External Control of System or Configuration Setting Affecting container-tools:rhel8/aardvark-dns package, versions *


Severity

Recommended
0.0
low
0
10

Based on Red Hat Enterprise Linux security rating.

Threat Intelligence

EPSS
0.03% (6th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-RHEL8-CONTAINERTOOLS-11187203
  • published29 Jul 2025
  • disclosed28 Jul 2025

Introduced: 28 Jul 2025

NewCVE-2025-8283  (opens in a new tab)
CWE-15  (opens in a new tab)

How to fix?

There is no fixed version for RHEL:8 container-tools:rhel8/aardvark-dns.

NVD Description

Note: Versions mentioned in the description apply only to the upstream container-tools:rhel8/aardvark-dns package and not the container-tools:rhel8/aardvark-dns package as distributed by RHEL. See How to fix? for RHEL:8 relevant fixed versions and status.

A vulnerability was found in the netavark package, a network stack for containers used with Podman. Due to dns.podman search domain being removed, netavark may return external servers if a valid A/AAAA record is sent as a response. When creating a container with a given name, this name will be used as the hostname for the container itself, as the podman's search domain is not added anymore the container is using the host's resolv.conf, and the DNS resolver will try to look into the search domains contained on it. If one of the domains contain a name with the same hostname as the running container, the connection will forward to unexpected external servers.

CVSS Base Scores

version 3.1