MGASA-2021-0231

Source
https://advisories.mageia.org/MGASA-2021-0231.html
Import Source
https://advisories.mageia.org/MGASA-2021-0231.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2021-0231
Related
Published
2021-06-08T14:33:02Z
Modified
2021-06-07T08:36:32Z
Summary
Updated dnsmasq packages fix a security vulnerability
Details

A flaw was found in dnsmasq in versions before 2.85. When configured to use a specific server for a given network interface, dnsmasq uses a fixed port while forwarding queries. An attacker on the network, able to find the outgoing port used by dnsmasq, only needs to guess the random transmission ID to forge a reply and get it accepted by dnsmasq. This flaw makes a DNS Cache Poisoning attack much easier (CVE-2021-3448). This kind of configuration is the default when network-manager uses dnsmasq.

References
Credits

Affected packages

Mageia:8 / dnsmasq

Package

Name
dnsmasq
Purl
pkg:rpm/mageia/dnsmasq?distro=mageia-8

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.85-1.mga8

Ecosystem specific

{
    "section": "core"
}

Mageia:7 / dnsmasq

Package

Name
dnsmasq
Purl
pkg:rpm/mageia/dnsmasq?distro=mageia-7

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.85-1.mga7

Ecosystem specific

{
    "section": "core"
}