Source: dnsdist Version: 1.9.10-1 Severity: important Tags: security upstream X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]> Control: found -1 2.0.0-6
Hi, The following vulnerability was published for dnsdist. CVE-2025-30187[0]: | In some circumstances, when DNSdist is configured to use the nghttp2 | library to process incoming DNS over HTTPS queries, an attacker | might be able to cause a denial of service by crafting a DoH | exchange that triggers an unbounded I/O read loop, causing an | unexpected consumption of CPU resources. If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2025-30187 https://www.cve.org/CVERecord?id=CVE-2025-30187 [1] https://www.dnsdist.org/security-advisories/powerdns-advisory-for-dnsdist-2025-05.html [2] https://www.openwall.com/lists/oss-security/2025/09/18/1 Regards, Salvatore

