Action not permitted
Modal body text goes here.
cve-2020-25684
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T15:40:36.670Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889686" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.jsof-tech.com/disclosures/dnspooq/" }, { "name": "FEDORA-2021-84440e87ba", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WYW3IR6APUSKOYKL5FT3ACTIHWHGQY32/" }, { "name": "GLSA-202101-17", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202101-17" }, { "name": "DSA-4844", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2021/dsa-4844" }, { "name": "FEDORA-2021-2e4c3d5a9d", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QGB7HL3OWHTLEPSMLDGOMXQKG3KM2QME/" }, { "name": "[debian-lts-announce] 20210322 [SECURITY] [DLA 2604-1] dnsmasq security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00027.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/12135-security-advisory-61" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "dnsmasq", "vendor": "n/a", "versions": [ { "status": "affected", "version": "dnsmasq 2.83" } ] } ], "descriptions": [ { "lang": "en", "value": "A flaw was found in dnsmasq before version 2.83. When getting a reply from a forwarded query, dnsmasq checks in the forward.c:reply_query() if the reply destination address/port is used by the pending forwarded queries. However, it does not use the address/port to retrieve the exact forwarded query, substantially reducing the number of attempts an attacker on the network would have to perform to forge a reply and get it accepted by dnsmasq. This issue contrasts with RFC5452, which specifies a query\u0027s attributes that all must be used to match a reply. This flaw allows an attacker to perform a DNS Cache Poisoning attack. If chained with CVE-2020-25685 or CVE-2020-25686, the attack complexity of a successful attack is reduced. The highest threat from this vulnerability is to data integrity." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-358", "description": "CWE-358", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-25T13:52:07", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889686" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.jsof-tech.com/disclosures/dnspooq/" }, { "name": "FEDORA-2021-84440e87ba", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WYW3IR6APUSKOYKL5FT3ACTIHWHGQY32/" }, { "name": "GLSA-202101-17", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/202101-17" }, { "name": "DSA-4844", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2021/dsa-4844" }, { "name": "FEDORA-2021-2e4c3d5a9d", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QGB7HL3OWHTLEPSMLDGOMXQKG3KM2QME/" }, { "name": "[debian-lts-announce] 20210322 [SECURITY] [DLA 2604-1] dnsmasq security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00027.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/12135-security-advisory-61" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2020-25684", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "dnsmasq", "version": { "version_data": [ { "version_value": "dnsmasq 2.83" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A flaw was found in dnsmasq before version 2.83. When getting a reply from a forwarded query, dnsmasq checks in the forward.c:reply_query() if the reply destination address/port is used by the pending forwarded queries. However, it does not use the address/port to retrieve the exact forwarded query, substantially reducing the number of attempts an attacker on the network would have to perform to forge a reply and get it accepted by dnsmasq. This issue contrasts with RFC5452, which specifies a query\u0027s attributes that all must be used to match a reply. This flaw allows an attacker to perform a DNS Cache Poisoning attack. If chained with CVE-2020-25685 or CVE-2020-25686, the attack complexity of a successful attack is reduced. The highest threat from this vulnerability is to data integrity." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-358" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1889686", "refsource": "MISC", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889686" }, { "name": "https://www.jsof-tech.com/disclosures/dnspooq/", "refsource": "MISC", "url": "https://www.jsof-tech.com/disclosures/dnspooq/" }, { "name": "FEDORA-2021-84440e87ba", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WYW3IR6APUSKOYKL5FT3ACTIHWHGQY32/" }, { "name": "GLSA-202101-17", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/202101-17" }, { "name": "DSA-4844", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4844" }, { "name": "FEDORA-2021-2e4c3d5a9d", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGB7HL3OWHTLEPSMLDGOMXQKG3KM2QME/" }, { "name": "[debian-lts-announce] 20210322 [SECURITY] [DLA 2604-1] dnsmasq security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00027.html" }, { "name": "https://www.arista.com/en/support/advisories-notices/security-advisories/12135-security-advisory-61", "refsource": "MISC", "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/12135-security-advisory-61" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2020-25684", "datePublished": "2021-01-20T15:22:21", "dateReserved": "2020-09-16T00:00:00", "dateUpdated": "2024-08-04T15:40:36.670Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2020-25684\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2021-01-20T16:15:14.163\",\"lastModified\":\"2023-11-07T03:20:22.107\",\"vulnStatus\":\"Modified\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"A flaw was found in dnsmasq before version 2.83. When getting a reply from a forwarded query, dnsmasq checks in the forward.c:reply_query() if the reply destination address/port is used by the pending forwarded queries. However, it does not use the address/port to retrieve the exact forwarded query, substantially reducing the number of attempts an attacker on the network would have to perform to forge a reply and get it accepted by dnsmasq. This issue contrasts with RFC5452, which specifies a query\u0027s attributes that all must be used to match a reply. This flaw allows an attacker to perform a DNS Cache Poisoning attack. If chained with CVE-2020-25685 or CVE-2020-25686, the attack complexity of a successful attack is reduced. The highest threat from this vulnerability is to data integrity.\"},{\"lang\":\"es\",\"value\":\"Se encontr\u00f3 un fallo en dnsmasq versiones anteriores a 2.83.\u0026#xa0;Al obtener una respuesta de una consulta reenviada, dnsmasq comprueba en forward.c:reply_query() si la direcci\u00f3n y puerto de destino de la respuesta es utilizado por las consultas reenviadas pendientes.\u0026#xa0;Sin embargo, no usa la direcci\u00f3n y puerto para recuperar la consulta reenviada exacta, lo que reduce sustancialmente la cantidad de intentos que un atacante en la red tendr\u00eda que realizar para falsificar una respuesta y lograr que dnsmasq la acepte.\u0026#xa0;Este problema contrasta con RFC5452, que especifica los atributos de una consulta que deben ser usados para hacer coincidir una respuesta.\u0026#xa0;Este fallo permite a un atacante realizar un ataque de envenenamiento de cach\u00e9 de DNS.\u0026#xa0;Si est\u00e1 encadenado con CVE-2020-25685 o CVE-2020-25686, se reduce la complejidad del ataque de un ataque con \u00e9xito.\u0026#xa0;La mayor amenaza de esta vulnerabilidad es la integridad de los datos\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\",\"baseScore\":3.7,\"baseSeverity\":\"LOW\"},\"exploitabilityScore\":2.2,\"impactScore\":1.4}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:N/I:P/A:N\",\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\",\"baseScore\":4.3},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]},{\"source\":\"secalert@redhat.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-358\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:thekelleys:dnsmasq:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.83\",\"matchCriteriaId\":\"F38115DF-0F5C-442D-83D4-1125AAB4E2B7\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"36D96259-24BD-44E2-96D9-78CE1D41F956\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E460AA51-FCDA-46B9-AE97-E6676AA5E194\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEECE5FC-CACF-4496-A3E7-164736409252\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07B237A9-69A3-4A9C-9DA0-4E06BD37AE73\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arista:eos:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.21\",\"versionEndExcluding\":\"4.21.14m\",\"matchCriteriaId\":\"2E5C0DA1-5E51-40F1-82FE-CF7E391C07E4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arista:eos:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.22\",\"versionEndExcluding\":\"4.22.9m\",\"matchCriteriaId\":\"206E795F-BFE9-4AB9-A35F-60AC911F38E4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arista:eos:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.23\",\"versionEndExcluding\":\"4.23.7m\",\"matchCriteriaId\":\"6FA15712-F804-4060-99C0-7370D6111B83\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arista:eos:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.24\",\"versionEndExcluding\":\"4.24.5m\",\"matchCriteriaId\":\"21A321F5-CB56-4258-BB30-6753EECB89DD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arista:eos:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.25\",\"versionEndExcluding\":\"4.25.2f\",\"matchCriteriaId\":\"9445AF76-6AE4-46A6-A470-979ADBB19EE2\"}]}]}],\"references\":[{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=1889686\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2021/03/msg00027.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QGB7HL3OWHTLEPSMLDGOMXQKG3KM2QME/\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WYW3IR6APUSKOYKL5FT3ACTIHWHGQY32/\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://security.gentoo.org/glsa/202101-17\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.arista.com/en/support/advisories-notices/security-advisories/12135-security-advisory-61\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2021/dsa-4844\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.jsof-tech.com/disclosures/dnspooq/\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]}]}}" } }
rhsa-2021_0151
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for dnsmasq is now available for Red Hat Enterprise Linux 8.2 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The dnsmasq packages contain Dnsmasq, a lightweight DNS (Domain Name Server) forwarder and DHCP (Dynamic Host Configuration Protocol) server.\n\nSecurity Fix(es):\n\n* dnsmasq: heap-based buffer overflow in sort_rrset() when DNSSEC is enabled (CVE-2020-25681)\n\n* dnsmasq: buffer overflow in extract_name() due to missing length check when DNSSEC is enabled (CVE-2020-25682)\n\n* dnsmasq: heap-based buffer overflow with large memcpy in get_rdata() when DNSSEC is enabled (CVE-2020-25683)\n\n* dnsmasq: loose address/port check in reply_query() makes forging replies easier for an off-path attacker (CVE-2020-25684)\n\n* dnsmasq: loose query name check in reply_query() makes forging replies easier for an off-path attacker (CVE-2020-25685)\n\n* dnsmasq: multiple queries forwarded for the same name makes forging replies easier for an off-path attacker (CVE-2020-25686)\n\n* dnsmasq: heap-based buffer overflow with large memcpy in sort_rrset() when DNSSEC is enabled (CVE-2020-25687)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:0151", "url": "https://access.redhat.com/errata/RHSA-2021:0151" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-001", "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-001" }, { "category": "external", "summary": "1881875", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1881875" }, { "category": "external", "summary": "1882014", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1882014" }, { "category": "external", "summary": "1882018", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1882018" }, { "category": "external", "summary": "1889686", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889686" }, { "category": "external", "summary": "1889688", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889688" }, { "category": "external", "summary": "1890125", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890125" }, { "category": "external", "summary": "1891568", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1891568" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_0151.json" } ], "title": "Red Hat Security Advisory: dnsmasq security update", "tracking": { "current_release_date": "2024-11-15T07:27:42+00:00", "generator": { "date": "2024-11-15T07:27:42+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2021:0151", "initial_release_date": "2021-01-19T13:37:11+00:00", "revision_history": [ { "date": "2021-01-19T13:37:11+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-01-19T13:37:11+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-15T07:27:42+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product": { "name": "Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_eus:8.2::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "dnsmasq-0:2.79-11.el8_2.2.src", "product": { "name": "dnsmasq-0:2.79-11.el8_2.2.src", "product_id": "dnsmasq-0:2.79-11.el8_2.2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq@2.79-11.el8_2.2?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "dnsmasq-0:2.79-11.el8_2.2.aarch64", "product": { "name": "dnsmasq-0:2.79-11.el8_2.2.aarch64", "product_id": "dnsmasq-0:2.79-11.el8_2.2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq@2.79-11.el8_2.2?arch=aarch64" } } }, { "category": "product_version", "name": "dnsmasq-utils-0:2.79-11.el8_2.2.aarch64", "product": { "name": "dnsmasq-utils-0:2.79-11.el8_2.2.aarch64", "product_id": "dnsmasq-utils-0:2.79-11.el8_2.2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-utils@2.79-11.el8_2.2?arch=aarch64" } } }, { "category": "product_version", "name": "dnsmasq-debugsource-0:2.79-11.el8_2.2.aarch64", "product": { "name": "dnsmasq-debugsource-0:2.79-11.el8_2.2.aarch64", "product_id": "dnsmasq-debugsource-0:2.79-11.el8_2.2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-debugsource@2.79-11.el8_2.2?arch=aarch64" } } }, { "category": "product_version", "name": "dnsmasq-debuginfo-0:2.79-11.el8_2.2.aarch64", "product": { "name": "dnsmasq-debuginfo-0:2.79-11.el8_2.2.aarch64", "product_id": "dnsmasq-debuginfo-0:2.79-11.el8_2.2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-debuginfo@2.79-11.el8_2.2?arch=aarch64" } } }, { "category": "product_version", "name": "dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.aarch64", "product": { "name": "dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.aarch64", "product_id": "dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-utils-debuginfo@2.79-11.el8_2.2?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "dnsmasq-0:2.79-11.el8_2.2.ppc64le", "product": { "name": "dnsmasq-0:2.79-11.el8_2.2.ppc64le", "product_id": "dnsmasq-0:2.79-11.el8_2.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq@2.79-11.el8_2.2?arch=ppc64le" } } }, { "category": "product_version", "name": "dnsmasq-utils-0:2.79-11.el8_2.2.ppc64le", "product": { "name": "dnsmasq-utils-0:2.79-11.el8_2.2.ppc64le", "product_id": "dnsmasq-utils-0:2.79-11.el8_2.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-utils@2.79-11.el8_2.2?arch=ppc64le" } } }, { "category": "product_version", "name": "dnsmasq-debugsource-0:2.79-11.el8_2.2.ppc64le", "product": { "name": "dnsmasq-debugsource-0:2.79-11.el8_2.2.ppc64le", "product_id": "dnsmasq-debugsource-0:2.79-11.el8_2.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-debugsource@2.79-11.el8_2.2?arch=ppc64le" } } }, { "category": "product_version", "name": "dnsmasq-debuginfo-0:2.79-11.el8_2.2.ppc64le", "product": { "name": "dnsmasq-debuginfo-0:2.79-11.el8_2.2.ppc64le", "product_id": "dnsmasq-debuginfo-0:2.79-11.el8_2.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-debuginfo@2.79-11.el8_2.2?arch=ppc64le" } } }, { "category": "product_version", "name": "dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.ppc64le", "product": { "name": "dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.ppc64le", "product_id": "dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-utils-debuginfo@2.79-11.el8_2.2?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "dnsmasq-0:2.79-11.el8_2.2.x86_64", "product": { "name": "dnsmasq-0:2.79-11.el8_2.2.x86_64", "product_id": "dnsmasq-0:2.79-11.el8_2.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq@2.79-11.el8_2.2?arch=x86_64" } } }, { "category": "product_version", "name": "dnsmasq-utils-0:2.79-11.el8_2.2.x86_64", "product": { "name": "dnsmasq-utils-0:2.79-11.el8_2.2.x86_64", "product_id": "dnsmasq-utils-0:2.79-11.el8_2.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-utils@2.79-11.el8_2.2?arch=x86_64" } } }, { "category": "product_version", "name": "dnsmasq-debugsource-0:2.79-11.el8_2.2.x86_64", "product": { "name": "dnsmasq-debugsource-0:2.79-11.el8_2.2.x86_64", "product_id": "dnsmasq-debugsource-0:2.79-11.el8_2.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-debugsource@2.79-11.el8_2.2?arch=x86_64" } } }, { "category": "product_version", "name": "dnsmasq-debuginfo-0:2.79-11.el8_2.2.x86_64", "product": { "name": "dnsmasq-debuginfo-0:2.79-11.el8_2.2.x86_64", "product_id": "dnsmasq-debuginfo-0:2.79-11.el8_2.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-debuginfo@2.79-11.el8_2.2?arch=x86_64" } } }, { "category": "product_version", "name": "dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.x86_64", "product": { "name": "dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.x86_64", "product_id": "dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-utils-debuginfo@2.79-11.el8_2.2?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "dnsmasq-0:2.79-11.el8_2.2.s390x", "product": { "name": "dnsmasq-0:2.79-11.el8_2.2.s390x", "product_id": "dnsmasq-0:2.79-11.el8_2.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq@2.79-11.el8_2.2?arch=s390x" } } }, { "category": "product_version", "name": "dnsmasq-utils-0:2.79-11.el8_2.2.s390x", "product": { "name": "dnsmasq-utils-0:2.79-11.el8_2.2.s390x", "product_id": "dnsmasq-utils-0:2.79-11.el8_2.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-utils@2.79-11.el8_2.2?arch=s390x" } } }, { "category": "product_version", "name": "dnsmasq-debugsource-0:2.79-11.el8_2.2.s390x", "product": { "name": "dnsmasq-debugsource-0:2.79-11.el8_2.2.s390x", "product_id": "dnsmasq-debugsource-0:2.79-11.el8_2.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-debugsource@2.79-11.el8_2.2?arch=s390x" } } }, { "category": "product_version", "name": "dnsmasq-debuginfo-0:2.79-11.el8_2.2.s390x", "product": { "name": "dnsmasq-debuginfo-0:2.79-11.el8_2.2.s390x", "product_id": "dnsmasq-debuginfo-0:2.79-11.el8_2.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-debuginfo@2.79-11.el8_2.2?arch=s390x" } } }, { "category": "product_version", "name": "dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.s390x", "product": { "name": "dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.s390x", "product_id": "dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-utils-debuginfo@2.79-11.el8_2.2?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.79-11.el8_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.aarch64" }, "product_reference": "dnsmasq-0:2.79-11.el8_2.2.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.79-11.el8_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.ppc64le" }, "product_reference": "dnsmasq-0:2.79-11.el8_2.2.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.79-11.el8_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.s390x" }, "product_reference": "dnsmasq-0:2.79-11.el8_2.2.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.79-11.el8_2.2.src as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.src" }, "product_reference": "dnsmasq-0:2.79-11.el8_2.2.src", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.79-11.el8_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.x86_64" }, "product_reference": "dnsmasq-0:2.79-11.el8_2.2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.79-11.el8_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.aarch64" }, "product_reference": "dnsmasq-debuginfo-0:2.79-11.el8_2.2.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.79-11.el8_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.ppc64le" }, "product_reference": "dnsmasq-debuginfo-0:2.79-11.el8_2.2.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.79-11.el8_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.s390x" }, "product_reference": "dnsmasq-debuginfo-0:2.79-11.el8_2.2.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.79-11.el8_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.x86_64" }, "product_reference": "dnsmasq-debuginfo-0:2.79-11.el8_2.2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debugsource-0:2.79-11.el8_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.aarch64" }, "product_reference": "dnsmasq-debugsource-0:2.79-11.el8_2.2.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debugsource-0:2.79-11.el8_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.ppc64le" }, "product_reference": "dnsmasq-debugsource-0:2.79-11.el8_2.2.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debugsource-0:2.79-11.el8_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.s390x" }, "product_reference": "dnsmasq-debugsource-0:2.79-11.el8_2.2.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debugsource-0:2.79-11.el8_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.x86_64" }, "product_reference": "dnsmasq-debugsource-0:2.79-11.el8_2.2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.79-11.el8_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.aarch64" }, "product_reference": "dnsmasq-utils-0:2.79-11.el8_2.2.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.79-11.el8_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.ppc64le" }, "product_reference": "dnsmasq-utils-0:2.79-11.el8_2.2.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.79-11.el8_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.s390x" }, "product_reference": "dnsmasq-utils-0:2.79-11.el8_2.2.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.79-11.el8_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.x86_64" }, "product_reference": "dnsmasq-utils-0:2.79-11.el8_2.2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.aarch64" }, "product_reference": "dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.ppc64le" }, "product_reference": "dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.s390x" }, "product_reference": "dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.x86_64" }, "product_reference": "dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Moshe Kol", "Shlomi Oberman" ], "organization": "JSOF" } ], "cve": "CVE-2020-25681", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2020-09-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1881875" } ], "notes": [ { "category": "description", "text": "A flaw was found in dnsmasq. A heap-based buffer overflow was discovered in the way RRSets are sorted before validating with DNSSEC data. An attacker on the network, who can forge DNS replies such as that they are accepted as valid, could use this flaw to cause a buffer overflow with arbitrary data in a heap memory segment, possibly executing code on the machine. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "dnsmasq: heap-based buffer overflow in sort_rrset() when DNSSEC is enabled", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the versions of dnsmasq as shipped with Red Hat Enterprise Linux 5, 6, and 7 as they are not compiled with DNSSEC support.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.src", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-25681" }, { "category": "external", "summary": "RHBZ#1881875", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1881875" }, { "category": "external", "summary": "RHSB-2021-001", "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-001" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-25681", "url": "https://www.cve.org/CVERecord?id=CVE-2020-25681" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25681", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25681" }, { "category": "external", "summary": "https://www.jsof-tech.com/disclosures/dnspooq/", "url": "https://www.jsof-tech.com/disclosures/dnspooq/" } ], "release_date": "2021-01-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-01-19T13:37:11+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.src", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0151" }, { "category": "workaround", "details": "The only known way to mitigate this flaw is to disable DNSSEC altogether, by removing the `--dnssec` command line option or the `dnssec` option from dnsmasq configuration file.", "product_ids": [ "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.src", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.src", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "dnsmasq: heap-based buffer overflow in sort_rrset() when DNSSEC is enabled" }, { "acknowledgments": [ { "names": [ "Moshe Kol", "Shlomi Oberman" ], "organization": "JSOF" } ], "cve": "CVE-2020-25682", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2020-09-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1882014" } ], "notes": [ { "category": "description", "text": "A flaw was found in dnsmasq. A buffer overflow vulnerability was discovered in the way dnsmasq extract names from DNS packets before validating them with DNSSEC data. An attacker on the network, who can create valid DNS replies, could use this flaw to cause an overflow with arbitrary data in a heap-allocated memory, possibly executing code on the machine. The flaw is in the rfc1035.c:extract_name() function, which writes data to the memory pointed by name assuming MAXDNAME*2 bytes are available in the buffer. However, in some code execution paths, it is possible extract_name() gets passed an offset from the base buffer, thus reducing, in practice, the number of available bytes that can be written in the buffer. