Loading HuntDB...

GHSA-55g9-rgmx-hvww

GitHub Security Advisory

⚠ Unreviewed HIGH Has CVE

Advisory Details

When incoming DNS over HTTPS support is enabled using the nghttp2 provider, and queries are routed to a tcp-only or DNS over TLS backend, an attacker can trigger an assertion failure in DNSdist by sending a request for a zone transfer (AXFR or IXFR) over DNS over HTTPS, causing the process to stop and thus leading to a Denial of Service. DNS over HTTPS is not enabled by default, and backends are using plain DNS (Do53) by default.

Related CVEs

Key Information

GHSA ID
GHSA-55g9-rgmx-hvww
Published
May 14, 2024 3:32 PM
Last Modified
February 13, 2025 6:32 PM
CVSS Score
7.5 /10
Primary Ecosystem
Unknown
Primary Package
Unknown
GitHub Reviewed
✗ No

Dataset

Last updated: September 15, 2025 6:32 AM

Data from GitHub Advisory Database. This information is provided for research and educational purposes.