Updated dnsmasq packages fix a security vulnerability
Publication date: 08 Jun 2021Modification date: 07 Jun 2021
Type: security
Affected Mageia releases : 7 , 8
CVE: CVE-2021-3448
Description
A flaw was found in dnsmasq in versions before 2.85. When configured to use a specific server for a given network interface, dnsmasq uses a fixed port while forwarding queries. An attacker on the network, able to find the outgoing port used by dnsmasq, only needs to guess the random transmission ID to forge a reply and get it accepted by dnsmasq. This flaw makes a DNS Cache Poisoning attack much easier (CVE-2021-3448). This kind of configuration is the default when network-manager uses dnsmasq.
References
SRPMS
7/core
- dnsmasq-2.85-1.mga7
8/core
- dnsmasq-2.85-1.mga8