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "dnsmasq: buffer overflow in extract_name() due to missing length check when DNSSEC is enabled", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the versions of dnsmasq as shipped with Red Hat Enterprise Linux 5, 6, and 7 as they are not compiled with DNSSEC support.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.src", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-25682" }, { "category": "external", "summary": "RHBZ#1882014", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1882014" }, { "category": "external", "summary": "RHSB-2021-001", "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-001" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-25682", "url": "https://www.cve.org/CVERecord?id=CVE-2020-25682" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25682", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25682" }, { "category": "external", "summary": "https://www.jsof-tech.com/disclosures/dnspooq/", "url": "https://www.jsof-tech.com/disclosures/dnspooq/" } ], "release_date": "2021-01-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-01-19T13:37:11+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.src", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0151" }, { "category": "workaround", "details": "The only known way to mitigate this flaw is to disable DNSSEC altogether, by removing the `--dnssec` command line option or the `dnssec` option from dnsmasq configuration file.", "product_ids": [ "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.src", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.src", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "dnsmasq: buffer overflow in extract_name() due to missing length check when DNSSEC is enabled" }, { "acknowledgments": [ { "names": [ "Moshe Kol", "Shlomi Oberman" ], "organization": "JSOF" } ], "cve": "CVE-2020-25683", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2020-09-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1882018" } ], "notes": [ { "category": "description", "text": "A flaw was found in dnsmasq. A heap-based buffer overflow was discovered in dnsmasq when DNSSEC is enabled and before it validates the received DNS entries. A remote attacker, who can create valid DNS replies, could use this flaw to cause an overflow in a heap-allocated memory. This flaw is caused by the lack of length checks in rfc1035.c:extract_name(), which could be abused to make the code execute memcpy() with a negative size in get_rdata() and cause a crash in dnsmasq, resulting in a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "dnsmasq: heap-based buffer overflow with large memcpy in get_rdata() when DNSSEC is enabled", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the versions of dnsmasq as shipped with Red Hat Enterprise Linux 5, 6, and 7 as they are not compiled with DNSSEC support.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.src", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-25683" }, { "category": "external", "summary": "RHBZ#1882018", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1882018" }, { "category": "external", "summary": "RHSB-2021-001", "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-001" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-25683", "url": "https://www.cve.org/CVERecord?id=CVE-2020-25683" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25683", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25683" }, { "category": "external", "summary": "https://www.jsof-tech.com/disclosures/dnspooq/", "url": "https://www.jsof-tech.com/disclosures/dnspooq/" } ], "release_date": "2021-01-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-01-19T13:37:11+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.src", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0151" }, { "category": "workaround", "details": "The only known way to mitigate this flaw is to disable DNSSEC altogether, by removing the `--dnssec` command line option or the `dnssec` option from dnsmasq configuration file.", "product_ids": [ "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.src", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.src", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "dnsmasq: heap-based buffer overflow with large memcpy in get_rdata() when DNSSEC is enabled" }, { "acknowledgments": [ { "names": [ "Moshe Kol", "Shlomi Oberman" ], "organization": "JSOF" } ], "cve": "CVE-2020-25684", "cwe": { "id": "CWE-358", "name": "Improperly Implemented Security Check for Standard" }, "discovery_date": "2020-09-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1889686" } ], "notes": [ { "category": "description", "text": "A flaw was found in dnsmasq. When getting a reply from a forwarded query, dnsmasq checks in the forward.c:reply_query() if the reply destination address/port is used by the pending forwarded queries. However, it does not use the address/port to retrieve the exact forwarded query, substantially reducing the number of attempts an attacker on the network would have to perform to forge a reply and get it accepted by dnsmasq. This issue contrasts with RFC5452, which specifies a query\u0027s attributes that all must be used to match a reply. This flaw allows an attacker to perform a DNS Cache Poisoning attack. If chained with CVE-2020-25685 or CVE-2020-25686, the attack complexity of a successful attack is reduced. The highest threat from this vulnerability is to data integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "dnsmasq: loose address/port check in reply_query() makes forging replies easier for an off-path attacker", "title": "Vulnerability summary" }, { "category": "other", "text": "Dnsmasq may be run by libvirt and/or NetworkManager. libvirt uses dnsmasq by default to provide DNS service to its guests. NetworkManager may be configured to use dnsmasq to provide DNS service to the system, if a line `dns=dnsmasq` is present in the `[main]` section of the configuration file /etc/NetworkManager/NetworkManager.conf.\n\nIn Red Hat OpenStack Platform (RHOSP) and Red Hat Virtualization (RHV), the dnsmasq package is provided by the underlying Red Hat Enterprise Linux (RHEL) product. RHOSP and RHV are therefore indirectly affected, so please ensure that the underlying RHEL dnsmasq package is updated.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.src", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-25684" }, { "category": "external", "summary": "RHBZ#1889686", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889686" }, { "category": "external", "summary": "RHSB-2021-001", "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-001" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-25684", "url": "https://www.cve.org/CVERecord?id=CVE-2020-25684" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25684", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25684" }, { "category": "external", "summary": "https://www.jsof-tech.com/disclosures/dnspooq/", "url": "https://www.jsof-tech.com/disclosures/dnspooq/" } ], "release_date": "2021-01-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-01-19T13:37:11+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.src", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0151" }, { "category": "workaround", "details": "The impact of this flaw can be reduced by disabling the dnsmasq cache by adding `--cache-size=0` when calling dnsmasq or by adding a line with `cache-size=0` to the dnsmasq configuration file (/etc/dnsmasq.conf by default).\n\nWhen using Red Hat Enterprise Linux 8.3 with libvirt through a virt:rhel module, use `virsh net-edit \u003cnetwork-name\u003e` and reference https://libvirt.org/formatnetwork.html#elementsNamespaces to add the suggested option `cache-size=0`. \n\nThere is no way to customize the dnsmasq configuration generated by libvirt, when using versions of Red Hat Enterprise Linux prior to version 8.3. If dnsmasq is being run through NetworkManager, create a new file in /etc/NetworkManager/dnsmasq.d/ and add `cache-size=0` to it.\n\nIn all cases, by disabling the cache, you may experience a performance loss in your environment due to all DNS queries being forwarded to the upstream servers. Please evaluate if the mitigation is appropriate for the system\u2019s environment before applying.", "product_ids": [ "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.src", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N", "version": "3.1" }, "products": [ "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.src", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "dnsmasq: loose address/port check in reply_query() makes forging replies easier for an off-path attacker" }, { "acknowledgments": [ { "names": [ "Moshe Kol", "Shlomi Oberman" ], "organization": "JSOF" } ], "cve": "CVE-2020-25685", "cwe": { "id": "CWE-326", "name": "Inadequate Encryption Strength" }, "discovery_date": "2020-09-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1889688" } ], "notes": [ { "category": "description", "text": "A flaw was found in dnsmasq. When getting a reply from a forwarded query, dnsmasq checks in forward.c:reply_query(), which is the forwarded query that matches the reply, by only using a weak hash of the query name. Due to the weak hash (CRC32 when dnsmasq is compiled without DNSSEC, SHA-1 when it is) this flaw allows an off-path attacker to find several different domains all having the same hash, substantially reducing the number of attempts they would have to perform to forge a reply and get it accepted by dnsmasq. This is in contrast with RFC5452, which specifies that the query name is one of the attributes of a query that must be used to match a reply. This flaw could be abused to perform a DNS Cache Poisoning attack. If chained with CVE-2020-25684 the attack complexity of a successful attack is reduced. The highest threat from this vulnerability is to data integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "dnsmasq: loose query name check in reply_query() makes forging replies easier for an off-path attacker", "title": "Vulnerability summary" }, { "category": "other", "text": "Dnsmasq may be run by libvirt and/or NetworkManager. libvirt uses dnsmasq by default to provide DNS service to its guests. NetworkManager may be configured to use dnsmasq to provide DNS service to the system, if a line `dns=dnsmasq` is present in the `[main]` section of the configuration file /etc/NetworkManager/NetworkManager.conf.\n\nIn Red Hat OpenStack Platform (RHOSP) and Red Hat Virtualization (RHV), the dnsmasq package is provided by the underlying Red Hat Enterprise Linux (RHEL) product. RHOSP and RHV are therefore indirectly affected, so please ensure that the underlying RHEL dnsmasq package is updated.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.src", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-25685" }, { "category": "external", "summary": "RHBZ#1889688", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889688" }, { "category": "external", "summary": "RHSB-2021-001", "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-001" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-25685", "url": "https://www.cve.org/CVERecord?id=CVE-2020-25685" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25685", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25685" }, { "category": "external", "summary": "https://www.jsof-tech.com/disclosures/dnspooq/", "url": "https://www.jsof-tech.com/disclosures/dnspooq/" } ], "release_date": "2021-01-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-01-19T13:37:11+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.src", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0151" }, { "category": "workaround", "details": "The impact of this flaw can be reduced by disabling the dnsmasq cache by adding `--cache-size=0` when calling dnsmasq or by adding a line with `cache-size=0` to the dnsmasq configuration file (/etc/dnsmasq.conf by default). \n\nWhen using Red Hat Enterprise Linux 8.3 with libvirt through a virt:rhel module, use `virsh net-edit \u003cnetwork-name\u003e` and reference https://libvirt.org/formatnetwork.html#elementsNamespaces to add the suggested option `cache-size=0`. \n\nThere is no way to customize the dnsmasq configuration generated by libvirt, when using versions of Red Hat Enterprise Linux prior to version 8.3. If dnsmasq is being run through NetworkManager, create a new file in /etc/NetworkManager/dnsmasq.d/ and add `cache-size=0` to it.\n\nIn all cases, by disabling the cache, you may experience a performance loss in your environment due to all DNS queries being forwarded to the upstream servers. Please evaluate if the mitigation is appropriate for the system\u2019s environment before applying.", "product_ids": [ "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.src", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N", "version": "3.1" }, "products": [ "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.src", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "dnsmasq: loose query name check in reply_query() makes forging replies easier for an off-path attacker" }, { "acknowledgments": [ { "names": [ "Moshe Kol", "Shlomi Oberman" ], "organization": "JSOF" } ], "cve": "CVE-2020-25686", "cwe": { "id": "CWE-290", "name": "Authentication Bypass by Spoofing" }, "discovery_date": "2020-09-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1890125" } ], "notes": [ { "category": "description", "text": "A flaw was found in dnsmasq. When receiving a query, dnsmasq does not check for an existing pending request for the same name and forwards a new request. By default, a maximum of 150 pending queries can be sent to upstream servers, so there can be at most 150 queries for the same name. This flaw allows an off-path attacker on the network to substantially reduce the number of attempts that it would have to perform to forge a reply and have it accepted by dnsmasq. This issue is mentioned in the \"Birthday Attacks\" section of RFC5452. If chained with CVE-2020-25684, the attack complexity of a successful attack is reduced. The highest threat from this vulnerability is to data integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "dnsmasq: multiple queries forwarded for the same name makes forging replies easier for an off-path attacker", "title": "Vulnerability summary" }, { "category": "other", "text": "Dnsmasq may be run by libvirt and/or NetworkManager. libvirt uses dnsmasq by default to provide DNS service to its guests. NetworkManager may be configured to use dnsmasq to provide DNS service to the system, if a line `dns=dnsmasq` is present in the `[main]` section of the configuration file /etc/NetworkManager/NetworkManager.conf.\n\nIn Red Hat OpenStack Platform (RHOSP) and Red Hat Virtualization (RHV), the dnsmasq package is provided by the underlying Red Hat Enterprise Linux (RHEL) product. RHOSP and RHV are therefore indirectly affected, so please ensure that the underlying RHEL dnsmasq package is updated.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.src", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-25686" }, { "category": "external", "summary": "RHBZ#1890125", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890125" }, { "category": "external", "summary": "RHSB-2021-001", "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-001" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-25686", "url": "https://www.cve.org/CVERecord?id=CVE-2020-25686" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25686", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25686" }, { "category": "external", "summary": "https://www.jsof-tech.com/disclosures/dnspooq/", "url": "https://www.jsof-tech.com/disclosures/dnspooq/" } ], "release_date": "2021-01-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-01-19T13:37:11+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.src", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0151" }, { "category": "workaround", "details": "The impact of this flaw can be reduced by disabling the dnsmasq cache by adding `--cache-size=0` when calling dnsmasq or by adding a line with `cache-size=0` to the dnsmasq configuration file (/etc/dnsmasq.conf by default). \n\nWhen using Red Hat Enterprise Linux 8.3 with libvirt through a virt:rhel module, use `virsh net-edit \u003cnetwork-name\u003e` and reference https://libvirt.org/formatnetwork.html#elementsNamespaces to add the suggested option `cache-size=0`. \n\nThere is no way to customize the dnsmasq configuration generated by libvirt, when using versions of Red Hat Enterprise Linux prior to version 8.3. If dnsmasq is being run through NetworkManager, create a new file in /etc/NetworkManager/dnsmasq.d/ and add `cache-size=0` to it.\n\nIn all cases, by disabling the cache, you may experience a performance loss in your environment due to all DNS queries being forwarded to the upstream servers. Please evaluate if the mitigation is appropriate for the system\u2019s environment before applying.", "product_ids": [ "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.src", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N", "version": "3.1" }, "products": [ "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.src", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "dnsmasq: multiple queries forwarded for the same name makes forging replies easier for an off-path attacker" }, { "acknowledgments": [ { "names": [ "Moshe Kol", "Shlomi Oberman" ], "organization": "JSOF" } ], "cve": "CVE-2020-25687", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2020-09-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1891568" } ], "notes": [ { "category": "description", "text": "A flaw was found in dnsmasq. A heap-based buffer overflow was discovered in dnsmasq when DNSSEC is enabled and before it validates the received DNS entries. This flaw allows a remote attacker, who can create valid DNS replies, to cause an overflow in a heap-allocated memory. This flaw is caused by the lack of length checks in rfc1035.c:extract_name(), which could be abused to make the code execute memcpy() with a negative size in sort_rrset() and cause a crash in dnsmasq, resulting in a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "dnsmasq: heap-based buffer overflow with large memcpy in sort_rrset() when DNSSEC is enabled", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the versions of dnsmasq as shipped with Red Hat Enterprise Linux 5, 6, and 7 as they are not compiled with DNSSEC support.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.src", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-25687" }, { "category": "external", "summary": "RHBZ#1891568", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1891568" }, { "category": "external", "summary": "RHSB-2021-001", "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-001" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-25687", "url": "https://www.cve.org/CVERecord?id=CVE-2020-25687" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25687", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25687" }, { "category": "external", "summary": "https://www.jsof-tech.com/disclosures/dnspooq/", "url": "https://www.jsof-tech.com/disclosures/dnspooq/" } ], "release_date": "2021-01-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-01-19T13:37:11+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.src", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0151" }, { "category": "workaround", "details": "The only known way to mitigate this flaw is to disable DNSSEC altogether, by removing the `--dnssec` command line option or the `dnssec` option from dnsmasq configuration file.", "product_ids": [ "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.src", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.src", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "dnsmasq: heap-based buffer overflow with large memcpy in sort_rrset() when DNSSEC is enabled" } ] }
rhsa-2021_0245
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for dnsmasq is now available for Red Hat Enterprise Linux 7.3 Advanced Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The dnsmasq packages contain Dnsmasq, a lightweight DNS (Domain Name Server) forwarder and DHCP (Dynamic Host Configuration Protocol) server.\n\nSecurity Fix(es):\n\n* dnsmasq: loose address/port check in reply_query() makes forging replies easier for an off-path attacker (CVE-2020-25684)\n\n* dnsmasq: loose query name check in reply_query() makes forging replies easier for an off-path attacker (CVE-2020-25685)\n\n* dnsmasq: multiple queries forwarded for the same name makes forging replies easier for an off-path attacker (CVE-2020-25686)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:0245", "url": "https://access.redhat.com/errata/RHSA-2021:0245" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-001", "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-001" }, { "category": "external", "summary": "1889686", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889686" }, { "category": "external", "summary": "1889688", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889688" }, { "category": "external", "summary": "1890125", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890125" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_0245.json" } ], "title": "Red Hat Security Advisory: dnsmasq security update", "tracking": { "current_release_date": "2024-11-15T07:28:57+00:00", "generator": { "date": "2024-11-15T07:28:57+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2021:0245", "initial_release_date": "2021-01-25T15:13:22+00:00", "revision_history": [ { "date": "2021-01-25T15:13:22+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-01-25T15:13:22+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-15T07:28:57+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Server AUS (v. 7.3)", "product": { "name": "Red Hat Enterprise Linux Server AUS (v. 7.3)", "product_id": "7Server-7.3.AUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_aus:7.3::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.3)", "product": { "name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.3)", "product_id": "7Server-optional-7.3.AUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_aus:7.3::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "dnsmasq-0:2.66-21.el7_3.3.src", "product": { "name": "dnsmasq-0:2.66-21.el7_3.3.src", "product_id": "dnsmasq-0:2.66-21.el7_3.3.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq@2.66-21.el7_3.3?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "dnsmasq-0:2.66-21.el7_3.3.x86_64", "product": { "name": "dnsmasq-0:2.66-21.el7_3.3.x86_64", "product_id": "dnsmasq-0:2.66-21.el7_3.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq@2.66-21.el7_3.3?arch=x86_64" } } }, { "category": "product_version", "name": "dnsmasq-debuginfo-0:2.66-21.el7_3.3.x86_64", "product": { "name": "dnsmasq-debuginfo-0:2.66-21.el7_3.3.x86_64", "product_id": "dnsmasq-debuginfo-0:2.66-21.el7_3.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-debuginfo@2.66-21.el7_3.3?arch=x86_64" } } }, { "category": "product_version", "name": "dnsmasq-utils-0:2.66-21.el7_3.3.x86_64", "product": { "name": "dnsmasq-utils-0:2.66-21.el7_3.3.x86_64", "product_id": "dnsmasq-utils-0:2.66-21.el7_3.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-utils@2.66-21.el7_3.3?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.66-21.el7_3.3.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)", "product_id": "7Server-7.3.AUS:dnsmasq-0:2.66-21.el7_3.3.src" }, "product_reference": "dnsmasq-0:2.66-21.el7_3.3.src", "relates_to_product_reference": "7Server-7.3.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.66-21.el7_3.3.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)", "product_id": "7Server-7.3.AUS:dnsmasq-0:2.66-21.el7_3.3.x86_64" }, "product_reference": "dnsmasq-0:2.66-21.el7_3.3.x86_64", "relates_to_product_reference": "7Server-7.3.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.66-21.el7_3.3.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)", "product_id": "7Server-7.3.AUS:dnsmasq-debuginfo-0:2.66-21.el7_3.3.x86_64" }, "product_reference": "dnsmasq-debuginfo-0:2.66-21.el7_3.3.x86_64", "relates_to_product_reference": "7Server-7.3.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.66-21.el7_3.3.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)", "product_id": "7Server-7.3.AUS:dnsmasq-utils-0:2.66-21.el7_3.3.x86_64" }, "product_reference": "dnsmasq-utils-0:2.66-21.el7_3.3.x86_64", "relates_to_product_reference": "7Server-7.3.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.66-21.el7_3.3.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)", "product_id": "7Server-optional-7.3.AUS:dnsmasq-0:2.66-21.el7_3.3.src" }, "product_reference": "dnsmasq-0:2.66-21.el7_3.3.src", "relates_to_product_reference": "7Server-optional-7.3.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.66-21.el7_3.3.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)", "product_id": "7Server-optional-7.3.AUS:dnsmasq-0:2.66-21.el7_3.3.x86_64" }, "product_reference": "dnsmasq-0:2.66-21.el7_3.3.x86_64", "relates_to_product_reference": "7Server-optional-7.3.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.66-21.el7_3.3.