From: Remi Gacogne Date: Tue, 29 Apr 2025 11:06:11 +0000 (+0200) Subject: dnsdist: Fix syntax of advisory 2025-02 X-Git-Tag: dnsdist-2.0.0-alpha2~42^2 X-Git-Url: http://git.ipfire.org/?a=commitdiff_plain;h=refs%2Fpull%2F15489%2Fhead;p=thirdparty%2Fpdns.git dnsdist: Fix syntax of advisory 2025-02 --- diff --git a/pdns/dnsdistdist/docs/security-advisories/powerdns-advisory-for-dnsdist-2025-02.rst b/pdns/dnsdistdist/docs/security-advisories/powerdns-advisory-for-dnsdist-2025-02.rst index 13a8f5c996..bac17c3c15 100644 --- a/pdns/dnsdistdist/docs/security-advisories/powerdns-advisory-for-dnsdist-2025-02.rst +++ b/pdns/dnsdistdist/docs/security-advisories/powerdns-advisory-for-dnsdist-2025-02.rst @@ -1,24 +1,25 @@ PowerDNS Security Advisory 2025-02 for DNSdist: Denial of service via crafted DoH exchange +========================================================================================== -CVE: CVE-2025-30194 -Date: 2025-04-29T12:00:00+02:00 -Discovery date: 2025-04-25T21:55:00+02:00 -Affects: PowerDNS DNSdist from 1.9.0 up to 1.9.8 -Not affected: PowerDNS DNSdist 1.9.9 and versions before 1.9.0 -Severity: High -Impact: Denial of service -Exploit: This problem can be triggered by an attacker crafting a DoH exchange -Risk of system compromise: None -Solution: Upgrade to patched version or temporarily switch to the h2o provider -CWE: CWE-416 -CVSS: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H -Last affected: 1.9.8 -First fixed: 1.9.9 -Internal ID: 297 +- CVE: CVE-2025-30194 +- Date: 2025-04-29T12:00:00+02:00 +- Discovery date: 2025-04-25T21:55:00+02:00 +- Affects: PowerDNS DNSdist from 1.9.0 up to 1.9.8 +- Not affected: PowerDNS DNSdist 1.9.9 and versions before 1.9.0 +- Severity: High +- Impact: Denial of service +- Exploit: This problem can be triggered by an attacker crafting a DoH exchange +- Risk of system compromise: None +- Solution: Upgrade to patched version or temporarily switch to the h2o provider +- CWE: CWE-416 +- CVSS: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H +- Last affected: 1.9.8 +- First fixed: 1.9.9 +- Internal ID: 297 When DNSdist is configured to provide DoH via the nghttp2 provider, an attacker can cause a denial of service by crafting a DoH exchange that triggers an illegal memory access (double-free) and crash of DNSdist, causing a denial of service. -CVSS Score: 7.5, see https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&version=3.1 +`CVSS Score: 7.5 `__, only for configurations where incoming DoH is enabled via the nghttp2 provider. The remedy is: upgrade to the patched 1.9.9 version.