An attacker might be able to trick DNSdist into allocating too much memory while processing DNS over QUIC or DNS over HTTP/3 payloads, resulting in a denial of service. In setups with a large quantity of memory available this usually results in an exception and the QUIC connection is properly closed, but in some cases the system might enter an out-of-memory state instead and terminate the process.
References
Configurations
No configuration.
History
31 Mar 2026, 14:16
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | CWE-789 |
31 Mar 2026, 12:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-31 12:16
Updated : 2026-04-01 14:24
NVD link : CVE-2026-24030
Mitre link : CVE-2026-24030
CVE.ORG link : CVE-2026-24030
JSON object : View
Products Affected
No product.
CWE
CWE-789
Memory Allocation with Excessive Size Value
