Bug 2456280 (CVE-2026-35406) - CVE-2026-35406 aardvark-dns: Aardvark-dns: Denial of Service via truncated TCP DNS query and connection reset
Summary: CVE-2026-35406 aardvark-dns: Aardvark-dns: Denial of Service via truncated TC...
Keywords:
Status: NEW
Alias: CVE-2026-35406
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 2456391
Blocks:
TreeView+ depends on / blocked
 
Reported: 2026-04-07 22:01 UTC by OSIDB Bzimport
Modified: 2026-04-09 12:39 UTC (History)
0 users

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2026-04-07 22:01:47 UTC
Aardvark-dns is an authoritative dns server for A/AAAA container records. From 1.16.0 to 1.17.0, a truncated TCP DNS query followed by a connection reset causes aardvark-dns to enter an unrecoverable infinite error loop at 100% CPU. This vulnerability is fixed in 1.17.1.


Note You need to log in before you can comment on or make changes to this bug.