An attacker might be able to trick DNSdist into...
Moderate severity
Unreviewed
Published
Mar 31, 2026
to the GitHub Advisory Database
•
Updated Mar 31, 2026
Description
Published by the National Vulnerability Database
Mar 31, 2026
Published to the GitHub Advisory Database
Mar 31, 2026
Last updated
Mar 31, 2026
An attacker might be able to trick DNSdist into allocating too much memory while processing DNS over QUIC or DNS over HTTP/3 payloads, resulting in a denial of service. In setups with a large quantity of memory available this usually results in an exception and the QUIC connection is properly closed, but in some cases the system might enter an out-of-memory state instead and terminate the process.
References