Source: aardvark-dns Version: 1.12.1-2 Severity: grave Tags: security upstream Forwarded: https://github.com/containers/aardvark-dns/issues/500 X-Debbugs-Cc: car...@debian.org, Debian Security Team <t...@security.debian.org>
Hi, The following vulnerability was published for aardvark-dns. CVE-2024-8418[0]: | A flaw was found in Aardvark-dns versions 1.12.0 and 1.12.1. They | contain a denial of service vulnerability due to serial processing | of TCP DNS queries. This flaw allows a malicious client to keep a | TCP connection open indefinitely, causing other DNS queries to time | out and resulting in a denial of service for all other containers | using aardvark-dns. If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2024-8418 https://www.cve.org/CVERecord?id=CVE-2024-8418 [1] https://github.com/containers/aardvark-dns/issues/500 [2] https://github.com/containers/aardvark-dns/pull/503 Please adjust the affected versions in the BTS as needed. Regards, Salvatore