Source: dnsdist
X-Debbugs-CC: t...@security.debian.org
Severity: important
Tags: security

Hi,

The following vulnerability was published for dnsdist.

CVE-2024-25581[0]:
| When incoming DNS over HTTPS support is enabled using the nghttp2
| provider, and queries are routed to a tcp-only or DNS over TLS
| backend, an attacker can trigger an assertion failure in DNSdist by
| sending a request for a zone transfer (AXFR or IXFR) over DNS over
| HTTPS, causing the process to stop and thus leading to a Denial of
| Service. DNS over HTTPS is not enabled by default, and backends are
| using plain DNS (Do53) by default.

https://dnsdist.org/security-advisories/powerdns-advisory-for-dnsdist-2024-03.html
Patches: https://downloads.powerdns.com/patches/2024-03/


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2024-25581
    https://www.cve.org/CVERecord?id=CVE-2024-25581

Please adjust the affected versions in the BTS as needed.

Reply via email to