Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2025-30187

Опубликовано: 18 сент. 2025
Источник: debian

Описание

In some circumstances, when DNSdist is configured to use the nghttp2 library to process incoming DNS over HTTPS queries, an attacker might be able to cause a denial of service by crafting a DoH exchange that triggers an unbounded I/O read loop, causing an unexpected consumption of CPU resources.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
dnsdistfixed2.0.1-1package
dnsdistfixed1.9.10-1+deb13u1trixiepackage
dnsdistnot-affectedbookwormpackage
dnsdistnot-affectedbullseyepackage

Примечания

  • https://www.openwall.com/lists/oss-security/2025/09/18/1

  • https://www.dnsdist.org/security-advisories/powerdns-advisory-for-dnsdist-2025-05.html

  • Patches: https://downloads.powerdns.com/patches/2025-05/

Связанные уязвимости

CVSS3: 3.7
ubuntu
5 месяцев назад

In some circumstances, when DNSdist is configured to use the nghttp2 library to process incoming DNS over HTTPS queries, an attacker might be able to cause a denial of service by crafting a DoH exchange that triggers an unbounded I/O read loop, causing an unexpected consumption of CPU resources.

CVSS3: 3.7
nvd
5 месяцев назад

In some circumstances, when DNSdist is configured to use the nghttp2 library to process incoming DNS over HTTPS queries, an attacker might be able to cause a denial of service by crafting a DoH exchange that triggers an unbounded I/O read loop, causing an unexpected consumption of CPU resources.

CVSS3: 3.7
github
5 месяцев назад

In some circumstances, when DNSdist is configured to use the nghttp2 library to process incoming DNS over HTTPS queries, an attacker might be able to cause a denial of service by crafting a DoH exchange that triggers an unbounded I/O read loop, causing an unexpected consumption of CPU resources.