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)", "product_id": "7Server-optional-7.3.AUS:dnsmasq-debuginfo-0:2.66-21.el7_3.3.x86_64" }, "product_reference": "dnsmasq-debuginfo-0:2.66-21.el7_3.3.x86_64", "relates_to_product_reference": "7Server-optional-7.3.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.66-21.el7_3.3.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)", "product_id": "7Server-optional-7.3.AUS:dnsmasq-utils-0:2.66-21.el7_3.3.x86_64" }, "product_reference": "dnsmasq-utils-0:2.66-21.el7_3.3.x86_64", "relates_to_product_reference": "7Server-optional-7.3.AUS" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Moshe Kol", "Shlomi Oberman" ], "organization": "JSOF" } ], "cve": "CVE-2020-25684", "cwe": { "id": "CWE-358", "name": "Improperly Implemented Security Check for Standard" }, "discovery_date": "2020-09-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1889686" } ], "notes": [ { "category": "description", "text": "A flaw was found in dnsmasq. When getting a reply from a forwarded query, dnsmasq checks in the forward.c:reply_query() if the reply destination address/port is used by the pending forwarded queries. However, it does not use the address/port to retrieve the exact forwarded query, substantially reducing the number of attempts an attacker on the network would have to perform to forge a reply and get it accepted by dnsmasq. This issue contrasts with RFC5452, which specifies a query\u0027s attributes that all must be used to match a reply. This flaw allows an attacker to perform a DNS Cache Poisoning attack. If chained with CVE-2020-25685 or CVE-2020-25686, the attack complexity of a successful attack is reduced. The highest threat from this vulnerability is to data integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "dnsmasq: loose address/port check in reply_query() makes forging replies easier for an off-path attacker", "title": "Vulnerability summary" }, { "category": "other", "text": "Dnsmasq may be run by libvirt and/or NetworkManager. libvirt uses dnsmasq by default to provide DNS service to its guests. NetworkManager may be configured to use dnsmasq to provide DNS service to the system, if a line `dns=dnsmasq` is present in the `[main]` section of the configuration file /etc/NetworkManager/NetworkManager.conf.\n\nIn Red Hat OpenStack Platform (RHOSP) and Red Hat Virtualization (RHV), the dnsmasq package is provided by the underlying Red Hat Enterprise Linux (RHEL) product. RHOSP and RHV are therefore indirectly affected, so please ensure that the underlying RHEL dnsmasq package is updated.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.3.AUS:dnsmasq-0:2.66-21.el7_3.3.src", "7Server-7.3.AUS:dnsmasq-0:2.66-21.el7_3.3.x86_64", "7Server-7.3.AUS:dnsmasq-debuginfo-0:2.66-21.el7_3.3.x86_64", "7Server-7.3.AUS:dnsmasq-utils-0:2.66-21.el7_3.3.x86_64", "7Server-optional-7.3.AUS:dnsmasq-0:2.66-21.el7_3.3.src", "7Server-optional-7.3.AUS:dnsmasq-0:2.66-21.el7_3.3.x86_64", "7Server-optional-7.3.AUS:dnsmasq-debuginfo-0:2.66-21.el7_3.3.x86_64", "7Server-optional-7.3.AUS:dnsmasq-utils-0:2.66-21.el7_3.3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-25684" }, { "category": "external", "summary": "RHBZ#1889686", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889686" }, { "category": "external", "summary": "RHSB-2021-001", "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-001" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-25684", "url": "https://www.cve.org/CVERecord?id=CVE-2020-25684" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25684", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25684" }, { "category": "external", "summary": "https://www.jsof-tech.com/disclosures/dnspooq/", "url": "https://www.jsof-tech.com/disclosures/dnspooq/" } ], "release_date": "2021-01-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-01-25T15:13:22+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-7.3.AUS:dnsmasq-0:2.66-21.el7_3.3.src", "7Server-7.3.AUS:dnsmasq-0:2.66-21.el7_3.3.x86_64", "7Server-7.3.AUS:dnsmasq-debuginfo-0:2.66-21.el7_3.3.x86_64", "7Server-7.3.AUS:dnsmasq-utils-0:2.66-21.el7_3.3.x86_64", "7Server-optional-7.3.AUS:dnsmasq-0:2.66-21.el7_3.3.src", "7Server-optional-7.3.AUS:dnsmasq-0:2.66-21.el7_3.3.x86_64", "7Server-optional-7.3.AUS:dnsmasq-debuginfo-0:2.66-21.el7_3.3.x86_64", "7Server-optional-7.3.AUS:dnsmasq-utils-0:2.66-21.el7_3.3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0245" }, { "category": "workaround", "details": "The impact of this flaw can be reduced by disabling the dnsmasq cache by adding `--cache-size=0` when calling dnsmasq or by adding a line with `cache-size=0` to the dnsmasq configuration file (/etc/dnsmasq.conf by default).\n\nWhen using Red Hat Enterprise Linux 8.3 with libvirt through a virt:rhel module, use `virsh net-edit \u003cnetwork-name\u003e` and reference https://libvirt.org/formatnetwork.html#elementsNamespaces to add the suggested option `cache-size=0`. \n\nThere is no way to customize the dnsmasq configuration generated by libvirt, when using versions of Red Hat Enterprise Linux prior to version 8.3. If dnsmasq is being run through NetworkManager, create a new file in /etc/NetworkManager/dnsmasq.d/ and add `cache-size=0` to it.\n\nIn all cases, by disabling the cache, you may experience a performance loss in your environment due to all DNS queries being forwarded to the upstream servers. Please evaluate if the mitigation is appropriate for the system\u2019s environment before applying.", "product_ids": [ "7Server-7.3.AUS:dnsmasq-0:2.66-21.el7_3.3.src", "7Server-7.3.AUS:dnsmasq-0:2.66-21.el7_3.3.x86_64", "7Server-7.3.AUS:dnsmasq-debuginfo-0:2.66-21.el7_3.3.x86_64", "7Server-7.3.AUS:dnsmasq-utils-0:2.66-21.el7_3.3.x86_64", "7Server-optional-7.3.AUS:dnsmasq-0:2.66-21.el7_3.3.src", "7Server-optional-7.3.AUS:dnsmasq-0:2.66-21.el7_3.3.x86_64", "7Server-optional-7.3.AUS:dnsmasq-debuginfo-0:2.66-21.el7_3.3.x86_64", "7Server-optional-7.3.AUS:dnsmasq-utils-0:2.66-21.el7_3.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N", "version": "3.1" }, "products": [ "7Server-7.3.AUS:dnsmasq-0:2.66-21.el7_3.3.src", "7Server-7.3.AUS:dnsmasq-0:2.66-21.el7_3.3.x86_64", "7Server-7.3.AUS:dnsmasq-debuginfo-0:2.66-21.el7_3.3.x86_64", "7Server-7.3.AUS:dnsmasq-utils-0:2.66-21.el7_3.3.x86_64", "7Server-optional-7.3.AUS:dnsmasq-0:2.66-21.el7_3.3.src", "7Server-optional-7.3.AUS:dnsmasq-0:2.66-21.el7_3.3.x86_64", "7Server-optional-7.3.AUS:dnsmasq-debuginfo-0:2.66-21.el7_3.3.x86_64", "7Server-optional-7.3.AUS:dnsmasq-utils-0:2.66-21.el7_3.3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "dnsmasq: loose address/port check in reply_query() makes forging replies easier for an off-path attacker" }, { "acknowledgments": [ { "names": [ "Moshe Kol", "Shlomi Oberman" ], "organization": "JSOF" } ], "cve": "CVE-2020-25685", "cwe": { "id": "CWE-326", "name": "Inadequate Encryption Strength" }, "discovery_date": "2020-09-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1889688" } ], "notes": [ { "category": "description", "text": "A flaw was found in dnsmasq. When getting a reply from a forwarded query, dnsmasq checks in forward.c:reply_query(), which is the forwarded query that matches the reply, by only using a weak hash of the query name. Due to the weak hash (CRC32 when dnsmasq is compiled without DNSSEC, SHA-1 when it is) this flaw allows an off-path attacker to find several different domains all having the same hash, substantially reducing the number of attempts they would have to perform to forge a reply and get it accepted by dnsmasq. This is in contrast with RFC5452, which specifies that the query name is one of the attributes of a query that must be used to match a reply. This flaw could be abused to perform a DNS Cache Poisoning attack. If chained with CVE-2020-25684 the attack complexity of a successful attack is reduced. The highest threat from this vulnerability is to data integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "dnsmasq: loose query name check in reply_query() makes forging replies easier for an off-path attacker", "title": "Vulnerability summary" }, { "category": "other", "text": "Dnsmasq may be run by libvirt and/or NetworkManager. libvirt uses dnsmasq by default to provide DNS service to its guests. NetworkManager may be configured to use dnsmasq to provide DNS service to the system, if a line `dns=dnsmasq` is present in the `[main]` section of the configuration file /etc/NetworkManager/NetworkManager.conf.\n\nIn Red Hat OpenStack Platform (RHOSP) and Red Hat Virtualization (RHV), the dnsmasq package is provided by the underlying Red Hat Enterprise Linux (RHEL) product. RHOSP and RHV are therefore indirectly affected, so please ensure that the underlying RHEL dnsmasq package is updated.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.3.AUS:dnsmasq-0:2.66-21.el7_3.3.src", "7Server-7.3.AUS:dnsmasq-0:2.66-21.el7_3.3.x86_64", "7Server-7.3.AUS:dnsmasq-debuginfo-0:2.66-21.el7_3.3.x86_64", "7Server-7.3.AUS:dnsmasq-utils-0:2.66-21.el7_3.3.x86_64", "7Server-optional-7.3.AUS:dnsmasq-0:2.66-21.el7_3.3.src", "7Server-optional-7.3.AUS:dnsmasq-0:2.66-21.el7_3.3.x86_64", "7Server-optional-7.3.AUS:dnsmasq-debuginfo-0:2.66-21.el7_3.3.x86_64", "7Server-optional-7.3.AUS:dnsmasq-utils-0:2.66-21.el7_3.3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-25685" }, { "category": "external", "summary": "RHBZ#1889688", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889688" }, { "category": "external", "summary": "RHSB-2021-001", "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-001" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-25685", "url": "https://www.cve.org/CVERecord?id=CVE-2020-25685" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25685", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25685" }, { "category": "external", "summary": "https://www.jsof-tech.com/disclosures/dnspooq/", "url": "https://www.jsof-tech.com/disclosures/dnspooq/" } ], "release_date": "2021-01-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-01-25T15:13:22+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-7.3.AUS:dnsmasq-0:2.66-21.el7_3.3.src", "7Server-7.3.AUS:dnsmasq-0:2.66-21.el7_3.3.x86_64", "7Server-7.3.AUS:dnsmasq-debuginfo-0:2.66-21.el7_3.3.x86_64", "7Server-7.3.AUS:dnsmasq-utils-0:2.66-21.el7_3.3.x86_64", "7Server-optional-7.3.AUS:dnsmasq-0:2.66-21.el7_3.3.src", "7Server-optional-7.3.AUS:dnsmasq-0:2.66-21.el7_3.3.x86_64", "7Server-optional-7.3.AUS:dnsmasq-debuginfo-0:2.66-21.el7_3.3.x86_64", "7Server-optional-7.3.AUS:dnsmasq-utils-0:2.66-21.el7_3.3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0245" }, { "category": "workaround", "details": "The impact of this flaw can be reduced by disabling the dnsmasq cache by adding `--cache-size=0` when calling dnsmasq or by adding a line with `cache-size=0` to the dnsmasq configuration file (/etc/dnsmasq.conf by default). \n\nWhen using Red Hat Enterprise Linux 8.3 with libvirt through a virt:rhel module, use `virsh net-edit \u003cnetwork-name\u003e` and reference https://libvirt.org/formatnetwork.html#elementsNamespaces to add the suggested option `cache-size=0`. \n\nThere is no way to customize the dnsmasq configuration generated by libvirt, when using versions of Red Hat Enterprise Linux prior to version 8.3. If dnsmasq is being run through NetworkManager, create a new file in /etc/NetworkManager/dnsmasq.d/ and add `cache-size=0` to it.\n\nIn all cases, by disabling the cache, you may experience a performance loss in your environment due to all DNS queries being forwarded to the upstream servers. Please evaluate if the mitigation is appropriate for the system\u2019s environment before applying.", "product_ids": [ "7Server-7.3.AUS:dnsmasq-0:2.66-21.el7_3.3.src", "7Server-7.3.AUS:dnsmasq-0:2.66-21.el7_3.3.x86_64", "7Server-7.3.AUS:dnsmasq-debuginfo-0:2.66-21.el7_3.3.x86_64", "7Server-7.3.AUS:dnsmasq-utils-0:2.66-21.el7_3.3.x86_64", "7Server-optional-7.3.AUS:dnsmasq-0:2.66-21.el7_3.3.src", "7Server-optional-7.3.AUS:dnsmasq-0:2.66-21.el7_3.3.x86_64", "7Server-optional-7.3.AUS:dnsmasq-debuginfo-0:2.66-21.el7_3.3.x86_64", "7Server-optional-7.3.AUS:dnsmasq-utils-0:2.66-21.el7_3.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N", "version": "3.1" }, "products": [ "7Server-7.3.AUS:dnsmasq-0:2.66-21.el7_3.3.src", "7Server-7.3.AUS:dnsmasq-0:2.66-21.el7_3.3.x86_64", "7Server-7.3.AUS:dnsmasq-debuginfo-0:2.66-21.el7_3.3.x86_64", "7Server-7.3.AUS:dnsmasq-utils-0:2.66-21.el7_3.3.x86_64", "7Server-optional-7.3.AUS:dnsmasq-0:2.66-21.el7_3.3.src", "7Server-optional-7.3.AUS:dnsmasq-0:2.66-21.el7_3.3.x86_64", "7Server-optional-7.3.AUS:dnsmasq-debuginfo-0:2.66-21.el7_3.3.x86_64", "7Server-optional-7.3.AUS:dnsmasq-utils-0:2.66-21.el7_3.3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "dnsmasq: loose query name check in reply_query() makes forging replies easier for an off-path attacker" }, { "acknowledgments": [ { "names": [ "Moshe Kol", "Shlomi Oberman" ], "organization": "JSOF" } ], "cve": "CVE-2020-25686", "cwe": { "id": "CWE-290", "name": "Authentication Bypass by Spoofing" }, "discovery_date": "2020-09-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1890125" } ], "notes": [ { "category": "description", "text": "A flaw was found in dnsmasq. When receiving a query, dnsmasq does not check for an existing pending request for the same name and forwards a new request. By default, a maximum of 150 pending queries can be sent to upstream servers, so there can be at most 150 queries for the same name. This flaw allows an off-path attacker on the network to substantially reduce the number of attempts that it would have to perform to forge a reply and have it accepted by dnsmasq. This issue is mentioned in the \"Birthday Attacks\" section of RFC5452. If chained with CVE-2020-25684, the attack complexity of a successful attack is reduced. The highest threat from this vulnerability is to data integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "dnsmasq: multiple queries forwarded for the same name makes forging replies easier for an off-path attacker", "title": "Vulnerability summary" }, { "category": "other", "text": "Dnsmasq may be run by libvirt and/or NetworkManager. libvirt uses dnsmasq by default to provide DNS service to its guests. NetworkManager may be configured to use dnsmasq to provide DNS service to the system, if a line `dns=dnsmasq` is present in the `[main]` section of the configuration file /etc/NetworkManager/NetworkManager.conf.\n\nIn Red Hat OpenStack Platform (RHOSP) and Red Hat Virtualization (RHV), the dnsmasq package is provided by the underlying Red Hat Enterprise Linux (RHEL) product. RHOSP and RHV are therefore indirectly affected, so please ensure that the underlying RHEL dnsmasq package is updated.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.3.AUS:dnsmasq-0:2.66-21.el7_3.3.src", "7Server-7.3.AUS:dnsmasq-0:2.66-21.el7_3.3.x86_64", "7Server-7.3.AUS:dnsmasq-debuginfo-0:2.66-21.el7_3.3.x86_64", "7Server-7.3.AUS:dnsmasq-utils-0:2.66-21.el7_3.3.x86_64", "7Server-optional-7.3.AUS:dnsmasq-0:2.66-21.el7_3.3.src", "7Server-optional-7.3.AUS:dnsmasq-0:2.66-21.el7_3.3.x86_64", "7Server-optional-7.3.AUS:dnsmasq-debuginfo-0:2.66-21.el7_3.3.x86_64", "7Server-optional-7.3.AUS:dnsmasq-utils-0:2.66-21.el7_3.3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-25686" }, { "category": "external", "summary": "RHBZ#1890125", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890125" }, { "category": "external", "summary": "RHSB-2021-001", "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-001" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-25686", "url": "https://www.cve.org/CVERecord?id=CVE-2020-25686" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25686", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25686" }, { "category": "external", "summary": "https://www.jsof-tech.com/disclosures/dnspooq/", "url": "https://www.jsof-tech.com/disclosures/dnspooq/" } ], "release_date": "2021-01-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-01-25T15:13:22+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-7.3.AUS:dnsmasq-0:2.66-21.el7_3.3.src", "7Server-7.3.AUS:dnsmasq-0:2.66-21.el7_3.3.x86_64", "7Server-7.3.AUS:dnsmasq-debuginfo-0:2.66-21.el7_3.3.x86_64", "7Server-7.3.AUS:dnsmasq-utils-0:2.66-21.el7_3.3.x86_64", "7Server-optional-7.3.AUS:dnsmasq-0:2.66-21.el7_3.3.src", "7Server-optional-7.3.AUS:dnsmasq-0:2.66-21.el7_3.3.x86_64", "7Server-optional-7.3.AUS:dnsmasq-debuginfo-0:2.66-21.el7_3.3.x86_64", "7Server-optional-7.3.AUS:dnsmasq-utils-0:2.66-21.el7_3.3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0245" }, { "category": "workaround", "details": "The impact of this flaw can be reduced by disabling the dnsmasq cache by adding `--cache-size=0` when calling dnsmasq or by adding a line with `cache-size=0` to the dnsmasq configuration file (/etc/dnsmasq.conf by default). \n\nWhen using Red Hat Enterprise Linux 8.3 with libvirt through a virt:rhel module, use `virsh net-edit \u003cnetwork-name\u003e` and reference https://libvirt.org/formatnetwork.html#elementsNamespaces to add the suggested option `cache-size=0`. \n\nThere is no way to customize the dnsmasq configuration generated by libvirt, when using versions of Red Hat Enterprise Linux prior to version 8.3. If dnsmasq is being run through NetworkManager, create a new file in /etc/NetworkManager/dnsmasq.d/ and add `cache-size=0` to it.\n\nIn all cases, by disabling the cache, you may experience a performance loss in your environment due to all DNS queries being forwarded to the upstream servers. Please evaluate if the mitigation is appropriate for the system\u2019s environment before applying.", "product_ids": [ "7Server-7.3.AUS:dnsmasq-0:2.66-21.el7_3.3.src", "7Server-7.3.AUS:dnsmasq-0:2.66-21.el7_3.3.x86_64", "7Server-7.3.AUS:dnsmasq-debuginfo-0:2.66-21.el7_3.3.x86_64", "7Server-7.3.AUS:dnsmasq-utils-0:2.66-21.el7_3.3.x86_64", "7Server-optional-7.3.AUS:dnsmasq-0:2.66-21.el7_3.3.src", "7Server-optional-7.3.AUS:dnsmasq-0:2.66-21.el7_3.3.x86_64", "7Server-optional-7.3.AUS:dnsmasq-debuginfo-0:2.66-21.el7_3.3.x86_64", "7Server-optional-7.3.AUS:dnsmasq-utils-0:2.66-21.el7_3.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N", "version": "3.1" }, "products": [ "7Server-7.3.AUS:dnsmasq-0:2.66-21.el7_3.3.src", "7Server-7.3.AUS:dnsmasq-0:2.66-21.el7_3.3.x86_64", "7Server-7.3.AUS:dnsmasq-debuginfo-0:2.66-21.el7_3.3.x86_64", "7Server-7.3.AUS:dnsmasq-utils-0:2.66-21.el7_3.3.x86_64", "7Server-optional-7.3.AUS:dnsmasq-0:2.66-21.el7_3.3.src", "7Server-optional-7.3.AUS:dnsmasq-0:2.66-21.el7_3.3.x86_64", "7Server-optional-7.3.AUS:dnsmasq-debuginfo-0:2.66-21.el7_3.3.x86_64", "7Server-optional-7.3.AUS:dnsmasq-utils-0:2.66-21.el7_3.3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "dnsmasq: multiple queries forwarded for the same name makes forging replies easier for an off-path attacker" } ] }
rhsa-2021_0401
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for imgbased, redhat-release-virtualization-host, and redhat-virtualization-host is now available for Red Hat Virtualization 4 for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The redhat-virtualization-host packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. Red Hat Virtualization Hosts (RHVH) are installed using a special build of Red Hat Enterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host\u0027s resources and performing administrative tasks. \n\nSecurity Fix(es):\n\n* sudo: Heap buffer overflow in argument parsing (CVE-2021-3156)\n\n* dnsmasq: loose address/port check in reply_query() makes forging replies easier for an off-path attacker (CVE-2020-25684)\n\n* dnsmasq: loose query name check in reply_query() makes forging replies easier for an off-path attacker (CVE-2020-25685)\n\n* dnsmasq: multiple queries forwarded for the same name makes forging replies easier for an off-path attacker (CVE-2020-25686)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* Previously, the Red Hat Virtualization Host (RHV-H) repository (rhvh-4-for-rhel-8-x86_64-rpms) did not include the libsmbclient package, which is a dependency for the sssd-ad package. Consequently, the sssd-ad package failed to install.\n\nWith this update, the libsmbclient is now in the RHV-H repository, and sssd-ad now installs on RHV-H. (BZ#1868967)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:0401", "url": "https://access.redhat.com/errata/RHSA-2021:0401" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-001", "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-001" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-002", "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-002" }, { "category": "external", "summary": "1850939", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1850939" }, { "category": "external", "summary": "1868967", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1868967" }, { "category": "external", "summary": "1889686", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889686" }, { "category": "external", "summary": "1889688", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889688" }, { "category": "external", "summary": "1890125", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890125" }, { "category": "external", "summary": "1902315", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1902315" }, { "category": "external", "summary": "1902646", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1902646" }, { "category": "external", "summary": "1909644", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1909644" }, { "category": "external", "summary": "1917684", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1917684" }, { "category": "external", "summary": "1921553", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1921553" }, { "category": "external", "summary": "1923126", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1923126" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_0401.json" } ], "title": "Red Hat Security Advisory: Red Hat Virtualization Host security bug fix and enhancement update [ovirt-4.4.4]", "tracking": { "current_release_date": "2024-11-15T11:45:58+00:00", "generator": { "date": "2024-11-15T11:45:58+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2021:0401", "initial_release_date": "2021-02-03T16:14:40+00:00", "revision_history": [ { "date": "2021-02-03T16:14:40+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-02-03T16:14:40+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-15T11:45:58+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Virtualization 4 Hypervisor for RHEL 8", "product": { "name": "Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhev_hypervisor:4.4::el8" } } }, { "category": "product_name", "name": "RHEL 8-based RHEV-H for RHEV 4 (build requirements)", "product": { "name": "RHEL 8-based RHEV-H for RHEV 4 (build requirements)", "product_id": "8Base-RHV-HypervisorBuild-4", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhev_hypervisor:4.4::el8" } } }, { "category": "product_name", "name": "Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product": { "name": "Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "8Base-RHV-Agents-4", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhev_hypervisor:4.4::el8" } } } ], "category": "product_family", "name": "Red Hat Virtualization" }, { "branches": [ { "category": "product_version", "name": "libsmbclient-0:4.12.3-12.el8.3.x86_64", "product": { "name": "libsmbclient-0:4.12.3-12.el8.3.x86_64", "product_id": "libsmbclient-0:4.12.3-12.el8.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libsmbclient@4.12.3-12.el8.3?arch=x86_64" } } }, { "category": "product_version", "name": "samba-debugsource-0:4.12.3-12.el8.3.x86_64", "product": { "name": "samba-debugsource-0:4.12.3-12.el8.3.x86_64", "product_id": "samba-debugsource-0:4.12.3-12.el8.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/samba-debugsource@4.12.3-12.el8.3?arch=x86_64" } } }, { "category": "product_version", "name": "libsmbclient-debuginfo-0:4.12.3-12.el8.3.x86_64", "product": { "name": "libsmbclient-debuginfo-0:4.12.3-12.el8.3.x86_64", "product_id": "libsmbclient-debuginfo-0:4.12.3-12.el8.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libsmbclient-debuginfo@4.12.3-12.el8.3?arch=x86_64" } } }, { "category": "product_version", "name": "samba-debuginfo-0:4.12.3-12.el8.3.x86_64", "product": { "name": "samba-debuginfo-0:4.12.3-12.el8.3.x86_64", "product_id": "samba-debuginfo-0:4.12.3-12.el8.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/samba-debuginfo@4.12.3-12.el8.3?arch=x86_64" } } }, { "category": "product_version", "name": "libipa_hbac-0:2.3.0-9.el8.x86_64", "product": { "name": "libipa_hbac-0:2.3.0-9.el8.x86_64", "product_id": "libipa_hbac-0:2.3.0-9.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libipa_hbac@2.3.0-9.el8?arch=x86_64" } } }, { "category": "product_version", "name": "libsss_autofs-0:2.3.0-9.el8.x86_64", "product": { "name": "libsss_autofs-0:2.3.0-9.el8.x86_64", "product_id": "libsss_autofs-0:2.3.0-9.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libsss_autofs@2.3.0-9.el8?arch=x86_64" } } }, { "category": "product_version", "name": "libsss_certmap-0:2.3.0-9.el8.x86_64", "product": { "name": "libsss_certmap-0:2.3.0-9.el8.x86_64", "product_id": "libsss_certmap-0:2.3.0-9.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libsss_certmap@2.3.0-9.el8?arch=x86_64" } } }, { "category": "product_version", "name": "libsss_idmap-0:2.3.0-9.el8.x86_64", "product": { "name": "libsss_idmap-0:2.3.0-9.el8.x86_64", "product_id": "libsss_idmap-0:2.3.0-9.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libsss_idmap@2.3.0-9.el8?arch=x86_64" } } }, { "category": "product_version", "name": "libsss_nss_idmap-0:2.3.0-9.el8.x86_64", "product": { "name": "libsss_nss_idmap-0:2.3.0-9.el8.x86_64", "product_id": "libsss_nss_idmap-0:2.3.0-9.