Bug 2309683 (CVE-2024-8418)

Summary: CVE-2024-8418 containers/aardvark-dns: TCP Query Handling Flaw in Aardvark-dns Leading to Denial of Service
Product: [Other] Security Response Reporter: OSIDB Bzimport <bzimport>
Component: vulnerabilityAssignee: Product Security DevOps Team <prodsec-dev>
Status: NEW --- QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedKeywords: Security
Target Milestone: ---   
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: ---
Doc Text:
A flaw was found in Aardvark-dns, which is vulnerable to a Denial of Service attack due to the serial processing of TCP DNS queries. An attacker can exploit this flaw by keeping a TCP connection open indefinitely, causing the server to become unresponsive and resulting in other DNS queries timing out. This issue prevents legitimate users from accessing DNS services, thereby disrupting normal operations and causing service downtime.
Story Points: ---
Clone Of: Environment:
Last Closed: Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2309686, 2309687    
Bug Blocks:    

Description OSIDB Bzimport 2024-09-04 10:57:43 UTC
The affected versions (1.12.0 and 1.12.1) of aardvark-dns introduced TCP support but processed DNS queries serially. This flaw can be exploited by a malicious client to maintain an open TCP connection indefinitely, resulting in a denial of service for other DNS queries.