NIXPKGS-2026-1232
GitHub issue
published on
Permalink
CVE-2026-33262
5.9 MEDIUM
- CVSS version: 3.1
- Attack vector (AV): NETWORK
- Attack complexity (AC): HIGH
- Privileges required (PR): NONE
- User interaction (UI): NONE
- Scope (S): UNCHANGED
- Confidentiality impact (C): NONE
- Integrity impact (I): NONE
- Availability impact (A): HIGH
by @LeSuisse Activity log
- Created suggestion
- @LeSuisse ignored package rotp
- @LeSuisse accepted
- @LeSuisse published on GitHub
Insufficient validation of cookie reply
An attacker can send replies that result in a null pointer dereference, caused by a missing consistency check and leading to a denial of service. Cookies are disabled by default.
Affected products
pdns-recursor
- <5.3.6
- <5.4.1
- <5.2.9
Matching in nixpkgs
Package maintainers
-
@rnhmjoj Michele Guerini Rocco <rnhmjoj@inventati.org>