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libsss_nss_idmap@2.3.0-9.el8?arch=x86_64" } } }, { "category": "product_version", "name": "libsss_nss_idmap-devel-0:2.3.0-9.el8.x86_64", "product": { "name": "libsss_nss_idmap-devel-0:2.3.0-9.el8.x86_64", "product_id": "libsss_nss_idmap-devel-0:2.3.0-9.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libsss_nss_idmap-devel@2.3.0-9.el8?arch=x86_64" } } }, { "category": "product_version", "name": "libsss_simpleifp-0:2.3.0-9.el8.x86_64", "product": { "name": "libsss_simpleifp-0:2.3.0-9.el8.x86_64", "product_id": "libsss_simpleifp-0:2.3.0-9.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libsss_simpleifp@2.3.0-9.el8?arch=x86_64" } } }, { "category": "product_version", "name": "libsss_sudo-0:2.3.0-9.el8.x86_64", "product": { "name": "libsss_sudo-0:2.3.0-9.el8.x86_64", "product_id": "libsss_sudo-0:2.3.0-9.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libsss_sudo@2.3.0-9.el8?arch=x86_64" } } }, { "category": "product_version", "name": "python3-libipa_hbac-0:2.3.0-9.el8.x86_64", "product": { "name": "python3-libipa_hbac-0:2.3.0-9.el8.x86_64", "product_id": "python3-libipa_hbac-0:2.3.0-9.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-libipa_hbac@2.3.0-9.el8?arch=x86_64" } } }, { "category": "product_version", "name": "python3-libsss_nss_idmap-0:2.3.0-9.el8.x86_64", "product": { "name": "python3-libsss_nss_idmap-0:2.3.0-9.el8.x86_64", "product_id": "python3-libsss_nss_idmap-0:2.3.0-9.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-libsss_nss_idmap@2.3.0-9.el8?arch=x86_64" } } }, { "category": "product_version", "name": "python3-sss-0:2.3.0-9.el8.x86_64", "product": { "name": "python3-sss-0:2.3.0-9.el8.x86_64", "product_id": "python3-sss-0:2.3.0-9.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-sss@2.3.0-9.el8?arch=x86_64" } } }, { "category": "product_version", "name": "python3-sss-murmur-0:2.3.0-9.el8.x86_64", "product": { "name": "python3-sss-murmur-0:2.3.0-9.el8.x86_64", "product_id": "python3-sss-murmur-0:2.3.0-9.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-sss-murmur@2.3.0-9.el8?arch=x86_64" } } }, { "category": "product_version", "name": "sssd-0:2.3.0-9.el8.x86_64", "product": { "name": "sssd-0:2.3.0-9.el8.x86_64", "product_id": "sssd-0:2.3.0-9.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/sssd@2.3.0-9.el8?arch=x86_64" } } }, { "category": "product_version", "name": "sssd-ad-0:2.3.0-9.el8.x86_64", "product": { "name": "sssd-ad-0:2.3.0-9.el8.x86_64", "product_id": "sssd-ad-0:2.3.0-9.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/sssd-ad@2.3.0-9.el8?arch=x86_64" } } }, { "category": "product_version", "name": "sssd-client-0:2.3.0-9.el8.x86_64", "product": { "name": "sssd-client-0:2.3.0-9.el8.x86_64", "product_id": "sssd-client-0:2.3.0-9.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/sssd-client@2.3.0-9.el8?arch=x86_64" } } }, { "category": "product_version", "name": "sssd-common-0:2.3.0-9.el8.x86_64", "product": { "name": "sssd-common-0:2.3.0-9.el8.x86_64", "product_id": "sssd-common-0:2.3.0-9.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/sssd-common@2.3.0-9.el8?arch=x86_64" } } }, { "category": "product_version", "name": "sssd-common-pac-0:2.3.0-9.el8.x86_64", "product": { "name": "sssd-common-pac-0:2.3.0-9.el8.x86_64", "product_id": "sssd-common-pac-0:2.3.0-9.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/sssd-common-pac@2.3.0-9.el8?arch=x86_64" } } }, { "category": "product_version", "name": "sssd-dbus-0:2.3.0-9.el8.x86_64", "product": { "name": "sssd-dbus-0:2.3.0-9.el8.x86_64", "product_id": "sssd-dbus-0:2.3.0-9.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/sssd-dbus@2.3.0-9.el8?arch=x86_64" } } }, { "category": "product_version", "name": "sssd-ipa-0:2.3.0-9.el8.x86_64", "product": { "name": "sssd-ipa-0:2.3.0-9.el8.x86_64", "product_id": "sssd-ipa-0:2.3.0-9.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/sssd-ipa@2.3.0-9.el8?arch=x86_64" } } }, { "category": "product_version", "name": "sssd-kcm-0:2.3.0-9.el8.x86_64", "product": { "name": "sssd-kcm-0:2.3.0-9.el8.x86_64", "product_id": "sssd-kcm-0:2.3.0-9.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/sssd-kcm@2.3.0-9.el8?arch=x86_64" } } }, { "category": "product_version", "name": "sssd-krb5-0:2.3.0-9.el8.x86_64", "product": { "name": "sssd-krb5-0:2.3.0-9.el8.x86_64", "product_id": "sssd-krb5-0:2.3.0-9.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/sssd-krb5@2.3.0-9.el8?arch=x86_64" } } }, { "category": "product_version", "name": "sssd-krb5-common-0:2.3.0-9.el8.x86_64", "product": { "name": "sssd-krb5-common-0:2.3.0-9.el8.x86_64", "product_id": "sssd-krb5-common-0:2.3.0-9.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/sssd-krb5-common@2.3.0-9.el8?arch=x86_64" } } }, { "category": "product_version", "name": "sssd-ldap-0:2.3.0-9.el8.x86_64", "product": { "name": "sssd-ldap-0:2.3.0-9.el8.x86_64", "product_id": "sssd-ldap-0:2.3.0-9.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/sssd-ldap@2.3.0-9.el8?arch=x86_64" } } }, { "category": "product_version", "name": "sssd-libwbclient-0:2.3.0-9.el8.x86_64", "product": { "name": "sssd-libwbclient-0:2.3.0-9.el8.x86_64", "product_id": "sssd-libwbclient-0:2.3.0-9.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/sssd-libwbclient@2.3.0-9.el8?arch=x86_64" } } }, { "category": "product_version", "name": "sssd-nfs-idmap-0:2.3.0-9.el8.x86_64", "product": { "name": "sssd-nfs-idmap-0:2.3.0-9.el8.x86_64", "product_id": "sssd-nfs-idmap-0:2.3.0-9.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/sssd-nfs-idmap@2.3.0-9.el8?arch=x86_64" } } }, { "category": "product_version", "name": "sssd-polkit-rules-0:2.3.0-9.el8.x86_64", "product": { "name": "sssd-polkit-rules-0:2.3.0-9.el8.x86_64", "product_id": "sssd-polkit-rules-0:2.3.0-9.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/sssd-polkit-rules@2.3.0-9.el8?arch=x86_64" } } }, { "category": "product_version", "name": "sssd-proxy-0:2.3.0-9.el8.x86_64", "product": { "name": "sssd-proxy-0:2.3.0-9.el8.x86_64", "product_id": "sssd-proxy-0:2.3.0-9.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/sssd-proxy@2.3.0-9.el8?arch=x86_64" } } }, { "category": "product_version", "name": "sssd-tools-0:2.3.0-9.el8.x86_64", "product": { "name": "sssd-tools-0:2.3.0-9.el8.x86_64", "product_id": "sssd-tools-0:2.3.0-9.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/sssd-tools@2.3.0-9.el8?arch=x86_64" } } }, { "category": "product_version", "name": "sssd-winbind-idmap-0:2.3.0-9.el8.x86_64", "product": { "name": "sssd-winbind-idmap-0:2.3.0-9.el8.x86_64", "product_id": "sssd-winbind-idmap-0:2.3.0-9.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/sssd-winbind-idmap@2.3.0-9.el8?arch=x86_64" } } }, { "category": "product_version", "name": "sssd-debugsource-0:2.3.0-9.el8.x86_64", "product": { "name": "sssd-debugsource-0:2.3.0-9.el8.x86_64", "product_id": "sssd-debugsource-0:2.3.0-9.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/sssd-debugsource@2.3.0-9.el8?arch=x86_64" } } }, { "category": "product_version", "name": "libipa_hbac-debuginfo-0:2.3.0-9.el8.x86_64", "product": { "name": "libipa_hbac-debuginfo-0:2.3.0-9.el8.x86_64", "product_id": "libipa_hbac-debuginfo-0:2.3.0-9.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libipa_hbac-debuginfo@2.3.0-9.el8?arch=x86_64" } } }, { "category": "product_version", "name": "libsss_autofs-debuginfo-0:2.3.0-9.el8.x86_64", "product": { "name": "libsss_autofs-debuginfo-0:2.3.0-9.el8.x86_64", "product_id": "libsss_autofs-debuginfo-0:2.3.0-9.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libsss_autofs-debuginfo@2.3.0-9.el8?arch=x86_64" } } }, { "category": "product_version", "name": "libsss_certmap-debuginfo-0:2.3.0-9.el8.x86_64", "product": { "name": "libsss_certmap-debuginfo-0:2.3.0-9.el8.x86_64", "product_id": "libsss_certmap-debuginfo-0:2.3.0-9.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libsss_certmap-debuginfo@2.3.0-9.el8?arch=x86_64" } } }, { "category": "product_version", "name": "libsss_idmap-debuginfo-0:2.3.0-9.el8.x86_64", "product": { "name": "libsss_idmap-debuginfo-0:2.3.0-9.el8.x86_64", "product_id": "libsss_idmap-debuginfo-0:2.3.0-9.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libsss_idmap-debuginfo@2.3.0-9.el8?arch=x86_64" } } }, { "category": "product_version", "name": "libsss_nss_idmap-debuginfo-0:2.3.0-9.el8.x86_64", "product": { "name": "libsss_nss_idmap-debuginfo-0:2.3.0-9.el8.x86_64", "product_id": "libsss_nss_idmap-debuginfo-0:2.3.0-9.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libsss_nss_idmap-debuginfo@2.3.0-9.el8?arch=x86_64" } } }, { "category": "product_version", "name": "libsss_simpleifp-debuginfo-0:2.3.0-9.el8.x86_64", "product": { "name": "libsss_simpleifp-debuginfo-0:2.3.0-9.el8.x86_64", "product_id": "libsss_simpleifp-debuginfo-0:2.3.0-9.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libsss_simpleifp-debuginfo@2.3.0-9.el8?arch=x86_64" } } }, { "category": "product_version", "name": "libsss_sudo-debuginfo-0:2.3.0-9.el8.x86_64", "product": { "name": "libsss_sudo-debuginfo-0:2.3.0-9.el8.x86_64", "product_id": "libsss_sudo-debuginfo-0:2.3.0-9.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libsss_sudo-debuginfo@2.3.0-9.el8?arch=x86_64" } } }, { "category": "product_version", "name": "python3-libipa_hbac-debuginfo-0:2.3.0-9.el8.x86_64", "product": { "name": "python3-libipa_hbac-debuginfo-0:2.3.0-9.el8.x86_64", "product_id": "python3-libipa_hbac-debuginfo-0:2.3.0-9.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-libipa_hbac-debuginfo@2.3.0-9.el8?arch=x86_64" } } }, { "category": "product_version", "name": "python3-libsss_nss_idmap-debuginfo-0:2.3.0-9.el8.x86_64", "product": { "name": "python3-libsss_nss_idmap-debuginfo-0:2.3.0-9.el8.x86_64", "product_id": "python3-libsss_nss_idmap-debuginfo-0:2.3.0-9.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-libsss_nss_idmap-debuginfo@2.3.0-9.el8?arch=x86_64" } } }, { "category": "product_version", "name": "python3-sss-debuginfo-0:2.3.0-9.el8.x86_64", "product": { "name": "python3-sss-debuginfo-0:2.3.0-9.el8.x86_64", "product_id": "python3-sss-debuginfo-0:2.3.0-9.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-sss-debuginfo@2.3.0-9.el8?arch=x86_64" } } }, { "category": "product_version", "name": "python3-sss-murmur-debuginfo-0:2.3.0-9.el8.x86_64", "product": { "name": "python3-sss-murmur-debuginfo-0:2.3.0-9.el8.x86_64", "product_id": "python3-sss-murmur-debuginfo-0:2.3.0-9.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-sss-murmur-debuginfo@2.3.0-9.el8?arch=x86_64" } } }, { "category": "product_version", "name": "sssd-ad-debuginfo-0:2.3.0-9.el8.x86_64", "product": { "name": "sssd-ad-debuginfo-0:2.3.0-9.el8.x86_64", "product_id": "sssd-ad-debuginfo-0:2.3.0-9.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/sssd-ad-debuginfo@2.3.0-9.el8?arch=x86_64" } } }, { "category": "product_version", "name": "sssd-client-debuginfo-0:2.3.0-9.el8.x86_64", "product": { "name": "sssd-client-debuginfo-0:2.3.0-9.el8.x86_64", "product_id": "sssd-client-debuginfo-0:2.3.0-9.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/sssd-client-debuginfo@2.3.0-9.el8?arch=x86_64" } } }, { "category": "product_version", "name": "sssd-common-debuginfo-0:2.3.0-9.el8.x86_64", "product": { "name": "sssd-common-debuginfo-0:2.3.0-9.el8.x86_64", "product_id": "sssd-common-debuginfo-0:2.3.0-9.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/sssd-common-debuginfo@2.3.0-9.el8?arch=x86_64" } } }, { "category": "product_version", "name": "sssd-common-pac-debuginfo-0:2.3.0-9.el8.x86_64", "product": { "name": "sssd-common-pac-debuginfo-0:2.3.0-9.el8.x86_64", "product_id": "sssd-common-pac-debuginfo-0:2.3.0-9.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/sssd-common-pac-debuginfo@2.3.0-9.el8?arch=x86_64" } } }, { "category": "product_version", "name": "sssd-dbus-debuginfo-0:2.3.0-9.el8.x86_64", "product": { "name": "sssd-dbus-debuginfo-0:2.3.0-9.el8.x86_64", "product_id": "sssd-dbus-debuginfo-0:2.3.0-9.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/sssd-dbus-debuginfo@2.3.0-9.el8?arch=x86_64" } } }, { "category": "product_version", "name": "sssd-debuginfo-0:2.3.0-9.el8.x86_64", "product": { "name": "sssd-debuginfo-0:2.3.0-9.el8.x86_64", "product_id": "sssd-debuginfo-0:2.3.0-9.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/sssd-debuginfo@2.3.0-9.el8?arch=x86_64" } } }, { "category": "product_version", "name": "sssd-ipa-debuginfo-0:2.3.0-9.el8.x86_64", "product": { "name": "sssd-ipa-debuginfo-0:2.3.0-9.el8.x86_64", "product_id": "sssd-ipa-debuginfo-0:2.3.0-9.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/sssd-ipa-debuginfo@2.3.0-9.el8?arch=x86_64" } } }, { "category": "product_version", "name": "sssd-kcm-debuginfo-0:2.3.0-9.el8.x86_64", "product": { "name": "sssd-kcm-debuginfo-0:2.3.0-9.el8.x86_64", "product_id": "sssd-kcm-debuginfo-0:2.3.0-9.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/sssd-kcm-debuginfo@2.3.0-9.el8?arch=x86_64" } } }, { "category": "product_version", "name": "sssd-krb5-common-debuginfo-0:2.3.0-9.el8.x86_64", "product": { "name": "sssd-krb5-common-debuginfo-0:2.3.0-9.el8.x86_64", "product_id": "sssd-krb5-common-debuginfo-0:2.3.0-9.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/sssd-krb5-common-debuginfo@2.3.0-9.el8?arch=x86_64" } } }, { "category": "product_version", "name": "sssd-krb5-debuginfo-0:2.3.0-9.el8.x86_64", "product": { "name": "sssd-krb5-debuginfo-0:2.3.0-9.el8.x86_64", "product_id": "sssd-krb5-debuginfo-0:2.3.0-9.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/sssd-krb5-debuginfo@2.3.0-9.el8?arch=x86_64" } } }, { "category": "product_version", "name": "sssd-ldap-debuginfo-0:2.3.0-9.el8.x86_64", "product": { "name": "sssd-ldap-debuginfo-0:2.3.0-9.el8.x86_64", "product_id": "sssd-ldap-debuginfo-0:2.3.0-9.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/sssd-ldap-debuginfo@2.3.0-9.el8?arch=x86_64" } } }, { "category": "product_version", "name": "sssd-libwbclient-debuginfo-0:2.3.0-9.el8.x86_64", "product": { "name": "sssd-libwbclient-debuginfo-0:2.3.0-9.el8.x86_64", "product_id": "sssd-libwbclient-debuginfo-0:2.3.0-9.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/sssd-libwbclient-debuginfo@2.3.0-9.el8?arch=x86_64" } } }, { "category": "product_version", "name": "sssd-nfs-idmap-debuginfo-0:2.3.0-9.el8.x86_64", "product": { "name": "sssd-nfs-idmap-debuginfo-0:2.3.0-9.el8.x86_64", "product_id": "sssd-nfs-idmap-debuginfo-0:2.3.0-9.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/sssd-nfs-idmap-debuginfo@2.3.0-9.el8?arch=x86_64" } } }, { "category": "product_version", "name": "sssd-proxy-debuginfo-0:2.3.0-9.el8.x86_64", "product": { "name": "sssd-proxy-debuginfo-0:2.3.0-9.el8.x86_64", "product_id": "sssd-proxy-debuginfo-0:2.3.0-9.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/sssd-proxy-debuginfo@2.3.0-9.el8?arch=x86_64" } } }, { "category": "product_version", "name": "sssd-tools-debuginfo-0:2.3.0-9.el8.x86_64", "product": { "name": "sssd-tools-debuginfo-0:2.3.0-9.el8.x86_64", "product_id": "sssd-tools-debuginfo-0:2.3.0-9.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/sssd-tools-debuginfo@2.3.0-9.el8?arch=x86_64" } } }, { "category": "product_version", "name": "sssd-winbind-idmap-debuginfo-0:2.3.0-9.el8.x86_64", "product": { "name": "sssd-winbind-idmap-debuginfo-0:2.3.0-9.el8.x86_64", "product_id": "sssd-winbind-idmap-debuginfo-0:2.3.0-9.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/sssd-winbind-idmap-debuginfo@2.3.0-9.el8?arch=x86_64" } } }, { "category": "product_version", "name": "redhat-release-virtualization-host-0:4.4.4-1.el8ev.x86_64", "product": { "name": "redhat-release-virtualization-host-0:4.4.4-1.el8ev.x86_64", "product_id": "redhat-release-virtualization-host-0:4.4.4-1.el8ev.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/redhat-release-virtualization-host@4.4.4-1.el8ev?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "samba-0:4.12.3-12.el8.3.src", "product": { "name": "samba-0:4.12.3-12.el8.3.src", "product_id": "samba-0:4.12.3-12.el8.3.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/samba@4.12.3-12.el8.3?arch=src" } } }, { "category": "product_version", "name": "sssd-0:2.3.0-9.el8.src", "product": { "name": "sssd-0:2.3.0-9.el8.src", "product_id": "sssd-0:2.3.0-9.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/sssd@2.3.0-9.el8?arch=src" } } }, { "category": "product_version", "name": "redhat-release-virtualization-host-0:4.4.4-1.el8ev.src", "product": { "name": "redhat-release-virtualization-host-0:4.4.4-1.el8ev.src", "product_id": "redhat-release-virtualization-host-0:4.4.4-1.el8ev.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/redhat-release-virtualization-host@4.4.4-1.el8ev?arch=src" } } }, { "category": "product_version", "name": "cockpit-ovirt-0:0.14.17-1.el8ev.src", "product": { "name": "cockpit-ovirt-0:0.14.17-1.el8ev.src", "product_id": "cockpit-ovirt-0:0.14.17-1.el8ev.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/cockpit-ovirt@0.14.17-1.el8ev?arch=src" } } }, { "category": "product_version", "name": "imgbased-0:1.2.16-0.1.el8ev.src", "product": { "name": "imgbased-0:1.2.16-0.1.el8ev.src", "product_id": "imgbased-0:1.2.16-0.1.el8ev.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/imgbased@1.2.16-0.1.el8ev?arch=src" } } }, { "category": "product_version", "name": "redhat-virtualization-host-0:4.4.4-20210201.0.el8_3.src", "product": { "name": "redhat-virtualization-host-0:4.4.4-20210201.0.el8_3.src", "product_id": "redhat-virtualization-host-0:4.4.4-20210201.0.el8_3.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/redhat-virtualization-host@4.4.4-20210201.0.el8_3?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "python3-sssdconfig-0:2.3.0-9.el8.noarch", "product": { "name": "python3-sssdconfig-0:2.3.0-9.el8.noarch", "product_id": "python3-sssdconfig-0:2.3.0-9.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-sssdconfig@2.3.0-9.el8?arch=noarch" } } }, { "category": "product_version", "name": "redhat-virtualization-host-image-update-placeholder-0:4.4.4-1.el8ev.noarch", "product": { "name": "redhat-virtualization-host-image-update-placeholder-0:4.4.4-1.el8ev.noarch", "product_id": "redhat-virtualization-host-image-update-placeholder-0:4.4.4-1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/redhat-virtualization-host-image-update-placeholder@4.4.4-1.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "cockpit-ovirt-dashboard-0:0.14.17-1.el8ev.noarch", "product": { "name": "cockpit-ovirt-dashboard-0:0.14.17-1.el8ev.noarch", "product_id": "cockpit-ovirt-dashboard-0:0.14.17-1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/cockpit-ovirt-dashboard@0.14.17-1.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "imgbased-0:1.2.16-0.1.el8ev.noarch", "product": { "name": "imgbased-0:1.2.16-0.1.el8ev.noarch", "product_id": "imgbased-0:1.2.16-0.1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/imgbased@1.2.16-0.1.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "python3-imgbased-0:1.2.16-0.1.el8ev.noarch", "product": { "name": "python3-imgbased-0:1.2.16-0.1.el8ev.noarch", "product_id": "python3-imgbased-0:1.2.16-0.1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-imgbased@1.2.16-0.1.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "redhat-virtualization-host-image-update-0:4.4.4-20210201.0.el8_3.noarch", "product": { "name": "redhat-virtualization-host-image-update-0:4.4.4-20210201.0.el8_3.noarch", "product_id": "redhat-virtualization-host-image-update-0:4.4.4-20210201.0.el8_3.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/redhat-virtualization-host-image-update@4.4.4-20210201.0.el8_3?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "cockpit-ovirt-0:0.14.17-1.el8ev.src as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "8Base-RHV-Agents-4:cockpit-ovirt-0:0.14.17-1.el8ev.src" }, "product_reference": "cockpit-ovirt-0:0.14.17-1.el8ev.src", "relates_to_product_reference": "8Base-RHV-Agents-4" }, { "category": "default_component_of", "full_product_name": { "name": "cockpit-ovirt-dashboard-0:0.14.17-1.el8ev.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "8Base-RHV-Agents-4:cockpit-ovirt-dashboard-0:0.14.17-1.el8ev.noarch" }, "product_reference": "cockpit-ovirt-dashboard-0:0.14.17-1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-Agents-4" }, { "category": "default_component_of", "full_product_name": { "name": "libipa_hbac-0:2.3.0-9.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:libipa_hbac-0:2.3.0-9.el8.x86_64" }, "product_reference": "libipa_hbac-0:2.3.0-9.el8.x86_64", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "libipa_hbac-debuginfo-0:2.3.0-9.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:libipa_hbac-debuginfo-0:2.3.0-9.el8.x86_64" }, "product_reference": "libipa_hbac-debuginfo-0:2.3.0-9.el8.x86_64", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "libsmbclient-0:4.12.3-12.el8.3.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:libsmbclient-0:4.12.3-12.el8.3.x86_64" }, "product_reference": "libsmbclient-0:4.12.3-12.el8.3.x86_64", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "libsmbclient-debuginfo-0:4.12.3-12.el8.3.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:libsmbclient-debuginfo-0:4.12.3-12.el8.3.x86_64" }, "product_reference": "libsmbclient-debuginfo-0:4.12.3-12.el8.3.x86_64", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "libsss_autofs-0:2.3.0-9.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:libsss_autofs-0:2.3.0-9.el8.x86_64" }, "product_reference": "libsss_autofs-0:2.3.0-9.el8.x86_64", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "libsss_autofs-debuginfo-0:2.3.0-9.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:libsss_autofs-debuginfo-0:2.3.0-9.el8.x86_64" }, "product_reference": "libsss_autofs-debuginfo-0:2.3.0-9.el8.x86_64", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "libsss_certmap-0:2.3.0-9.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:libsss_certmap-0:2.3.0-9.el8.x86_64" }, "product_reference": "libsss_certmap-0:2.3.0-9.el8.x86_64", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "libsss_certmap-debuginfo-0:2.3.0-9.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:libsss_certmap-debuginfo-0:2.3.0-9.el8.x86_64" }, "product_reference": "libsss_certmap-debuginfo-0:2.3.0-9.el8.x86_64", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "libsss_idmap-0:2.3.0-9.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:libsss_idmap-0:2.3.0-9.el8.x86_64" }, "product_reference": "libsss_idmap-0:2.3.0-9.el8.x86_64", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "libsss_idmap-debuginfo-0:2.3.0-9.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:libsss_idmap-debuginfo-0:2.3.0-9.el8.x86_64" }, "product_reference": "libsss_idmap-debuginfo-0:2.3.0-9.el8.x86_64", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "libsss_nss_idmap-0:2.3.0-9.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:libsss_nss_idmap-0:2.3.0-9.el8.x86_64" }, "product_reference": "libsss_nss_idmap-0:2.3.0-9.el8.x86_64", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "libsss_nss_idmap-debuginfo-0:2.3.0-9.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:libsss_nss_idmap-debuginfo-0:2.3.0-9.el8.x86_64" }, "product_reference": "libsss_nss_idmap-debuginfo-0:2.3.0-9.el8.x86_64", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "libsss_nss_idmap-devel-0:2.3.0-9.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:libsss_nss_idmap-devel-0:2.3.0-9.el8.x86_64" }, "product_reference": "libsss_nss_idmap-devel-0:2.3.0-9.el8.x86_64", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "libsss_simpleifp-0:2.3.0-9.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:libsss_simpleifp-0:2.3.0-9.el8.x86_64" }, "product_reference": "libsss_simpleifp-0:2.3.0-9.el8.x86_64", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "libsss_simpleifp-debuginfo-0:2.3.0-9.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:libsss_simpleifp-debuginfo-0:2.3.0-9.el8.x86_64" }, "product_reference": "libsss_simpleifp-debuginfo-0:2.3.0-9.el8.x86_64", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "libsss_sudo-0:2.3.0-9.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:libsss_sudo-0:2.3.0-9.el8.x86_64" }, "product_reference": "libsss_sudo-0:2.3.0-9.el8.x86_64", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "libsss_sudo-debuginfo-0:2.3.0-9.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:libsss_sudo-debuginfo-0:2.3.0-9.el8.x86_64" }, "product_reference": "libsss_sudo-debuginfo-0:2.3.0-9.el8.x86_64", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "python3-libipa_hbac-0:2.3.0-9.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:python3-libipa_hbac-0:2.3.0-9.el8.x86_64" }, "product_reference": "python3-libipa_hbac-0:2.3.0-9.el8.x86_64", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "python3-libipa_hbac-debuginfo-0:2.3.0-9.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:python3-libipa_hbac-debuginfo-0:2.3.0-9.el8.x86_64" }, "product_reference": "python3-libipa_hbac-debuginfo-0:2.3.0-9.el8.x86_64", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "python3-libsss_nss_idmap-0:2.3.0-9.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:python3-libsss_nss_idmap-0:2.3.0-9.el8.x86_64" }, "product_reference": "python3-libsss_nss_idmap-0:2.3.0-9.el8.x86_64", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "python3-libsss_nss_idmap-debuginfo-0:2.3.0-9.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:python3-libsss_nss_idmap-debuginfo-0:2.3.0-9.el8.x86_64" }, "product_reference": "python3-libsss_nss_idmap-debuginfo-0:2.3.0-9.el8.x86_64", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "python3-sss-0:2.3.0-9.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:python3-sss-0:2.3.0-9.el8.x86_64" }, "product_reference": "python3-sss-0:2.3.0-9.el8.x86_64", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "python3-sss-debuginfo-0:2.3.0-9.