diff options
author | Armin Kuster <akuster@mvista.com> | 2021-09-10 15:16:48 -0700 |
---|---|---|
committer | Armin Kuster <akuster@mvista.com> | 2021-09-10 15:16:48 -0700 |
commit | 2e7e98cd0cb82db214b13224c71134b9335a719b (patch) | |
tree | 758e6fa5bef92a11521ea0a07b06ea40ab01887d /meta-oe/recipes-support/hdf5 | |
parent | 06d80777f47891ec876b55212790deb5fef9116e (diff) | |
download | meta-openembedded-2e7e98cd0cb82db214b13224c71134b9335a719b.tar.gz |
dnsmasq: Security fix CVE-2021-3448
Source: https://thekelleys.org.uk/dnsmasq.git
MR: 110238
Type: Security Fix
Disposition: Backport from https://thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=commit;h=74d4fcd756a85bc1823232ea74334f7ccfb9d5d2
ChangeID: 3365bcc47b0467b487f14fc6bfad89bc560cd818
Description:
A flaw was found in dnsmasq in versions before 2.85. When configured to use a specific server for a given network interface, dnsmasq uses a fixed port while forwarding queries. An attacker on the network, able to find the outgoing port used by dnsmasq, only needs to guess the random transmission ID to forge a reply and get it accepted by dnsmasq. This flaw makes a DNS Cache Poisoning attack much easier. The highest threat from this vulnerability is to data integrity.
Signed-off-by: Armin Kuster <akuster@mvista.com>
Diffstat (limited to 'meta-oe/recipes-support/hdf5')
0 files changed, 0 insertions, 0 deletions