Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-6233-1 | pdns security update |
Fri, 24 Apr 2026 19:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:powerdns:authoritative:*:*:*:*:*:*:*:* |
Wed, 22 Apr 2026 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Powerdns
Powerdns authoritative |
|
| Vendors & Products |
Powerdns
Powerdns authoritative |
Wed, 22 Apr 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-400 | |
| Metrics |
ssvc
|
Wed, 22 Apr 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A rogue primary server may cause file descriptor exhaustion and eventually a denial of service, when a PowerDNS secondary server forwards a DNS update request to it. | |
| Title | Possible file descriptor exhaustion in forward-dnsupdate | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: OX
Published:
Updated: 2026-04-22T14:26:32.724Z
Reserved: 2026-03-23T12:58:38.267Z
Link: CVE-2026-33610
Updated: 2026-04-22T14:25:17.230Z
Status : Analyzed
Published: 2026-04-22T14:16:54.887
Modified: 2026-04-24T18:53:08.563
Link: CVE-2026-33610
No data.
OpenCVE Enrichment
Updated: 2026-04-27T18:45:11Z
Debian DSA