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:python3-sss-debuginfo-0:2.3.0-9.el8.x86_64" }, "product_reference": "python3-sss-debuginfo-0:2.3.0-9.el8.x86_64", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "python3-sss-murmur-0:2.3.0-9.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:python3-sss-murmur-0:2.3.0-9.el8.x86_64" }, "product_reference": "python3-sss-murmur-0:2.3.0-9.el8.x86_64", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "python3-sss-murmur-debuginfo-0:2.3.0-9.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:python3-sss-murmur-debuginfo-0:2.3.0-9.el8.x86_64" }, "product_reference": "python3-sss-murmur-debuginfo-0:2.3.0-9.el8.x86_64", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "python3-sssdconfig-0:2.3.0-9.el8.noarch as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:python3-sssdconfig-0:2.3.0-9.el8.noarch" }, "product_reference": "python3-sssdconfig-0:2.3.0-9.el8.noarch", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "redhat-virtualization-host-0:4.4.4-20210201.0.el8_3.src as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.4-20210201.0.el8_3.src" }, "product_reference": "redhat-virtualization-host-0:4.4.4-20210201.0.el8_3.src", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "redhat-virtualization-host-image-update-0:4.4.4-20210201.0.el8_3.noarch as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.4-20210201.0.el8_3.noarch" }, "product_reference": "redhat-virtualization-host-image-update-0:4.4.4-20210201.0.el8_3.noarch", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "samba-0:4.12.3-12.el8.3.src as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:samba-0:4.12.3-12.el8.3.src" }, "product_reference": "samba-0:4.12.3-12.el8.3.src", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "samba-debuginfo-0:4.12.3-12.el8.3.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:samba-debuginfo-0:4.12.3-12.el8.3.x86_64" }, "product_reference": "samba-debuginfo-0:4.12.3-12.el8.3.x86_64", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "samba-debugsource-0:4.12.3-12.el8.3.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:samba-debugsource-0:4.12.3-12.el8.3.x86_64" }, "product_reference": "samba-debugsource-0:4.12.3-12.el8.3.x86_64", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "sssd-0:2.3.0-9.el8.src as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:sssd-0:2.3.0-9.el8.src" }, "product_reference": "sssd-0:2.3.0-9.el8.src", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "sssd-0:2.3.0-9.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:sssd-0:2.3.0-9.el8.x86_64" }, "product_reference": "sssd-0:2.3.0-9.el8.x86_64", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "sssd-ad-0:2.3.0-9.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:sssd-ad-0:2.3.0-9.el8.x86_64" }, "product_reference": "sssd-ad-0:2.3.0-9.el8.x86_64", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "sssd-ad-debuginfo-0:2.3.0-9.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:sssd-ad-debuginfo-0:2.3.0-9.el8.x86_64" }, "product_reference": "sssd-ad-debuginfo-0:2.3.0-9.el8.x86_64", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "sssd-client-0:2.3.0-9.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:sssd-client-0:2.3.0-9.el8.x86_64" }, "product_reference": "sssd-client-0:2.3.0-9.el8.x86_64", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "sssd-client-debuginfo-0:2.3.0-9.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:sssd-client-debuginfo-0:2.3.0-9.el8.x86_64" }, "product_reference": "sssd-client-debuginfo-0:2.3.0-9.el8.x86_64", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "sssd-common-0:2.3.0-9.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:sssd-common-0:2.3.0-9.el8.x86_64" }, "product_reference": "sssd-common-0:2.3.0-9.el8.x86_64", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "sssd-common-debuginfo-0:2.3.0-9.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:sssd-common-debuginfo-0:2.3.0-9.el8.x86_64" }, "product_reference": "sssd-common-debuginfo-0:2.3.0-9.el8.x86_64", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "sssd-common-pac-0:2.3.0-9.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:sssd-common-pac-0:2.3.0-9.el8.x86_64" }, "product_reference": "sssd-common-pac-0:2.3.0-9.el8.x86_64", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "sssd-common-pac-debuginfo-0:2.3.0-9.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:sssd-common-pac-debuginfo-0:2.3.0-9.el8.x86_64" }, "product_reference": "sssd-common-pac-debuginfo-0:2.3.0-9.el8.x86_64", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "sssd-dbus-0:2.3.0-9.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:sssd-dbus-0:2.3.0-9.el8.x86_64" }, "product_reference": "sssd-dbus-0:2.3.0-9.el8.x86_64", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "sssd-dbus-debuginfo-0:2.3.0-9.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:sssd-dbus-debuginfo-0:2.3.0-9.el8.x86_64" }, "product_reference": "sssd-dbus-debuginfo-0:2.3.0-9.el8.x86_64", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "sssd-debuginfo-0:2.3.0-9.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:sssd-debuginfo-0:2.3.0-9.el8.x86_64" }, "product_reference": "sssd-debuginfo-0:2.3.0-9.el8.x86_64", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "sssd-debugsource-0:2.3.0-9.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:sssd-debugsource-0:2.3.0-9.el8.x86_64" }, "product_reference": "sssd-debugsource-0:2.3.0-9.el8.x86_64", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "sssd-ipa-0:2.3.0-9.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:sssd-ipa-0:2.3.0-9.el8.x86_64" }, "product_reference": "sssd-ipa-0:2.3.0-9.el8.x86_64", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "sssd-ipa-debuginfo-0:2.3.0-9.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:sssd-ipa-debuginfo-0:2.3.0-9.el8.x86_64" }, "product_reference": "sssd-ipa-debuginfo-0:2.3.0-9.el8.x86_64", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "sssd-kcm-0:2.3.0-9.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:sssd-kcm-0:2.3.0-9.el8.x86_64" }, "product_reference": "sssd-kcm-0:2.3.0-9.el8.x86_64", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "sssd-kcm-debuginfo-0:2.3.0-9.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:sssd-kcm-debuginfo-0:2.3.0-9.el8.x86_64" }, "product_reference": "sssd-kcm-debuginfo-0:2.3.0-9.el8.x86_64", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "sssd-krb5-0:2.3.0-9.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:sssd-krb5-0:2.3.0-9.el8.x86_64" }, "product_reference": "sssd-krb5-0:2.3.0-9.el8.x86_64", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "sssd-krb5-common-0:2.3.0-9.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:sssd-krb5-common-0:2.3.0-9.el8.x86_64" }, "product_reference": "sssd-krb5-common-0:2.3.0-9.el8.x86_64", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "sssd-krb5-common-debuginfo-0:2.3.0-9.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:sssd-krb5-common-debuginfo-0:2.3.0-9.el8.x86_64" }, "product_reference": "sssd-krb5-common-debuginfo-0:2.3.0-9.el8.x86_64", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "sssd-krb5-debuginfo-0:2.3.0-9.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:sssd-krb5-debuginfo-0:2.3.0-9.el8.x86_64" }, "product_reference": "sssd-krb5-debuginfo-0:2.3.0-9.el8.x86_64", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "sssd-ldap-0:2.3.0-9.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:sssd-ldap-0:2.3.0-9.el8.x86_64" }, "product_reference": "sssd-ldap-0:2.3.0-9.el8.x86_64", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "sssd-ldap-debuginfo-0:2.3.0-9.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:sssd-ldap-debuginfo-0:2.3.0-9.el8.x86_64" }, "product_reference": "sssd-ldap-debuginfo-0:2.3.0-9.el8.x86_64", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "sssd-libwbclient-0:2.3.0-9.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:sssd-libwbclient-0:2.3.0-9.el8.x86_64" }, "product_reference": "sssd-libwbclient-0:2.3.0-9.el8.x86_64", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "sssd-libwbclient-debuginfo-0:2.3.0-9.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:sssd-libwbclient-debuginfo-0:2.3.0-9.el8.x86_64" }, "product_reference": "sssd-libwbclient-debuginfo-0:2.3.0-9.el8.x86_64", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "sssd-nfs-idmap-0:2.3.0-9.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:sssd-nfs-idmap-0:2.3.0-9.el8.x86_64" }, "product_reference": "sssd-nfs-idmap-0:2.3.0-9.el8.x86_64", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "sssd-nfs-idmap-debuginfo-0:2.3.0-9.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:sssd-nfs-idmap-debuginfo-0:2.3.0-9.el8.x86_64" }, "product_reference": "sssd-nfs-idmap-debuginfo-0:2.3.0-9.el8.x86_64", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "sssd-polkit-rules-0:2.3.0-9.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:sssd-polkit-rules-0:2.3.0-9.el8.x86_64" }, "product_reference": "sssd-polkit-rules-0:2.3.0-9.el8.x86_64", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "sssd-proxy-0:2.3.0-9.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:sssd-proxy-0:2.3.0-9.el8.x86_64" }, "product_reference": "sssd-proxy-0:2.3.0-9.el8.x86_64", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "sssd-proxy-debuginfo-0:2.3.0-9.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:sssd-proxy-debuginfo-0:2.3.0-9.el8.x86_64" }, "product_reference": "sssd-proxy-debuginfo-0:2.3.0-9.el8.x86_64", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "sssd-tools-0:2.3.0-9.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:sssd-tools-0:2.3.0-9.el8.x86_64" }, "product_reference": "sssd-tools-0:2.3.0-9.el8.x86_64", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "sssd-tools-debuginfo-0:2.3.0-9.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:sssd-tools-debuginfo-0:2.3.0-9.el8.x86_64" }, "product_reference": "sssd-tools-debuginfo-0:2.3.0-9.el8.x86_64", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "sssd-winbind-idmap-0:2.3.0-9.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:sssd-winbind-idmap-0:2.3.0-9.el8.x86_64" }, "product_reference": "sssd-winbind-idmap-0:2.3.0-9.el8.x86_64", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "sssd-winbind-idmap-debuginfo-0:2.3.0-9.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:sssd-winbind-idmap-debuginfo-0:2.3.0-9.el8.x86_64" }, "product_reference": "sssd-winbind-idmap-debuginfo-0:2.3.0-9.el8.x86_64", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "imgbased-0:1.2.16-0.1.el8ev.noarch as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)", "product_id": "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.16-0.1.el8ev.noarch" }, "product_reference": "imgbased-0:1.2.16-0.1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-HypervisorBuild-4" }, { "category": "default_component_of", "full_product_name": { "name": "imgbased-0:1.2.16-0.1.el8ev.src as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)", "product_id": "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.16-0.1.el8ev.src" }, "product_reference": "imgbased-0:1.2.16-0.1.el8ev.src", "relates_to_product_reference": "8Base-RHV-HypervisorBuild-4" }, { "category": "default_component_of", "full_product_name": { "name": "python3-imgbased-0:1.2.16-0.1.el8ev.noarch as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)", "product_id": "8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.16-0.1.el8ev.noarch" }, "product_reference": "python3-imgbased-0:1.2.16-0.1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-HypervisorBuild-4" }, { "category": "default_component_of", "full_product_name": { "name": "redhat-release-virtualization-host-0:4.4.4-1.el8ev.src as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)", "product_id": "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.4-1.el8ev.src" }, "product_reference": "redhat-release-virtualization-host-0:4.4.4-1.el8ev.src", "relates_to_product_reference": "8Base-RHV-HypervisorBuild-4" }, { "category": "default_component_of", "full_product_name": { "name": "redhat-release-virtualization-host-0:4.4.4-1.el8ev.x86_64 as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)", "product_id": "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.4-1.el8ev.x86_64" }, "product_reference": "redhat-release-virtualization-host-0:4.4.4-1.el8ev.x86_64", "relates_to_product_reference": "8Base-RHV-HypervisorBuild-4" }, { "category": "default_component_of", "full_product_name": { "name": "redhat-virtualization-host-image-update-placeholder-0:4.4.4-1.el8ev.noarch as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)", "product_id": "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.4-1.el8ev.noarch" }, "product_reference": "redhat-virtualization-host-image-update-placeholder-0:4.4.4-1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-HypervisorBuild-4" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Moshe Kol", "Shlomi Oberman" ], "organization": "JSOF" } ], "cve": "CVE-2020-25684", "cwe": { "id": "CWE-358", "name": "Improperly Implemented Security Check for Standard" }, "discovery_date": "2020-09-03T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHV-Agents-4:cockpit-ovirt-0:0.14.17-1.el8ev.src", "8Base-RHV-Agents-4:cockpit-ovirt-dashboard-0:0.14.17-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:libipa_hbac-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libipa_hbac-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsmbclient-0:4.12.3-12.el8.3.x86_64", "8Base-RHV-Hypervisor-4:libsmbclient-debuginfo-0:4.12.3-12.el8.3.x86_64", "8Base-RHV-Hypervisor-4:libsss_autofs-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_autofs-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_certmap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_certmap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_idmap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_idmap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_nss_idmap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_nss_idmap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_nss_idmap-devel-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_simpleifp-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_simpleifp-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_sudo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_sudo-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-libipa_hbac-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-libipa_hbac-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-libsss_nss_idmap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-libsss_nss_idmap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-sss-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-sss-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-sss-murmur-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-sss-murmur-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-sssdconfig-0:2.3.0-9.el8.noarch", "8Base-RHV-Hypervisor-4:samba-0:4.12.3-12.el8.3.src", "8Base-RHV-Hypervisor-4:samba-debuginfo-0:4.12.3-12.el8.3.x86_64", "8Base-RHV-Hypervisor-4:samba-debugsource-0:4.12.3-12.el8.3.x86_64", "8Base-RHV-Hypervisor-4:sssd-0:2.3.0-9.el8.src", "8Base-RHV-Hypervisor-4:sssd-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-ad-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-ad-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-client-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-client-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-common-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-common-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-common-pac-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-common-pac-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-dbus-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-dbus-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-debugsource-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-ipa-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-ipa-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-kcm-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-kcm-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-krb5-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-krb5-common-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-krb5-common-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-krb5-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-ldap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-ldap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-libwbclient-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-libwbclient-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-nfs-idmap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-nfs-idmap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-polkit-rules-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-proxy-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-proxy-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-tools-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-tools-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-winbind-idmap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-winbind-idmap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.16-0.1.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.16-0.1.el8ev.src", "8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.16-0.1.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.4-1.el8ev.src", "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.4-1.el8ev.x86_64", "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.4-1.el8ev.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1889686" } ], "notes": [ { "category": "description", "text": "A flaw was found in dnsmasq. When getting a reply from a forwarded query, dnsmasq checks in the forward.c:reply_query() if the reply destination address/port is used by the pending forwarded queries. However, it does not use the address/port to retrieve the exact forwarded query, substantially reducing the number of attempts an attacker on the network would have to perform to forge a reply and get it accepted by dnsmasq. This issue contrasts with RFC5452, which specifies a query\u0027s attributes that all must be used to match a reply. This flaw allows an attacker to perform a DNS Cache Poisoning attack. If chained with CVE-2020-25685 or CVE-2020-25686, the attack complexity of a successful attack is reduced. The highest threat from this vulnerability is to data integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "dnsmasq: loose address/port check in reply_query() makes forging replies easier for an off-path attacker", "title": "Vulnerability summary" }, { "category": "other", "text": "Dnsmasq may be run by libvirt and/or NetworkManager. libvirt uses dnsmasq by default to provide DNS service to its guests. NetworkManager may be configured to use dnsmasq to provide DNS service to the system, if a line `dns=dnsmasq` is present in the `[main]` section of the configuration file /etc/NetworkManager/NetworkManager.conf.\n\nIn Red Hat OpenStack Platform (RHOSP) and Red Hat Virtualization (RHV), the dnsmasq package is provided by the underlying Red Hat Enterprise Linux (RHEL) product. RHOSP and RHV are therefore indirectly affected, so please ensure that the underlying RHEL dnsmasq package is updated.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.4-20210201.0.el8_3.src", "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.4-20210201.0.el8_3.noarch" ], "known_not_affected": [ "8Base-RHV-Agents-4:cockpit-ovirt-0:0.14.17-1.el8ev.src", "8Base-RHV-Agents-4:cockpit-ovirt-dashboard-0:0.14.17-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:libipa_hbac-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libipa_hbac-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsmbclient-0:4.12.3-12.el8.3.x86_64", "8Base-RHV-Hypervisor-4:libsmbclient-debuginfo-0:4.12.3-12.el8.3.x86_64", "8Base-RHV-Hypervisor-4:libsss_autofs-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_autofs-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_certmap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_certmap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_idmap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_idmap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_nss_idmap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_nss_idmap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_nss_idmap-devel-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_simpleifp-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_simpleifp-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_sudo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_sudo-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-libipa_hbac-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-libipa_hbac-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-libsss_nss_idmap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-libsss_nss_idmap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-sss-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-sss-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-sss-murmur-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-sss-murmur-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-sssdconfig-0:2.3.0-9.el8.noarch", "8Base-RHV-Hypervisor-4:samba-0:4.12.3-12.el8.3.src", "8Base-RHV-Hypervisor-4:samba-debuginfo-0:4.12.3-12.el8.3.x86_64", "8Base-RHV-Hypervisor-4:samba-debugsource-0:4.12.3-12.el8.3.x86_64", "8Base-RHV-Hypervisor-4:sssd-0:2.3.0-9.el8.src", "8Base-RHV-Hypervisor-4:sssd-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-ad-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-ad-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-client-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-client-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-common-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-common-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-common-pac-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-common-pac-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-dbus-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-dbus-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-debugsource-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-ipa-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-ipa-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-kcm-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-kcm-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-krb5-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-krb5-common-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-krb5-common-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-krb5-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-ldap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-ldap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-libwbclient-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-libwbclient-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-nfs-idmap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-nfs-idmap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-polkit-rules-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-proxy-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-proxy-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-tools-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-tools-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-winbind-idmap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-winbind-idmap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.16-0.1.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.16-0.1.el8ev.src", "8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.16-0.1.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.4-1.el8ev.src", "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.4-1.el8ev.x86_64", "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.4-1.el8ev.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-25684" }, { "category": "external", "summary": "RHBZ#1889686", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889686" }, { "category": "external", "summary": "RHSB-2021-001", "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-001" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-25684", "url": "https://www.cve.org/CVERecord?id=CVE-2020-25684" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25684", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25684" }, { "category": "external", "summary": "https://www.jsof-tech.com/disclosures/dnspooq/", "url": "https://www.jsof-tech.com/disclosures/dnspooq/" } ], "release_date": "2021-01-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-02-03T16:14:40+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891\n\nAfter installing this update, the smb service will be restarted automatically.", "product_ids": [ "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.4-20210201.0.el8_3.src", "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.4-20210201.0.el8_3.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0401" }, { "category": "workaround", "details": "The impact of this flaw can be reduced by disabling the dnsmasq cache by adding `--cache-size=0` when calling dnsmasq or by adding a line with `cache-size=0` to the dnsmasq configuration file (/etc/dnsmasq.conf by default).\n\nWhen using Red Hat Enterprise Linux 8.3 with libvirt through a virt:rhel module, use `virsh net-edit \u003cnetwork-name\u003e` and reference https://libvirt.org/formatnetwork.html#elementsNamespaces to add the suggested option `cache-size=0`. \n\nThere is no way to customize the dnsmasq configuration generated by libvirt, when using versions of Red Hat Enterprise Linux prior to version 8.3. If dnsmasq is being run through NetworkManager, create a new file in /etc/NetworkManager/dnsmasq.d/ and add `cache-size=0` to it.