A flaw was found in Aardvark-dns versions 1.12.0 and 1.12.1. They contain a denial of service vulnerability due to serial processing of TCP DNS queries. This flaw allows a malicious client to keep a TCP connection open indefinitely, causing other DNS queries to time out and resulting in a denial of service for all other containers using aardvark-dns.
{
"github_reviewed": true,
"cwe_ids": [
"CWE-400"
],
"github_reviewed_at": "2024-09-04T17:22:36Z",
"nvd_published_at": "2024-09-04T15:15:15Z",
"severity": "HIGH"
}