CVE-2026-35406

NameCVE-2026-35406
DescriptionAardvark-dns is an authoritative dns server for A/AAAA container records. From 1.16.0 to 1.17.0, a truncated TCP DNS query followed by a connection reset causes aardvark-dns to enter an unrecoverable infinite error loop at 100% CPU. This vulnerability is fixed in 1.17.1.
SourceCVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
aardvark-dns (PTS)bookworm1.4.0-3vulnerable
trixie1.14.0-3vulnerable
forky1.16.0-2vulnerable
sid1.16.0-3fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
aardvark-dnssource(unstable)1.16.0-3

Notes

https://github.com/containers/aardvark-dns/security/advisories/GHSA-hfpq-x728-986j
Fixed by: https://github.com/containers/aardvark-dns/commit/3b49ea7b38bdea134b7f03256f2e13f44ce73bb1 (main)
Fixed by: https://github.com/containers/aardvark-dns/commit/b66c50e88ead4416ae3cd86044e5905cb33f2d4b (v1.17.1)

Search for package or bug name: Reporting problems