Описание
Security update for dnsdist
This update for dnsdist fixes the following issues:
Update to version 1.9.10.
- CVE-2025-30194: illegal memory access (double-free) when processing specially crafted DoH exchanges leads to a denial-of-service (bsc#1242028).
- CVE-2025-30193: stack exhaustion when processing too many queries on incoming TCP connections leads to a denial-of-service (bsc#1243378).
Список пакетов
SUSE Linux Enterprise Module for Basesystem 15 SP7
Ссылки
- Link for SUSE-SU-2025:01743-1
- E-Mail link for SUSE-SU-2025:01743-1
- SUSE Security Ratings
- SUSE Bug 1242028
- SUSE Bug 1243378
- SUSE CVE CVE-2025-30193 page
- SUSE CVE CVE-2025-30194 page
Описание
In some circumstances, when DNSdist is configured to allow an unlimited number of queries on a single, incoming TCP connection from a client, an attacker can cause a denial of service by crafting a TCP exchange that triggers an exhaustion of the stack and a crash of DNSdist, causing a denial of service. The remedy is: upgrade to the patched 1.9.10 version. A workaround is to restrict the maximum number of queries on incoming TCP connections to a safe value, like 50, via the setMaxTCPQueriesPerConnection setting. We would like to thank Renaud Allard for bringing this issue to our attention.
Затронутые продукты
Ссылки
- CVE-2025-30193
- SUSE Bug 1243378
Описание
When DNSdist is configured to provide DoH via the nghttp2 provider, an attacker can cause a denial of service by crafting a DoH exchange that triggers an illegal memory access (double-free) and crash of DNSdist, causing a denial of service. The remedy is: upgrade to the patched 1.9.9 version. A workaround is to temporarily switch to the h2o provider until DNSdist has been upgraded to a fixed version. We would like to thank Charles Howes for bringing this issue to our attention.
Затронутые продукты
Ссылки
- CVE-2025-30194
- SUSE Bug 1242028