CVE-2025-30194

When DNSdist is configured to provide DoH via the nghttp2 provider, an attacker can cause a denial of service by crafting a DoH exchange that triggers an illegal memory access (double-free) and crash of DNSdist, causing a denial of service. The remedy is: upgrade to the patched 1.9.9 version. A workaround is to temporarily switch to the h2o provider until DNSdist has been upgraded to a fixed version. We would like to thank Charles Howes for bringing this issue to our attention.
Configurations

No configuration.

History

29 Apr 2025, 14:15

Type Values Removed Values Added
References
  • () http://www.openwall.com/lists/oss-security/2025/04/29/1 -

29 Apr 2025, 12:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-04-29 12:15

Updated : 2025-04-29 14:15


NVD link : CVE-2025-30194

Mitre link : CVE-2025-30194

CVE.ORG link : CVE-2025-30194


JSON object : View

Products Affected

No product.

CWE
CWE-416

Use After Free