We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
Assigner | redhat |
Reserved | 2024-09-04 |
Published | 2024-09-04 |
Updated | 2024-09-05 |
A flaw was found in Aardvark-dns versions 1.12.0 and 1.12.1. They contain a denial of service vulnerability due to serial processing of TCP DNS queries. This flaw allows a malicious client to keep a TCP connection open indefinitely, causing other DNS queries to time out and resulting in a denial of service for all other containers using aardvark-dns.
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
Uncontrolled Resource Consumption
2024-09-03: | Reported to Red Hat. |
2024-09-04: | Made public. |
https://access.redhat.com/security/cve/CVE-2024-8418
https://bugzilla.redhat.com/show_bug.cgi?id=2309683 (RHBZ#2309683)
https://github.com/containers/aardvark-dns/issues/500
https://github.com/containers/aardvark-dns/pull/503