\n\nIn all cases, by disabling the cache, you may experience a performance loss in your environment due to all DNS queries being forwarded to the upstream servers. Please evaluate if the mitigation is appropriate for the system\u2019s environment before applying.", "product_ids": [ "8Base-RHV-Agents-4:cockpit-ovirt-0:0.14.17-1.el8ev.src", "8Base-RHV-Agents-4:cockpit-ovirt-dashboard-0:0.14.17-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:libipa_hbac-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libipa_hbac-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsmbclient-0:4.12.3-12.el8.3.x86_64", "8Base-RHV-Hypervisor-4:libsmbclient-debuginfo-0:4.12.3-12.el8.3.x86_64", "8Base-RHV-Hypervisor-4:libsss_autofs-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_autofs-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_certmap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_certmap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_idmap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_idmap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_nss_idmap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_nss_idmap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_nss_idmap-devel-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_simpleifp-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_simpleifp-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_sudo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_sudo-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-libipa_hbac-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-libipa_hbac-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-libsss_nss_idmap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-libsss_nss_idmap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-sss-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-sss-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-sss-murmur-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-sss-murmur-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-sssdconfig-0:2.3.0-9.el8.noarch", "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.4-20210201.0.el8_3.src", "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.4-20210201.0.el8_3.noarch", "8Base-RHV-Hypervisor-4:samba-0:4.12.3-12.el8.3.src", "8Base-RHV-Hypervisor-4:samba-debuginfo-0:4.12.3-12.el8.3.x86_64", "8Base-RHV-Hypervisor-4:samba-debugsource-0:4.12.3-12.el8.3.x86_64", "8Base-RHV-Hypervisor-4:sssd-0:2.3.0-9.el8.src", "8Base-RHV-Hypervisor-4:sssd-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-ad-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-ad-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-client-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-client-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-common-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-common-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-common-pac-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-common-pac-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-dbus-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-dbus-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-debugsource-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-ipa-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-ipa-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-kcm-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-kcm-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-krb5-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-krb5-common-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-krb5-common-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-krb5-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-ldap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-ldap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-libwbclient-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-libwbclient-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-nfs-idmap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-nfs-idmap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-polkit-rules-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-proxy-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-proxy-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-tools-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-tools-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-winbind-idmap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-winbind-idmap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.16-0.1.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.16-0.1.el8ev.src", "8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.16-0.1.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.4-1.el8ev.src", "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.4-1.el8ev.x86_64", "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.4-1.el8ev.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N", "version": "3.1" }, "products": [ "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.4-20210201.0.el8_3.src", "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.4-20210201.0.el8_3.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "dnsmasq: loose address/port check in reply_query() makes forging replies easier for an off-path attacker" }, { "acknowledgments": [ { "names": [ "Moshe Kol", "Shlomi Oberman" ], "organization": "JSOF" } ], "cve": "CVE-2020-25685", "cwe": { "id": "CWE-326", "name": "Inadequate Encryption Strength" }, "discovery_date": "2020-09-03T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHV-Agents-4:cockpit-ovirt-0:0.14.17-1.el8ev.src", "8Base-RHV-Agents-4:cockpit-ovirt-dashboard-0:0.14.17-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:libipa_hbac-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libipa_hbac-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsmbclient-0:4.12.3-12.el8.3.x86_64", "8Base-RHV-Hypervisor-4:libsmbclient-debuginfo-0:4.12.3-12.el8.3.x86_64", "8Base-RHV-Hypervisor-4:libsss_autofs-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_autofs-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_certmap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_certmap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_idmap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_idmap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_nss_idmap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_nss_idmap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_nss_idmap-devel-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_simpleifp-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_simpleifp-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_sudo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_sudo-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-libipa_hbac-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-libipa_hbac-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-libsss_nss_idmap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-libsss_nss_idmap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-sss-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-sss-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-sss-murmur-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-sss-murmur-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-sssdconfig-0:2.3.0-9.el8.noarch", "8Base-RHV-Hypervisor-4:samba-0:4.12.3-12.el8.3.src", "8Base-RHV-Hypervisor-4:samba-debuginfo-0:4.12.3-12.el8.3.x86_64", "8Base-RHV-Hypervisor-4:samba-debugsource-0:4.12.3-12.el8.3.x86_64", "8Base-RHV-Hypervisor-4:sssd-0:2.3.0-9.el8.src", "8Base-RHV-Hypervisor-4:sssd-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-ad-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-ad-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-client-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-client-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-common-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-common-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-common-pac-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-common-pac-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-dbus-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-dbus-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-debugsource-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-ipa-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-ipa-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-kcm-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-kcm-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-krb5-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-krb5-common-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-krb5-common-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-krb5-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-ldap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-ldap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-libwbclient-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-libwbclient-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-nfs-idmap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-nfs-idmap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-polkit-rules-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-proxy-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-proxy-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-tools-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-tools-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-winbind-idmap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-winbind-idmap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.16-0.1.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.16-0.1.el8ev.src", "8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.16-0.1.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.4-1.el8ev.src", "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.4-1.el8ev.x86_64", "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.4-1.el8ev.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1889688" } ], "notes": [ { "category": "description", "text": "A flaw was found in dnsmasq. When getting a reply from a forwarded query, dnsmasq checks in forward.c:reply_query(), which is the forwarded query that matches the reply, by only using a weak hash of the query name. Due to the weak hash (CRC32 when dnsmasq is compiled without DNSSEC, SHA-1 when it is) this flaw allows an off-path attacker to find several different domains all having the same hash, substantially reducing the number of attempts they would have to perform to forge a reply and get it accepted by dnsmasq. This is in contrast with RFC5452, which specifies that the query name is one of the attributes of a query that must be used to match a reply. This flaw could be abused to perform a DNS Cache Poisoning attack. If chained with CVE-2020-25684 the attack complexity of a successful attack is reduced. The highest threat from this vulnerability is to data integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "dnsmasq: loose query name check in reply_query() makes forging replies easier for an off-path attacker", "title": "Vulnerability summary" }, { "category": "other", "text": "Dnsmasq may be run by libvirt and/or NetworkManager. libvirt uses dnsmasq by default to provide DNS service to its guests. NetworkManager may be configured to use dnsmasq to provide DNS service to the system, if a line `dns=dnsmasq` is present in the `[main]` section of the configuration file /etc/NetworkManager/NetworkManager.conf.\n\nIn Red Hat OpenStack Platform (RHOSP) and Red Hat Virtualization (RHV), the dnsmasq package is provided by the underlying Red Hat Enterprise Linux (RHEL) product. RHOSP and RHV are therefore indirectly affected, so please ensure that the underlying RHEL dnsmasq package is updated.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.4-20210201.0.el8_3.src", "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.4-20210201.0.el8_3.noarch" ], "known_not_affected": [ "8Base-RHV-Agents-4:cockpit-ovirt-0:0.14.17-1.el8ev.src", "8Base-RHV-Agents-4:cockpit-ovirt-dashboard-0:0.14.17-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:libipa_hbac-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libipa_hbac-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsmbclient-0:4.12.3-12.el8.3.x86_64", "8Base-RHV-Hypervisor-4:libsmbclient-debuginfo-0:4.12.3-12.el8.3.x86_64", "8Base-RHV-Hypervisor-4:libsss_autofs-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_autofs-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_certmap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_certmap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_idmap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_idmap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_nss_idmap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_nss_idmap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_nss_idmap-devel-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_simpleifp-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_simpleifp-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_sudo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_sudo-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-libipa_hbac-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-libipa_hbac-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-libsss_nss_idmap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-libsss_nss_idmap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-sss-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-sss-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-sss-murmur-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-sss-murmur-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-sssdconfig-0:2.3.0-9.el8.noarch", "8Base-RHV-Hypervisor-4:samba-0:4.12.3-12.el8.3.src", "8Base-RHV-Hypervisor-4:samba-debuginfo-0:4.12.3-12.el8.3.x86_64", "8Base-RHV-Hypervisor-4:samba-debugsource-0:4.12.3-12.el8.3.x86_64", "8Base-RHV-Hypervisor-4:sssd-0:2.3.0-9.el8.src", "8Base-RHV-Hypervisor-4:sssd-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-ad-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-ad-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-client-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-client-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-common-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-common-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-common-pac-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-common-pac-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-dbus-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-dbus-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-debugsource-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-ipa-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-ipa-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-kcm-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-kcm-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-krb5-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-krb5-common-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-krb5-common-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-krb5-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-ldap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-ldap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-libwbclient-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-libwbclient-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-nfs-idmap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-nfs-idmap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-polkit-rules-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-proxy-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-proxy-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-tools-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-tools-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-winbind-idmap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-winbind-idmap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.16-0.1.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.16-0.1.el8ev.src", "8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.16-0.1.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.4-1.el8ev.src", "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.4-1.el8ev.x86_64", "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.4-1.el8ev.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-25685" }, { "category": "external", "summary": "RHBZ#1889688", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889688" }, { "category": "external", "summary": "RHSB-2021-001", "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-001" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-25685", "url": "https://www.cve.org/CVERecord?id=CVE-2020-25685" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25685", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25685" }, { "category": "external", "summary": "https://www.jsof-tech.com/disclosures/dnspooq/", "url": "https://www.jsof-tech.com/disclosures/dnspooq/" } ], "release_date": "2021-01-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-02-03T16:14:40+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891\n\nAfter installing this update, the smb service will be restarted automatically.", "product_ids": [ "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.4-20210201.0.el8_3.src", "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.4-20210201.0.el8_3.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0401" }, { "category": "workaround", "details": "The impact of this flaw can be reduced by disabling the dnsmasq cache by adding `--cache-size=0` when calling dnsmasq or by adding a line with `cache-size=0` to the dnsmasq configuration file (/etc/dnsmasq.conf by default). \n\nWhen using Red Hat Enterprise Linux 8.3 with libvirt through a virt:rhel module, use `virsh net-edit \u003cnetwork-name\u003e` and reference https://libvirt.org/formatnetwork.html#elementsNamespaces to add the suggested option `cache-size=0`. \n\nThere is no way to customize the dnsmasq configuration generated by libvirt, when using versions of Red Hat Enterprise Linux prior to version 8.3. If dnsmasq is being run through NetworkManager, create a new file in /etc/NetworkManager/dnsmasq.d/ and add `cache-size=0` to it.\n\nIn all cases, by disabling the cache, you may experience a performance loss in your environment due to all DNS queries being forwarded to the upstream servers. Please evaluate if the mitigation is appropriate for the system\u2019s environment before applying.", "product_ids": [ "8Base-RHV-Agents-4:cockpit-ovirt-0:0.14.17-1.el8ev.src", "8Base-RHV-Agents-4:cockpit-ovirt-dashboard-0:0.14.17-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:libipa_hbac-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libipa_hbac-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsmbclient-0:4.12.3-12.el8.3.x86_64", "8Base-RHV-Hypervisor-4:libsmbclient-debuginfo-0:4.12.3-12.el8.3.x86_64", "8Base-RHV-Hypervisor-4:libsss_autofs-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_autofs-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_certmap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_certmap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_idmap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_idmap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_nss_idmap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_nss_idmap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_nss_idmap-devel-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_simpleifp-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_simpleifp-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_sudo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_sudo-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-libipa_hbac-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-libipa_hbac-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-libsss_nss_idmap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-libsss_nss_idmap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-sss-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-sss-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-sss-murmur-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-sss-murmur-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-sssdconfig-0:2.3.0-9.el8.noarch", "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.4-20210201.0.el8_3.src", "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.4-20210201.0.el8_3.noarch", "8Base-RHV-Hypervisor-4:samba-0:4.12.3-12.el8.3.src", "8Base-RHV-Hypervisor-4:samba-debuginfo-0:4.12.3-12.el8.3.x86_64", "8Base-RHV-Hypervisor-4:samba-debugsource-0:4.12.3-12.el8.3.x86_64", "8Base-RHV-Hypervisor-4:sssd-0:2.3.0-9.el8.src", "8Base-RHV-Hypervisor-4:sssd-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-ad-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-ad-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-client-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-client-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-common-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-common-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-common-pac-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-common-pac-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-dbus-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-dbus-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-debugsource-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-ipa-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-ipa-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-kcm-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-kcm-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-krb5-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-krb5-common-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-krb5-common-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-krb5-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-ldap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-ldap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-libwbclient-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-libwbclient-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-nfs-idmap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-nfs-idmap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-polkit-rules-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-proxy-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-proxy-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-tools-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-tools-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-winbind-idmap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-winbind-idmap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.16-0.1.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.16-0.1.el8ev.src", "8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.16-0.1.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.4-1.el8ev.src", "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.4-1.el8ev.x86_64", "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.4-1.el8ev.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N", "version": "3.1" }, "products": [ "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.4-20210201.0.el8_3.src", "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.4-20210201.0.el8_3.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "dnsmasq: loose query name check in reply_query() makes forging replies easier for an off-path attacker" }, { "acknowledgments": [ { "names": [ "Moshe Kol", "Shlomi Oberman" ], "organization": "JSOF" } ], "cve": "CVE-2020-25686", "cwe": { "id": "CWE-290", "name": "Authentication Bypass by Spoofing" }, "discovery_date": "2020-09-03T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHV-Agents-4:cockpit-ovirt-0:0.14.17-1.el8ev.src", "8Base-RHV-Agents-4:cockpit-ovirt-dashboard-0:0.14.17-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:libipa_hbac-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libipa_hbac-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsmbclient-0:4.12.3-12.el8.3.x86_64", "8Base-RHV-Hypervisor-4:libsmbclient-debuginfo-0:4.12.3-12.el8.3.x86_64", "8Base-RHV-Hypervisor-4:libsss_autofs-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_autofs-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_certmap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_certmap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_idmap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_idmap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_nss_idmap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_nss_idmap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_nss_idmap-devel-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_simpleifp-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_simpleifp-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_sudo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_sudo-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-libipa_hbac-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-libipa_hbac-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-libsss_nss_idmap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-libsss_nss_idmap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-sss-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-sss-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-sss-murmur-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-sss-murmur-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-sssdconfig-0:2.3.0-9.el8.noarch", "8Base-RHV-Hypervisor-4:samba-0:4.12.3-12.el8.3.src", "8Base-RHV-Hypervisor-4:samba-debuginfo-0:4.12.3-12.el8.3.x86_64", "8Base-RHV-Hypervisor-4:samba-debugsource-0:4.12.3-12.el8.3.x86_64", "8Base-RHV-Hypervisor-4:sssd-0:2.3.0-9.el8.src", "8Base-RHV-Hypervisor-4:sssd-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-ad-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-ad-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-client-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-client-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-common-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-common-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-common-pac-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-common-pac-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-dbus-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-dbus-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-debugsource-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-ipa-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-ipa-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-kcm-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-kcm-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-krb5-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-krb5-common-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-krb5-common-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-krb5-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-ldap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-ldap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-libwbclient-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-libwbclient-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-nfs-idmap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-nfs-idmap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-polkit-rules-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-proxy-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-proxy-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-tools-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-tools-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-winbind-idmap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-winbind-idmap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.16-0.1.