CVE-2026-35406
Published: April 9, 2026Last modified: April 9, 2026
Description
Aardvark-dns is an authoritative dns server for A/AAAA container records. From 1.16.0 to 1.17.0, a truncated TCP DNS query followed by a connection reset causes aardvark-dns to enter an unrecoverable infinite error loop at 100% CPU. This vulnerability is fixed in 1.17.1.
Severity score breakdown
| Parameter | Value |
|---|---|
| Base score | 6.2 |
| Attack Vector | LOCAL |
| Attack complexity | LOW |
| Privileges required | NONE |
| User interaction | NONE |
| Scope | UNCHANGED |
| Confidentiality | NONE |
| Integrity impact | NONE |
| Availability impact | HIGH |
| Vector | CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
Notes
Alpaquita 23 LTS is not affected by this vulnerability, CVE-2026-35406 affects from 1.16.0 to 1.17.0: https://github.com/containers/aardvark-dns/security/advisories/GHSA-hfpq-x728-986j
Status
| Product | Release | Package | Status |
|---|---|---|---|
| Alpaquita Linux | 23 LTS | aardvark-dns | Not affected (1.3.0-r0) |
| 25 LTS | aardvark-dns | Fixed (1.16.0-r1) | |
| Stream | aardvark-dns | Fixed (1.16.0-r1) |