Debian Package Tracker
Register | Log in
Subscribe

aardvark-dns

Container-focused DNS server

Choose email to subscribe with

general
  • source: aardvark-dns (main)
  • version: 1.16.0-3
  • maintainer: Reinhard Tartler (DMD) (LowNMU)
  • arch: any
  • std-ver: 4.7.2
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • oldstable: 1.4.0-3
  • stable: 1.14.0-3
  • testing: 1.16.0-2
  • unstable: 1.16.0-3
versioned links
  • 1.4.0-3: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1.14.0-3: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1.16.0-2: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1.16.0-3: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • aardvark-dns
action needed
A new upstream version is available: 1.17.1 high
A new upstream version 1.17.1 is available, you should consider packaging it.
Created: 2025-11-27 Last update: 2026-04-11 09:30
1 security issue in trixie high

There is 1 open security issue in trixie.

1 important issue:
  • CVE-2026-35406: Aardvark-dns is an authoritative dns server for A/AAAA container records. From 1.16.0 to 1.17.0, a truncated TCP DNS query followed by a connection reset causes aardvark-dns to enter an unrecoverable infinite error loop at 100% CPU. This vulnerability is fixed in 1.17.1.
Created: 2026-04-09 Last update: 2026-04-09 08:00
1 security issue in forky high

There is 1 open security issue in forky.

1 important issue:
  • CVE-2026-35406: Aardvark-dns is an authoritative dns server for A/AAAA container records. From 1.16.0 to 1.17.0, a truncated TCP DNS query followed by a connection reset causes aardvark-dns to enter an unrecoverable infinite error loop at 100% CPU. This vulnerability is fixed in 1.17.1.
Created: 2026-04-09 Last update: 2026-04-09 08:00
1 security issue in bookworm high

There is 1 open security issue in bookworm.

1 important issue:
  • CVE-2026-35406: Aardvark-dns is an authoritative dns server for A/AAAA container records. From 1.16.0 to 1.17.0, a truncated TCP DNS query followed by a connection reset causes aardvark-dns to enter an unrecoverable infinite error loop at 100% CPU. This vulnerability is fixed in 1.17.1.
Created: 2026-04-09 Last update: 2026-04-09 08:00
debian/patches: 4 patches to forward upstream low

Among the 4 debian patches available in version 1.16.0-3 of the package, we noticed the following issues:

