | dnsdist security update |
Fri, 24 Apr 2026 19:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:powerdns:dnsdist:*:*:*:*:*:*:*:* |
Wed, 22 Apr 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Powerdns
Powerdns dnsdist |
|
| Vendors & Products |
Powerdns
Powerdns dnsdist |
Wed, 22 Apr 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-770 | |
| Metrics |
ssvc
|
Wed, 22 Apr 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A client can trigger excessive memory allocation by generating a lot of errors responses over a single DoQ and DoH3 connection, as some resources were not properly released until the end of the connection. | |
| Title | DoQ/DoH3 excessive memory allocation | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: OX
Published:
Updated: 2026-04-22T14:40:28.647Z
Reserved: 2026-03-23T12:57:56.814Z
Link: CVE-2026-33595
Updated: 2026-04-22T14:40:15.272Z
Status : Analyzed
Published: 2026-04-22T14:16:53.950
Modified: 2026-04-24T18:49:49.557
Link: CVE-2026-33595
No data.
OpenCVE Enrichment
Updated: 2026-04-27T19:30:12Z
Debian DSA