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.16-0.1.el8ev.src", "8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.16-0.1.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.4-1.el8ev.src", "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.4-1.el8ev.x86_64", "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.4-1.el8ev.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1890125" } ], "notes": [ { "category": "description", "text": "A flaw was found in dnsmasq. When receiving a query, dnsmasq does not check for an existing pending request for the same name and forwards a new request. By default, a maximum of 150 pending queries can be sent to upstream servers, so there can be at most 150 queries for the same name. This flaw allows an off-path attacker on the network to substantially reduce the number of attempts that it would have to perform to forge a reply and have it accepted by dnsmasq. This issue is mentioned in the \"Birthday Attacks\" section of RFC5452. If chained with CVE-2020-25684, the attack complexity of a successful attack is reduced. The highest threat from this vulnerability is to data integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "dnsmasq: multiple queries forwarded for the same name makes forging replies easier for an off-path attacker", "title": "Vulnerability summary" }, { "category": "other", "text": "Dnsmasq may be run by libvirt and/or NetworkManager. libvirt uses dnsmasq by default to provide DNS service to its guests. NetworkManager may be configured to use dnsmasq to provide DNS service to the system, if a line `dns=dnsmasq` is present in the `[main]` section of the configuration file /etc/NetworkManager/NetworkManager.conf.\n\nIn Red Hat OpenStack Platform (RHOSP) and Red Hat Virtualization (RHV), the dnsmasq package is provided by the underlying Red Hat Enterprise Linux (RHEL) product. RHOSP and RHV are therefore indirectly affected, so please ensure that the underlying RHEL dnsmasq package is updated.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.4-20210201.0.el8_3.src", "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.4-20210201.0.el8_3.noarch" ], "known_not_affected": [ "8Base-RHV-Agents-4:cockpit-ovirt-0:0.14.17-1.el8ev.src", "8Base-RHV-Agents-4:cockpit-ovirt-dashboard-0:0.14.17-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:libipa_hbac-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libipa_hbac-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsmbclient-0:4.12.3-12.el8.3.x86_64", "8Base-RHV-Hypervisor-4:libsmbclient-debuginfo-0:4.12.3-12.el8.3.x86_64", "8Base-RHV-Hypervisor-4:libsss_autofs-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_autofs-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_certmap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_certmap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_idmap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_idmap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_nss_idmap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_nss_idmap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_nss_idmap-devel-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_simpleifp-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_simpleifp-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_sudo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_sudo-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-libipa_hbac-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-libipa_hbac-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-libsss_nss_idmap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-libsss_nss_idmap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-sss-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-sss-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-sss-murmur-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-sss-murmur-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-sssdconfig-0:2.3.0-9.el8.noarch", "8Base-RHV-Hypervisor-4:samba-0:4.12.3-12.el8.3.src", "8Base-RHV-Hypervisor-4:samba-debuginfo-0:4.12.3-12.el8.3.x86_64", "8Base-RHV-Hypervisor-4:samba-debugsource-0:4.12.3-12.el8.3.x86_64", "8Base-RHV-Hypervisor-4:sssd-0:2.3.0-9.el8.src", "8Base-RHV-Hypervisor-4:sssd-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-ad-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-ad-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-client-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-client-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-common-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-common-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-common-pac-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-common-pac-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-dbus-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-dbus-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-debugsource-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-ipa-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-ipa-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-kcm-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-kcm-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-krb5-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-krb5-common-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-krb5-common-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-krb5-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-ldap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-ldap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-libwbclient-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-libwbclient-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-nfs-idmap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-nfs-idmap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-polkit-rules-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-proxy-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-proxy-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-tools-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-tools-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-winbind-idmap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-winbind-idmap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.16-0.1.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.16-0.1.el8ev.src", "8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.16-0.1.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.4-1.el8ev.src", "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.4-1.el8ev.x86_64", "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.4-1.el8ev.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-25686" }, { "category": "external", "summary": "RHBZ#1890125", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890125" }, { "category": "external", "summary": "RHSB-2021-001", "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-001" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-25686", "url": "https://www.cve.org/CVERecord?id=CVE-2020-25686" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25686", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25686" }, { "category": "external", "summary": "https://www.jsof-tech.com/disclosures/dnspooq/", "url": "https://www.jsof-tech.com/disclosures/dnspooq/" } ], "release_date": "2021-01-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-02-03T16:14:40+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891\n\nAfter installing this update, the smb service will be restarted automatically.", "product_ids": [ "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.4-20210201.0.el8_3.src", "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.4-20210201.0.el8_3.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0401" }, { "category": "workaround", "details": "The impact of this flaw can be reduced by disabling the dnsmasq cache by adding `--cache-size=0` when calling dnsmasq or by adding a line with `cache-size=0` to the dnsmasq configuration file (/etc/dnsmasq.conf by default). \n\nWhen using Red Hat Enterprise Linux 8.3 with libvirt through a virt:rhel module, use `virsh net-edit \u003cnetwork-name\u003e` and reference https://libvirt.org/formatnetwork.html#elementsNamespaces to add the suggested option `cache-size=0`. \n\nThere is no way to customize the dnsmasq configuration generated by libvirt, when using versions of Red Hat Enterprise Linux prior to version 8.3. If dnsmasq is being run through NetworkManager, create a new file in /etc/NetworkManager/dnsmasq.d/ and add `cache-size=0` to it.\n\nIn all cases, by disabling the cache, you may experience a performance loss in your environment due to all DNS queries being forwarded to the upstream servers. Please evaluate if the mitigation is appropriate for the system\u2019s environment before applying.", "product_ids": [ "8Base-RHV-Agents-4:cockpit-ovirt-0:0.14.17-1.el8ev.src", "8Base-RHV-Agents-4:cockpit-ovirt-dashboard-0:0.14.17-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:libipa_hbac-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libipa_hbac-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsmbclient-0:4.12.3-12.el8.3.x86_64", "8Base-RHV-Hypervisor-4:libsmbclient-debuginfo-0:4.12.3-12.el8.3.x86_64", "8Base-RHV-Hypervisor-4:libsss_autofs-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_autofs-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_certmap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_certmap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_idmap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_idmap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_nss_idmap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_nss_idmap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_nss_idmap-devel-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_simpleifp-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_simpleifp-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_sudo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_sudo-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-libipa_hbac-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-libipa_hbac-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-libsss_nss_idmap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-libsss_nss_idmap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-sss-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-sss-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-sss-murmur-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-sss-murmur-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-sssdconfig-0:2.3.0-9.el8.noarch", "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.4-20210201.0.el8_3.src", "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.4-20210201.0.el8_3.noarch", "8Base-RHV-Hypervisor-4:samba-0:4.12.3-12.el8.3.src", "8Base-RHV-Hypervisor-4:samba-debuginfo-0:4.12.3-12.el8.3.x86_64", "8Base-RHV-Hypervisor-4:samba-debugsource-0:4.12.3-12.el8.3.x86_64", "8Base-RHV-Hypervisor-4:sssd-0:2.3.0-9.el8.src", "8Base-RHV-Hypervisor-4:sssd-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-ad-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-ad-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-client-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-client-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-common-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-common-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-common-pac-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-common-pac-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-dbus-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-dbus-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-debugsource-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-ipa-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-ipa-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-kcm-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-kcm-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-krb5-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-krb5-common-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-krb5-common-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-krb5-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-ldap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-ldap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-libwbclient-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-libwbclient-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-nfs-idmap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-nfs-idmap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-polkit-rules-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-proxy-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-proxy-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-tools-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-tools-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-winbind-idmap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-winbind-idmap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.16-0.1.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.16-0.1.el8ev.src", "8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.16-0.1.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.4-1.el8ev.src", "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.4-1.el8ev.x86_64", "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.4-1.el8ev.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N", "version": "3.1" }, "products": [ "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.4-20210201.0.el8_3.src", "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.4-20210201.0.el8_3.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "dnsmasq: multiple queries forwarded for the same name makes forging replies easier for an off-path attacker" }, { "cve": "CVE-2021-3156", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2021-01-19T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHV-Agents-4:cockpit-ovirt-0:0.14.17-1.el8ev.src", "8Base-RHV-Agents-4:cockpit-ovirt-dashboard-0:0.14.17-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:libipa_hbac-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libipa_hbac-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsmbclient-0:4.12.3-12.el8.3.x86_64", "8Base-RHV-Hypervisor-4:libsmbclient-debuginfo-0:4.12.3-12.el8.3.x86_64", "8Base-RHV-Hypervisor-4:libsss_autofs-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_autofs-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_certmap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_certmap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_idmap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_idmap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_nss_idmap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_nss_idmap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_nss_idmap-devel-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_simpleifp-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_simpleifp-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_sudo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_sudo-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-libipa_hbac-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-libipa_hbac-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-libsss_nss_idmap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-libsss_nss_idmap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-sss-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-sss-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-sss-murmur-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-sss-murmur-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-sssdconfig-0:2.3.0-9.el8.noarch", "8Base-RHV-Hypervisor-4:samba-0:4.12.3-12.el8.3.src", "8Base-RHV-Hypervisor-4:samba-debuginfo-0:4.12.3-12.el8.3.x86_64", "8Base-RHV-Hypervisor-4:samba-debugsource-0:4.12.3-12.el8.3.x86_64", "8Base-RHV-Hypervisor-4:sssd-0:2.3.0-9.el8.src", "8Base-RHV-Hypervisor-4:sssd-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-ad-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-ad-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-client-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-client-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-common-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-common-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-common-pac-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-common-pac-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-dbus-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-dbus-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-debugsource-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-ipa-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-ipa-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-kcm-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-kcm-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-krb5-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-krb5-common-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-krb5-common-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-krb5-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-ldap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-ldap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-libwbclient-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-libwbclient-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-nfs-idmap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-nfs-idmap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-polkit-rules-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-proxy-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-proxy-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-tools-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-tools-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-winbind-idmap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-winbind-idmap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.16-0.1.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.16-0.1.el8ev.src", "8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.16-0.1.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.4-1.el8ev.src", "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.4-1.el8ev.x86_64", "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.4-1.el8ev.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1917684" } ], "notes": [ { "category": "description", "text": "A flaw was found in sudo. A heap-based buffer overflow was found in the way sudo parses command line arguments. This flaw is exploitable by any local user who can execute the sudo command (by default, any local user can execute sudo) without authentication. Successful exploitation of this flaw could lead to privilege escalation. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "sudo: Heap buffer overflow in argument parsing", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw does not affect the versions of sudo shipped with Red Hat Enterprise Linux 5, because the vulnerable code was not present in these versions.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.4-20210201.0.el8_3.src", "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.4-20210201.0.el8_3.noarch" ], "known_not_affected": [ "8Base-RHV-Agents-4:cockpit-ovirt-0:0.14.17-1.el8ev.src", "8Base-RHV-Agents-4:cockpit-ovirt-dashboard-0:0.14.17-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:libipa_hbac-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libipa_hbac-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsmbclient-0:4.12.3-12.el8.3.x86_64", "8Base-RHV-Hypervisor-4:libsmbclient-debuginfo-0:4.12.3-12.el8.3.x86_64", "8Base-RHV-Hypervisor-4:libsss_autofs-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_autofs-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_certmap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_certmap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_idmap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_idmap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_nss_idmap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_nss_idmap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_nss_idmap-devel-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_simpleifp-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_simpleifp-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_sudo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_sudo-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-libipa_hbac-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-libipa_hbac-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-libsss_nss_idmap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-libsss_nss_idmap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-sss-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-sss-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-sss-murmur-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-sss-murmur-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-sssdconfig-0:2.3.0-9.el8.noarch", "8Base-RHV-Hypervisor-4:samba-0:4.12.3-12.el8.3.src", "8Base-RHV-Hypervisor-4:samba-debuginfo-0:4.12.3-12.el8.3.x86_64", "8Base-RHV-Hypervisor-4:samba-debugsource-0:4.12.3-12.el8.3.x86_64", "8Base-RHV-Hypervisor-4:sssd-0:2.3.0-9.el8.src", "8Base-RHV-Hypervisor-4:sssd-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-ad-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-ad-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-client-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-client-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-common-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-common-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-common-pac-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-common-pac-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-dbus-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-dbus-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-debugsource-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-ipa-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-ipa-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-kcm-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-kcm-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-krb5-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-krb5-common-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-krb5-common-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-krb5-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-ldap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-ldap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-libwbclient-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-libwbclient-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-nfs-idmap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-nfs-idmap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-polkit-rules-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-proxy-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-proxy-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-tools-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-tools-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-winbind-idmap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-winbind-idmap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.16-0.1.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.16-0.1.el8ev.src", "8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.16-0.1.