  • 4 patches where the metadata indicates that the patch has not yet been forwarded upstream. You should either forward the patch upstream or update the metadata to document its real status.
Created: 2023-02-26 Last update: 2026-04-09 10:34
Standards version of the package is outdated. wishlist
The package should be updated to follow the last version of Debian Policy (Standards-Version 4.7.4 instead of 4.7.2).
Created: 2025-12-23 Last update: 2026-04-09 04:30
testing migrations
  • excuses:
    • Migration status for aardvark-dns (1.16.0-2 to 1.16.0-3): Waiting for test results or another package, or too young (no action required now - check later)
    • Issues preventing migration:
    • ∙ ∙ Autopkgtest for aardvark-dns/1.16.0-3: amd64: Pass, arm64: No tests, superficial or marked flaky ♻, i386: No tests, superficial or marked flaky ♻, ppc64el: No tests, superficial or marked flaky ♻, riscv64: Test triggered, s390x: No tests, superficial or marked flaky ♻
    • ∙ ∙ Autopkgtest for netavark/1.16.1-3.1: amd64: Pass, arm64: No tests, superficial or marked flaky ♻, i386: No tests, superficial or marked flaky ♻ (reference ♻), ppc64el: No tests, superficial or marked flaky ♻, riscv64: Test triggered, s390x: No tests, superficial or marked flaky ♻
    • ∙ ∙ Autopkgtest for podman/5.8.1+ds1-2: amd64: Pass, arm64: Pass, i386: Pass, ppc64el: Pass, riscv64: Test triggered, s390x: Pass
    • ∙ ∙ Too young, only 2 of 5 days old
    • Additional info (not blocking):
    • ∙ ∙ Piuparts tested OK - https://piuparts.debian.org/sid/source/a/aardvark-dns.html
    • ∙ ∙ Reproduced on amd64
    • ∙ ∙ Reproduced on arm64
    • ∙ ∙ Reproduced on armhf
    • ∙ ∙ Reproduced on i386
    • ∙ ∙ Reproduced on ppc64el
    • Not considered
news
[rss feed]
  • [2026-04-08] Accepted aardvark-dns 1.16.0-3 (source) into unstable (Reinhard Tartler)
  • [2025-10-23] aardvark-dns 1.16.0-2 MIGRATED to testing (Debian testing watch)
  • [2025-10-18] Accepted aardvark-dns 1.16.0-2 (source) into unstable (Reinhard Tartler)
  • [2025-09-07] aardvark-dns 1.16.0-1 MIGRATED to testing (Debian testing watch)
  • [2025-09-02] Accepted aardvark-dns 1.16.0-1 (source) into unstable (Reinhard Tartler)
  • [2025-03-26] aardvark-dns 1.14.0-3 MIGRATED to testing (Debian testing watch)
  • [2025-03-21] Accepted aardvark-dns 1.14.0-3 (source) into unstable (Reinhard Tartler)
  • [2025-03-16] Accepted aardvark-dns 1.14.0-2 (source) into unstable (Reinhard Tartler)
  • [2025-03-16] Accepted aardvark-dns 1.14.0-1 (source) into experimental (Reinhard Tartler)
  • [2024-11-28] aardvark-dns 1.12.2-2 MIGRATED to testing (Debian testing watch)
  • [2024-11-22] Accepted aardvark-dns 1.12.2-2 (source) into unstable (Reinhard Tartler)
  • [2024-09-11] aardvark-dns 1.12.2-1 MIGRATED to testing (Debian testing watch)
  • [2024-09-06] Accepted aardvark-dns 1.12.2-1 (source) into unstable (Reinhard Tartler)
  • [2024-09-02] Accepted aardvark-dns 1.12.1-2 (source) into unstable (Reinhard Tartler)
  • [2024-08-31] Accepted aardvark-dns 1.12.1-1 (source) into experimental (Reinhard Tartler)
  • [2024-08-13] aardvark-dns 1.9.0-2 MIGRATED to testing (Debian testing watch)
  • [2024-08-08] Accepted aardvark-dns 1.9.0-2 (source) into unstable (Reinhard Tartler)
  • [2024-08-08] aardvark-dns 1.6.0-3 MIGRATED to testing (Debian testing watch)
  • [2024-07-15] Accepted aardvark-dns 1.6.0-3 (source) into unstable (Reinhard Tartler)
  • [2024-07-13] Accepted aardvark-dns 1.9.0-1 (source) into experimental (Reinhard Tartler)
  • [2024-07-12] Accepted aardvark-dns 1.6.0-2 (source) into unstable (Reinhard Tartler)
  • [2024-06-30] aardvark-dns 1.4.0-6 MIGRATED to testing (Debian testing watch)
  • [2024-06-25] Accepted aardvark-dns 1.4.0-6 (source) into unstable (Reinhard Tartler)
  • [2024-05-02] Accepted aardvark-dns 1.4.0-5.1 (source) into unstable (Peter Michael Green)
  • [2024-04-21] Accepted aardvark-dns 1.6.0-1 (source) into experimental (Reinhard Tartler)
  • [2023-09-12] aardvark-dns 1.4.0-5 MIGRATED to testing (Debian testing watch)
  • [2023-09-07] Accepted aardvark-dns 1.4.0-5 (source) into unstable (Reinhard Tartler)
  • [2023-06-24] aardvark-dns 1.4.0-4 MIGRATED to testing (Debian testing watch)
  • [2023-06-19] Accepted aardvark-dns 1.4.0-4 (source) into unstable (Reinhard Tartler)
  • [2023-01-20] aardvark-dns 1.4.0-3 MIGRATED to testing (Debian testing watch)
  • 1
  • 2
bugs [bug history graph]
  • all: 0
links
  • homepage
  • lintian
  • buildd: logs, reproducibility, cross
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker
  • debian patches
  • debci
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 1.16.0-2
  • 2 bugs

Debian Package Tracker — Copyright 2013-2025 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing