{"id":"CVE-2025-30187","details":"In some circumstances, when DNSdist is configured to use the nghttp2 library to process incoming DNS over HTTPS queries, an attacker might be able to cause a denial of service by crafting a DoH exchange that triggers an unbounded I/O read loop, causing an unexpected consumption of CPU resources.","modified":"2026-03-16T03:08:39.718444Z","published":"2025-09-18T10:15:32Z","related":["SUSE-SU-2026:0888-1"],"references":[{"type":"ADVISORY","url":"https://www.dnsdist.org/security-advisories/powerdns-advisory-for-dnsdist-2025-05.html"}],"schema_version":"1.7.5"}