First published: Wed Sep 04 2024(Updated: )
A flaw was found in Aardvark-dns versions 1.12.0 and 1.12.1. They contain a denial of service vulnerability due to serial processing of TCP DNS queries. This flaw allows a malicious client to keep a TCP connection open indefinitely, causing other DNS queries to time out and resulting in a denial of service for all other containers using aardvark-dns.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
rust/aardvark-dns | >=1.12.0<1.12.2 | 1.12.2 |
Containers Aardvark-dns | =1.12.0 | |
Containers Aardvark-dns | =1.12.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-8418 has a severity rating that indicates a moderate risk primarily due to its denial of service nature.
To fix CVE-2024-8418, you should upgrade Aardvark-dns to version 1.12.2 or later.
Aardvark-dns versions 1.12.0 and 1.12.1 are affected by CVE-2024-8418.
CVE-2024-8418 is categorized as a denial of service vulnerability.
Yes, CVE-2024-8418 can lead to service interruptions by causing other DNS queries to time out.