]> git.ipfire.org Git - thirdparty/pdns.git/commitdiff
dnsdist: Fix syntax of advisory 2025-02 15489/head
authorRemi Gacogne <remi.gacogne@powerdns.com>
Tue, 29 Apr 2025 11:06:11 +0000 (13:06 +0200)
committerRemi Gacogne <remi.gacogne@powerdns.com>
Tue, 29 Apr 2025 11:06:11 +0000 (13:06 +0200)
pdns/dnsdistdist/docs/security-advisories/powerdns-advisory-for-dnsdist-2025-02.rst

index 13a8f5c9967a998cb4660219fd857a6ec9728102..bac17c3c159aa2cc58e77047b57b2e7aaa26aa33 100644 (file)
@@ -1,24 +1,25 @@
 PowerDNS Security Advisory 2025-02 for DNSdist: Denial of service via crafted DoH exchange
+==========================================================================================
 
-CVE: CVE-2025-30194
-Date: 2025-04-29T12:00:00+02:00
-Discovery date: 2025-04-25T21:55:00+02:00
-Affects: PowerDNS DNSdist from 1.9.0 up to 1.9.8
-Not affected: PowerDNS DNSdist 1.9.9 and versions before 1.9.0
-Severity: High
-Impact: Denial of service
-Exploit: This problem can be triggered by an attacker crafting a DoH exchange
-Risk of system compromise: None
-Solution: Upgrade to patched version or temporarily switch to the h2o provider
-CWE: CWE-416
-CVSS: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
-Last affected: 1.9.8
-First fixed: 1.9.9
-Internal ID: 297
+CVE: CVE-2025-30194
+Date: 2025-04-29T12:00:00+02:00
+Discovery date: 2025-04-25T21:55:00+02:00
+Affects: PowerDNS DNSdist from 1.9.0 up to 1.9.8
+Not affected: PowerDNS DNSdist 1.9.9 and versions before 1.9.0
+Severity: High
+Impact: Denial of service
+Exploit: This problem can be triggered by an attacker crafting a DoH exchange
+Risk of system compromise: None
+Solution: Upgrade to patched version or temporarily switch to the h2o provider
+CWE: CWE-416
+CVSS: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
+Last affected: 1.9.8
+First fixed: 1.9.9
+Internal ID: 297
 
 When DNSdist is configured to provide DoH via the nghttp2 provider, an attacker can cause a denial of service by crafting a DoH exchange that triggers an illegal memory access (double-free) and crash of DNSdist, causing a denial of service.
 
-CVSS Score: 7.5, see https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&version=3.1
+`CVSS Score: 7.5 <https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&version=3.1>`__, only for configurations where incoming DoH is enabled via the nghttp2 provider.
 
 The remedy is: upgrade to the patched 1.9.9 version.