Armin Kuster 2e7e98cd0c dnsmasq: Security fix CVE-2021-3448
Source: https://thekelleys.org.uk/dnsmasq.git
MR: 110238
Type: Security Fix
Disposition: Backport from https://thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=commit;h=74d4fcd756a85bc1823232ea74334f7ccfb9d5d2
ChangeID: 3365bcc47b0467b487f14fc6bfad89bc560cd818
Description:

A flaw was found in dnsmasq in versions before 2.85. When configured to use a specific server for a given network interface, dnsmasq uses a fixed port while forwarding queries. An attacker on the network, able to find the outgoing port used by dnsmasq, only needs to guess the random transmission ID to forge a reply and get it accepted by dnsmasq. This flaw makes a DNS Cache Poisoning attack much easier. The highest threat from this vulnerability is to data integrity.

Signed-off-by: Armin Kuster <akuster@mvista.com>
2021-09-10 15:16:48 -07:00
..
2018-01-08 11:57:34 -05:00
2021-02-15 08:23:03 -08:00
2020-11-09 19:18:02 -08:00
2020-02-18 18:17:20 -08:00
2019-04-07 08:26:15 -07:00
2019-04-09 17:46:56 -07:00
2018-12-13 09:06:16 -08:00
2019-11-01 17:22:52 -07:00
2015-09-14 15:07:53 -04:00
2019-05-21 17:52:23 -07:00
2020-01-06 19:22:26 -08:00
2020-09-19 11:21:41 -07:00
2020-07-01 08:01:41 -07:00
2020-03-17 19:46:35 -07:00
2019-04-09 21:31:36 -07:00
2019-11-01 17:22:52 -07:00
2019-11-01 17:22:52 -07:00
2020-02-28 07:02:17 -08:00
2019-06-25 14:21:48 -07:00
2019-04-09 18:08:59 -07:00
2020-05-03 14:29:17 -07:00
2019-04-08 10:40:41 -07:00
2017-09-08 16:38:15 -04:00
2020-02-27 08:25:49 -08:00
2019-04-08 10:40:41 -07:00
2016-08-22 15:56:28 +02:00
2020-10-04 16:25:25 -07:00
2021-09-10 10:21:52 -07:00
2020-04-12 22:57:22 -07:00
2021-07-25 15:17:32 -07:00
2019-04-29 10:13:56 -07:00