Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2025-30194

Опубликовано: 29 апр. 2025
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS3: 7.5

Описание

When DNSdist is configured to provide DoH via the nghttp2 provider, an attacker can cause a denial of service by crafting a DoH exchange that triggers an illegal memory access (double-free) and crash of DNSdist, causing a denial of service. The remedy is: upgrade to the patched 1.9.9 version. A workaround is to temporarily switch to the h2o provider until DNSdist has been upgraded to a fixed version. We would like to thank Charles Howes for bringing this issue to our attention.

РелизСтатусПримечание
devel

not-affected

1.9.10-1
esm-apps/bionic

needs-triage

esm-apps/focal

needs-triage

esm-apps/jammy

needs-triage

esm-apps/noble

needs-triage

esm-apps/xenial

needs-triage

focal

ignored

end of standard support, was needs-triage
jammy

needs-triage

noble

needs-triage

oracular

ignored

end of life, was needs-triage

Показывать по

EPSS

Процентиль: 30%
0.00114
Низкий

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
nvd
9 месяцев назад

When DNSdist is configured to provide DoH via the nghttp2 provider, an attacker can cause a denial of service by crafting a DoH exchange that triggers an illegal memory access (double-free) and crash of DNSdist, causing a denial of service. The remedy is: upgrade to the patched 1.9.9 version. A workaround is to temporarily switch to the h2o provider until DNSdist has been upgraded to a fixed version. We would like to thank Charles Howes for bringing this issue to our attention.

CVSS3: 7.5
debian
9 месяцев назад

When DNSdist is configured to provide DoH via the nghttp2 provider, an ...

CVSS3: 7.5
github
9 месяцев назад

When DNSdist is configured to provide DoH via the nghttp2 provider, an attacker can cause a denial of service by crafting a DoH exchange that triggers an illegal memory access (double-free) and crash of DNSdist, causing a denial of service. The remedy is: upgrade to the patched 1.9.9 version. A workaround is to temporarily switch to the h2o provider until DNSdist has been upgraded to a fixed version. We would like to thank Charles Howes for bringing this issue to our attention.

CVSS3: 7.5
fstec
9 месяцев назад

Уязвимость компонента nghttp2 Provider программного обеспечения PowerDNS DNSdist, позволяющая нарушителю вызвать отказ в обслуживании

suse-cvrf
8 месяцев назад

Security update for dnsdist

EPSS

Процентиль: 30%
0.00114
Низкий

7.5 High

CVSS3

Уязвимость CVE-2025-30194