Описание
ELSA-2021-4153: dnsmasq security and bug fix update (MODERATE)
[2.79-19]
- Correct typo in man page (#1947039)
[2.79-18]
- Properly randomize outgoing ports also with bound interface (CVE-2021-3448)
[2.79-17]
- Fix sporadic bind-dynamic failures (#1887649)
[2.79-16]
- Fix network errors on queries both from ipv4 and ipv6 (#1921153)
Обновленные пакеты
Oracle Linux 8
Oracle Linux aarch64
dnsmasq
2.79-19.el8
dnsmasq-utils
2.79-19.el8
Oracle Linux x86_64
dnsmasq
2.79-19.el8
dnsmasq-utils
2.79-19.el8
Связанные CVE
Связанные уязвимости
A flaw was found in dnsmasq in versions before 2.85. When configured to use a specific server for a given network interface, dnsmasq uses a fixed port while forwarding queries. An attacker on the network, able to find the outgoing port used by dnsmasq, only needs to guess the random transmission ID to forge a reply and get it accepted by dnsmasq. This flaw makes a DNS Cache Poisoning attack much easier. The highest threat from this vulnerability is to data integrity.
A flaw was found in dnsmasq in versions before 2.85. When configured to use a specific server for a given network interface, dnsmasq uses a fixed port while forwarding queries. An attacker on the network, able to find the outgoing port used by dnsmasq, only needs to guess the random transmission ID to forge a reply and get it accepted by dnsmasq. This flaw makes a DNS Cache Poisoning attack much easier. The highest threat from this vulnerability is to data integrity.
A flaw was found in dnsmasq in versions before 2.85. When configured to use a specific server for a given network interface, dnsmasq uses a fixed port while forwarding queries. An attacker on the network, able to find the outgoing port used by dnsmasq, only needs to guess the random transmission ID to forge a reply and get it accepted by dnsmasq. This flaw makes a DNS Cache Poisoning attack much easier. The highest threat from this vulnerability is to data integrity.
A flaw was found in dnsmasq in versions before 2.85. When configured t ...