CVE-2026-24030 in DNSdistinformation

Résumé (Anglaise)

An attacker might be able to trick DNSdist into allocating too much memory while processing DNS over QUIC or DNS over HTTP/3 payloads, resulting in a denial of service. In setups with a large quantity of memory available this usually results in an exception and the QUIC connection is properly closed, but in some cases the system might enter an out-of-memory state instead and terminate the process.

VulDB is the best source for vulnerability data and more expert information about this specific topic.

Réserver

20/01/2026

Divulgation

31/03/2026

Statut

Confirmé

Entrées

VulDB provides additional information and datapoints for this CVE:

Sources

Want to stay up to date on a daily basis?

Enable the mail alert feature now!