It's always DNS part ∞: tracking down a use-after-free bug in Envoy's DNS
pomerium.com·3d·
Discuss: Hacker News
📦Dependency Confusion
Preview
Report Post

TL;DR

We found a use-after-free bug in Envoy’s DNS resolver, c-ares (CVE-2025-62408, CVE-2025-67514).

Impact: Remote Denial of Service via process crash. In certain situations, an attacker could exploit a specific sequence of DNS responses to trigger a heap use-after-free and crash the application.

Affected: c-ares versions <= 1.34.5.


it always happens in prod, at the worst time

Earlier this year, one of our customers reported a fun one: their Pomerium deployment would crash about 10 seconds after startup, every time, under heavy load. Adding to the fun, this was during a rollout of a production workload onto a new, business-critical cluster. Of course.

Initial logs and stack traces were frustratingly sparse, pointing only to a generic segfau…

Similar Posts

Loading similar posts...