Source: aardvark-dns
Version: 1.12.1-2
Severity: grave
Tags: security upstream
Forwarded: https://github.com/containers/aardvark-dns/issues/500
X-Debbugs-Cc: car...@debian.org, Debian Security Team <t...@security.debian.org>

Hi,

The following vulnerability was published for aardvark-dns.

CVE-2024-8418[0]:
| A flaw was found in Aardvark-dns versions 1.12.0 and 1.12.1. They
| contain a denial of service vulnerability due to serial processing
| of TCP DNS queries. This flaw allows a malicious client to keep a
| TCP connection open indefinitely, causing other DNS queries to time
| out and resulting in a denial of service for all other containers
| using aardvark-dns.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2024-8418
    https://www.cve.org/CVERecord?id=CVE-2024-8418
[1] https://github.com/containers/aardvark-dns/issues/500
[2] https://github.com/containers/aardvark-dns/pull/503

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

Reply via email to