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.4-1.el8ev.src", "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.4-1.el8ev.x86_64", "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.4-1.el8ev.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3156" }, { "category": "external", "summary": "RHBZ#1917684", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1917684" }, { "category": "external", "summary": "RHSB-2021-002", "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-002" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3156", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3156" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3156", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3156" }, { "category": "external", "summary": "https://www.qualys.com/2021/01/26/cve-2021-3156/baron-samedit-heap-based-overflow-sudo.txt", "url": "https://www.qualys.com/2021/01/26/cve-2021-3156/baron-samedit-heap-based-overflow-sudo.txt" }, { "category": "external", "summary": "https://www.sudo.ws/alerts/unescape_overflow.html", "url": "https://www.sudo.ws/alerts/unescape_overflow.html" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2021-01-26T18:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-02-03T16:14:40+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891\n\nAfter installing this update, the smb service will be restarted automatically.", "product_ids": [ "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.4-20210201.0.el8_3.src", "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.4-20210201.0.el8_3.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0401" }, { "category": "workaround", "details": "Red Hat Product Security strongly recommends customers to update to fixed sudo packages once they are available. For customers who cannot update immediately, the following interim partial mitigation using systemtap is suggested:\n\n1. Install required systemtap packages and dependencies: \n```\nsystemtap yum-utils kernel-devel-\"$(uname -r)\"\n```\n\nThen for RHEL 7 install kernel debuginfo, using:\n```\ndebuginfo-install -y kernel-\"$(uname -r)\" \n```\nThen for RHEL 8 \u0026 6 install sudo debuginfo, using:\n```\ndebuginfo-install sudo\n```\n \n2. Create the following systemtap script: (call the file as sudoedit-block.stap)\n```\nprobe process(\"/usr/bin/sudo\").function(\"main\") {\n command = cmdline_args(0,0,\"\");\n if (isinstr(command, \"edit\")) {\n raise(9);\n }\n}\n```\n3. Install the script using the following command: (using root)\n```\n# nohup stap -g sudoedit-block.stap \u0026\n```\n(This should output the PID number of the systemtap script)\n\nThis script will cause the vulnerable sudoedit binary to stop working. The sudo command will still work as usual.\nThe above change does not persist across reboots and must be applied after each reboot.\n\nPlease consult How to make a systemtap kernel module load persistently across reboots? (https://access.redhat.com/solutions/5752521) to learn how to\nturn this into a service managed by initd. \n\n4. Once the new fixed packages are installed, the systemtap script can be removed by killing the systemtap process. For example, by using:\n```\n# kill -s SIGTERM 7590\n```\n(where 7590 is the PID of the systemtap process)", "product_ids": [ "8Base-RHV-Agents-4:cockpit-ovirt-0:0.14.17-1.el8ev.src", "8Base-RHV-Agents-4:cockpit-ovirt-dashboard-0:0.14.17-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:libipa_hbac-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libipa_hbac-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsmbclient-0:4.12.3-12.el8.3.x86_64", "8Base-RHV-Hypervisor-4:libsmbclient-debuginfo-0:4.12.3-12.el8.3.x86_64", "8Base-RHV-Hypervisor-4:libsss_autofs-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_autofs-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_certmap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_certmap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_idmap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_idmap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_nss_idmap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_nss_idmap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_nss_idmap-devel-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_simpleifp-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_simpleifp-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_sudo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_sudo-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-libipa_hbac-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-libipa_hbac-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-libsss_nss_idmap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-libsss_nss_idmap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-sss-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-sss-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-sss-murmur-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-sss-murmur-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-sssdconfig-0:2.3.0-9.el8.noarch", "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.4-20210201.0.el8_3.src", "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.4-20210201.0.el8_3.noarch", "8Base-RHV-Hypervisor-4:samba-0:4.12.3-12.el8.3.src", "8Base-RHV-Hypervisor-4:samba-debuginfo-0:4.12.3-12.el8.3.x86_64", "8Base-RHV-Hypervisor-4:samba-debugsource-0:4.12.3-12.el8.3.x86_64", "8Base-RHV-Hypervisor-4:sssd-0:2.3.0-9.el8.src", "8Base-RHV-Hypervisor-4:sssd-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-ad-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-ad-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-client-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-client-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-common-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-common-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-common-pac-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-common-pac-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-dbus-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-dbus-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-debugsource-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-ipa-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-ipa-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-kcm-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-kcm-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-krb5-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-krb5-common-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-krb5-common-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-krb5-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-ldap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-ldap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-libwbclient-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-libwbclient-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-nfs-idmap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-nfs-idmap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-polkit-rules-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-proxy-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-proxy-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-tools-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-tools-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-winbind-idmap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-winbind-idmap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.16-0.1.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.16-0.1.el8ev.src", "8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.16-0.1.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.4-1.el8ev.src", "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.4-1.el8ev.x86_64", "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.4-1.el8ev.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.4-20210201.0.el8_3.src", "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.4-20210201.0.el8_3.noarch" ] } ], "threats": [ { "category": "exploit_status", "date": "2022-04-06T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Important" } ], "title": "sudo: Heap buffer overflow in argument parsing" } ] }
rhsa-2021_0395
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for redhat-virtualization-host is now available for Red Hat Virtualization 4 for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The redhat-virtualization-host packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host. Red Hat Virtualization Hosts (RHVH) are installed using a special build of Red Hat Enterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host\u0027s resources and performing administrative tasks.\n\nSecurity Fix(es):\n\n* sudo: Heap buffer overflow in argument parsing (CVE-2021-3156)\n\n* dnsmasq: loose address/port check in reply_query() makes forging replies easier for an off-path attacker (CVE-2020-25684)\n\n* dnsmasq: loose query name check in reply_query() makes forging replies easier for an off-path attacker (CVE-2020-25685)\n\n* dnsmasq: multiple queries forwarded for the same name makes forging replies easier for an off-path attacker (CVE-2020-25686)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* When performing an upgrade of the Red Hat Virtualization Host using the command `yum update`, the yum repository for RHV 4.3 EUS is unreachable\n\nAs a workaround, run the following command:\n`# yum update --releasever=7Server` (BZ#1899378)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:0395", "url": "https://access.redhat.com/errata/RHSA-2021:0395" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-001", "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-001" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-002", "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-002" }, { "category": "external", "summary": "1889686", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889686" }, { "category": "external", "summary": "1889688", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889688" }, { "category": "external", "summary": "1890125", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890125" }, { "category": "external", "summary": "1899378", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1899378" }, { "category": "external", "summary": "1916111", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1916111" }, { "category": "external", "summary": "1917684", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1917684" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_0395.json" } ], "title": "Red Hat Security Advisory: RHV-H security, bug fix, enhancement update (redhat-virtualization-host) 4.3.13", "tracking": { "current_release_date": "2024-11-15T11:45:51+00:00", "generator": { "date": "2024-11-15T11:45:51+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2021:0395", "initial_release_date": "2021-02-03T10:39:04+00:00", "revision_history": [ { "date": "2021-02-03T10:39:04+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-02-03T10:39:04+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-15T11:45:51+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product": { "name": "Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "7Server-RHEV-4-Agents-7", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::hypervisor" } } }, { "category": "product_name", "name": "RHEL 7-based RHEV-H for RHEV 4 (build requirements)", "product": { "name": "RHEL 7-based RHEV-H for RHEV 4 (build requirements)", "product_id": "7Server-RHEV-4-HypervisorBuild-7", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::hypervisor" } } }, { "category": "product_name", "name": "Red Hat Virtualization 4 Hypervisor for RHEL 7", "product": { "name": "Red Hat Virtualization 4 Hypervisor for RHEL 7", "product_id": "7Server-RHEV-4-Hypervisor-7", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::hypervisor" } } } ], "category": "product_family", "name": "Red Hat Virtualization" }, { "branches": [ { "category": "product_version", "name": "vdsm-0:4.30.51-1.el7ev.src", "product": { "name": "vdsm-0:4.30.51-1.el7ev.src", "product_id": "vdsm-0:4.30.51-1.el7ev.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm@4.30.51-1.el7ev?arch=src" } } }, { "category": "product_version", "name": "redhat-release-virtualization-host-0:4.3.13-2.el7ev.src", "product": { "name": "redhat-release-virtualization-host-0:4.3.13-2.el7ev.src", "product_id": "redhat-release-virtualization-host-0:4.3.13-2.el7ev.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/redhat-release-virtualization-host@4.3.13-2.el7ev?arch=src" } } }, { "category": "product_version", "name": "redhat-virtualization-host-0:4.3.13-20210127.0.el7_9.src", "product": { "name": "redhat-virtualization-host-0:4.3.13-20210127.0.el7_9.src", "product_id": "redhat-virtualization-host-0:4.3.13-20210127.0.el7_9.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/redhat-virtualization-host@4.3.13-20210127.0.el7_9?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "vdsm-0:4.30.51-1.el7ev.x86_64", "product": { "name": "vdsm-0:4.30.51-1.el7ev.x86_64", "product_id": "vdsm-0:4.30.51-1.el7ev.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm@4.30.51-1.el7ev?arch=x86_64" } } }, { "category": "product_version", "name": "vdsm-gluster-0:4.30.51-1.el7ev.x86_64", "product": { "name": "vdsm-gluster-0:4.30.51-1.el7ev.x86_64", "product_id": "vdsm-gluster-0:4.30.51-1.el7ev.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm-gluster@4.30.51-1.el7ev?arch=x86_64" } } }, { "category": "product_version", "name": "vdsm-hook-checkips-0:4.30.51-1.el7ev.x86_64", "product": { "name": "vdsm-hook-checkips-0:4.30.51-1.el7ev.x86_64", "product_id": "vdsm-hook-checkips-0:4.30.51-1.el7ev.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm-hook-checkips@4.30.51-1.el7ev?arch=x86_64" } } }, { "category": "product_version", "name": "vdsm-hook-extra-ipv4-addrs-0:4.30.51-1.el7ev.x86_64", "product": { "name": "vdsm-hook-extra-ipv4-addrs-0:4.30.51-1.el7ev.x86_64", "product_id": "vdsm-hook-extra-ipv4-addrs-0:4.30.51-1.el7ev.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm-hook-extra-ipv4-addrs@4.30.51-1.el7ev?arch=x86_64" } } }, { "category": "product_version", "name": "vdsm-network-0:4.30.51-1.el7ev.x86_64", "product": { "name": "vdsm-network-0:4.30.51-1.el7ev.x86_64", "product_id": "vdsm-network-0:4.30.51-1.el7ev.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm-network@4.30.51-1.el7ev?arch=x86_64" } } }, { "category": "product_version", "name": "redhat-release-virtualization-host-0:4.3.13-2.el7ev.x86_64", "product": { "name": "redhat-release-virtualization-host-0:4.3.13-2.el7ev.x86_64", "product_id": "redhat-release-virtualization-host-0:4.3.13-2.el7ev.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/redhat-release-virtualization-host@4.3.13-2.el7ev?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "vdsm-0:4.30.51-1.el7ev.ppc64le", "product": { "name": "vdsm-0:4.30.51-1.el7ev.ppc64le", "product_id": "vdsm-0:4.30.51-1.el7ev.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm@4.30.51-1.el7ev?arch=ppc64le" } } }, { "category": "product_version", "name": "vdsm-gluster-0:4.30.51-1.el7ev.ppc64le", "product": { "name": "vdsm-gluster-0:4.30.51-1.el7ev.ppc64le", "product_id": "vdsm-gluster-0:4.30.51-1.el7ev.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm-gluster@4.30.51-1.el7ev?arch=ppc64le" } } }, { "category": "product_version", "name": "vdsm-hook-checkips-0:4.30.51-1.el7ev.ppc64le", "product": { "name": "vdsm-hook-checkips-0:4.30.51-1.el7ev.ppc64le", "product_id": "vdsm-hook-checkips-0:4.30.51-1.el7ev.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm-hook-checkips@4.30.51-1.el7ev?arch=ppc64le" } } }, { "category": "product_version", "name": "vdsm-hook-extra-ipv4-addrs-0:4.30.51-1.el7ev.ppc64le", "product": { "name": "vdsm-hook-extra-ipv4-addrs-0:4.30.51-1.el7ev.ppc64le", "product_id": "vdsm-hook-extra-ipv4-addrs-0:4.30.51-1.el7ev.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm-hook-extra-ipv4-addrs@4.30.51-1.el7ev?arch=ppc64le" } } }, { "category": "product_version", "name": "vdsm-network-0:4.30.51-1.el7ev.ppc64le", "product": { "name": "vdsm-network-0:4.30.51-1.el7ev.ppc64le", "product_id": "vdsm-network-0:4.30.51-1.el7ev.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm-network@4.30.51-1.el7ev?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "vdsm-api-0:4.30.51-1.el7ev.noarch", "product": { "name": "vdsm-api-0:4.30.51-1.el7ev.noarch", "product_id": "vdsm-api-0:4.30.51-1.el7ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm-api@4.30.51-1.el7ev?arch=noarch" } } }, { "category": "product_version", "name": "vdsm-client-0:4.30.51-1.el7ev.noarch", "product": { "name": "vdsm-client-0:4.30.51-1.el7ev.noarch", "product_id": "vdsm-client-0:4.30.51-1.el7ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm-client@4.30.51-1.el7ev?arch=noarch" } } }, { "category": "product_version", "name": "vdsm-common-0:4.30.51-1.el7ev.noarch", "product": { "name": "vdsm-common-0:4.30.51-1.el7ev.noarch", "product_id": "vdsm-common-0:4.30.51-1.el7ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm-common@4.30.51-1.el7ev?arch=noarch" } } }, { "category": "product_version", "name": "vdsm-hook-cpuflags-0:4.30.51-1.el7ev.noarch", "product": { "name": "vdsm-hook-cpuflags-0:4.30.51-1.el7ev.noarch", "product_id": "vdsm-hook-cpuflags-0:4.30.51-1.el7ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm-hook-cpuflags@4.30.51-1.el7ev?arch=noarch" } } }, { "category": "product_version", "name": "vdsm-hook-ethtool-options-0:4.30.51-1.el7ev.noarch", "product": { "name": "vdsm-hook-ethtool-options-0:4.30.51-1.el7ev.noarch", "product_id": "vdsm-hook-ethtool-options-0:4.30.51-1.el7ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm-hook-ethtool-options@4.30.51-1.el7ev?arch=noarch" } } }, { "category": "product_version", "name": "vdsm-hook-fcoe-0:4.30.51-1.el7ev.noarch", "product": { "name": "vdsm-hook-fcoe-0:4.30.51-1.el7ev.noarch", "product_id": "vdsm-hook-fcoe-0:4.30.51-1.el7ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm-hook-fcoe@4.30.51-1.el7ev?arch=noarch" } } }, { "category": "product_version", "name": "vdsm-hook-localdisk-0:4.30.51-1.el7ev.noarch", "product": { "name": "vdsm-hook-localdisk-0:4.30.51-1.el7ev.noarch", "product_id": "vdsm-hook-localdisk-0:4.30.51-1.el7ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm-hook-localdisk@4.30.51-1.el7ev?arch=noarch" } } }, { "category": "product_version", "name": "vdsm-hook-macspoof-0:4.30.51-1.el7ev.noarch", "product": { "name": "vdsm-hook-macspoof-0:4.30.51-1.el7ev.noarch", "product_id": "vdsm-hook-macspoof-0:4.30.51-1.el7ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm-hook-macspoof@4.30.51-1.el7ev?arch=noarch" } } }, { "category": "product_version", "name": "vdsm-hook-nestedvt-0:4.30.51-1.el7ev.noarch", "product": { "name": "vdsm-hook-nestedvt-0:4.30.51-1.el7ev.noarch", "product_id": "vdsm-hook-nestedvt-0:4.30.51-1.el7ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm-hook-nestedvt@4.30.51-1.el7ev?arch=noarch" } } }, { "category": "product_version", "name": "vdsm-hook-openstacknet-0:4.30.51-1.el7ev.noarch", "product": { "name": "vdsm-hook-openstacknet-0:4.30.51-1.el7ev.noarch", "product_id": "vdsm-hook-openstacknet-0:4.30.51-1.el7ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm-hook-openstacknet@4.30.51-1.el7ev?arch=noarch" } } }, { "category": "product_version", "name": "vdsm-hook-vhostmd-0:4.30.51-1.el7ev.noarch", "product": { "name": "vdsm-hook-vhostmd-0:4.30.51-1.el7ev.noarch", "product_id": "vdsm-hook-vhostmd-0:4.30.51-1.el7ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm-hook-vhostmd@4.30.51-1.el7ev?arch=noarch" } } }, { "category": "product_version", "name": "vdsm-hook-vmfex-dev-0:4.30.51-1.el7ev.noarch", "product": { "name": "vdsm-hook-vmfex-dev-0:4.30.51-1.el7ev.noarch", "product_id": "vdsm-hook-vmfex-dev-0:4.30.51-1.el7ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm-hook-vmfex-dev@4.30.51-1.el7ev?arch=noarch" } } }, { "category": "product_version", "name": "vdsm-http-0:4.30.51-1.el7ev.noarch", "product": { "name": "vdsm-http-0:4.30.51-1.el7ev.noarch", "product_id": "vdsm-http-0:4.30.51-1.el7ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm-http@4.30.51-1.el7ev?arch=noarch" } } }, { "category": "product_version", "name": "vdsm-jsonrpc-0:4.30.51-1.el7ev.noarch", "product": { "name": "vdsm-jsonrpc-0:4.30.51-1.el7ev.noarch", "product_id": "vdsm-jsonrpc-0:4.30.51-1.el7ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm-jsonrpc@4.30.51-1.el7ev?arch=noarch" } } }, { "category": "product_version", "name": "vdsm-python-0:4.30.51-1.el7ev.noarch", "product": { "name": "vdsm-python-0:4.30.51-1.el7ev.noarch", "product_id": "vdsm-python-0:4.30.51-1.el7ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm-python@4.30.51-1.el7ev?arch=noarch" } } }, { "category": "product_version", "name": "vdsm-yajsonrpc-0:4.30.51-1.el7ev.noarch", "product": { "name": "vdsm-yajsonrpc-0:4.30.51-1.el7ev.noarch", "product_id": "vdsm-yajsonrpc-0:4.30.51-1.el7ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm-yajsonrpc@4.30.51-1.el7ev?arch=noarch" } } }, { "category": "product_version", "name": "redhat-virtualization-host-image-update-placeholder-0:4.3.13-2.el7ev.noarch", "product": { "name": "redhat-virtualization-host-image-update-placeholder-0:4.3.13-2.el7ev.noarch", "product_id": "redhat-virtualization-host-image-update-placeholder-0:4.3.13-2.el7ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/redhat-virtualization-host-image-update-placeholder@4.3.13-2.el7ev?arch=noarch" } } }, { "category": "product_version", "name": "redhat-virtualization-host-image-update-0:4.3.13-20210127.0.el7_9.noarch", "product": { "name": "redhat-virtualization-host-image-update-0:4.3.13-20210127.0.el7_9.noarch", "product_id": "redhat-virtualization-host-image-update-0:4.3.13-20210127.0.el7_9.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/redhat-virtualization-host-image-update@4.3.13-20210127.0.el7_9?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "vdsm-0:4.30.51-1.el7ev.ppc64le as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "7Server-RHEV-4-Agents-7:vdsm-0:4.30.51-1.el7ev.ppc64le" }, "product_reference": "vdsm-0:4.30.51-1.el7ev.ppc64le", "relates_to_product_reference": "7Server-RHEV-4-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-0:4.30.51-1.el7ev.src as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "7Server-RHEV-4-Agents-7:vdsm-0:4.30.51-1.el7ev.src" }, "product_reference": "vdsm-0:4.30.51-1.el7ev.src", "relates_to_product_reference": "7Server-RHEV-4-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-0:4.30.51-1.el7ev.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "7Server-RHEV-4-Agents-7:vdsm-0:4.30.51-1.el7ev.x86_64" }, "product_reference": "vdsm-0:4.30.51-1.el7ev.x86_64", "relates_to_product_reference": "7Server-RHEV-4-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-api-0:4.30.51-1.el7ev.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "7Server-RHEV-4-Agents-7:vdsm-api-0:4.30.51-1.el7ev.noarch" }, "product_reference": "vdsm-api-0:4.30.51-1.el7ev.noarch", "relates_to_product_reference": "7Server-RHEV-4-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-client-0:4.30.51-1.el7ev.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "7Server-RHEV-4-Agents-7:vdsm-client-0:4.30.51-1.el7ev.noarch" }, "product_reference": "vdsm-client-0:4.30.51-1.el7ev.noarch", "relates_to_product_reference": "7Server-RHEV-4-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-common-0:4.30.51-1.el7ev.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "7Server-RHEV-4-Agents-7:vdsm-common-0:4.30.51-1.el7ev.noarch" }, "product_reference": "vdsm-common-0:4.30.51-1.el7ev.noarch", "relates_to_product_reference": "7Server-RHEV-4-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-gluster-0:4.30.51-1.el7ev.ppc64le as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "7Server-RHEV-4-Agents-7:vdsm-gluster-0:4.30.51-1.el7ev.ppc64le" }, "product_reference": "vdsm-gluster-0:4.30.51-1.el7ev.ppc64le", "relates_to_product_reference": "7Server-RHEV-4-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-gluster-0:4.30.51-1.el7ev.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "7Server-RHEV-4-Agents-7:vdsm-gluster-0:4.30.51-1.el7ev.x86_64" }, "product_reference": "vdsm-gluster-0:4.30.51-1.el7ev.x86_64", "relates_to_product_reference": "7Server-RHEV-4-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-hook-checkips-0:4.30.51-1.el7ev.ppc64le as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "7Server-RHEV-4-Agents-7:vdsm-hook-checkips-0:4.30.51-1.el7ev.ppc64le" }, "product_reference": "vdsm-hook-checkips-0:4.30.51-1.el7ev.ppc64le", "relates_to_product_reference": "7Server-RHEV-4-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-hook-checkips-0:4.30.51-1.el7ev.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "7Server-RHEV-4-Agents-7:vdsm-hook-checkips-0:4.30.51-1.el7ev.x86_64" }, "product_reference": "vdsm-hook-checkips-0:4.30.51-1.el7ev.x86_64", "relates_to_product_reference": "7Server-RHEV-4-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-hook-cpuflags-0:4.30.51-1.el7ev.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "7Server-RHEV-4-Agents-7:vdsm-hook-cpuflags-0:4.30.51-1.el7ev.noarch" }, "product_reference": "vdsm-hook-cpuflags-0:4.30.51-1.el7ev.noarch", "relates_to_product_reference": "7Server-RHEV-4-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-hook-ethtool-options-0:4.30.51-1.el7ev.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "7Server-RHEV-4-Agents-7:vdsm-hook-ethtool-options-0:4.30.51-1.el7ev.noarch" }, "product_reference": "vdsm-hook-ethtool-options-0:4.30.51-1.el7ev.noarch", "relates_to_product_reference": "7Server-RHEV-4-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-hook-extra-ipv4-addrs-0:4.30.51-1.el7ev.ppc64le as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "7Server-RHEV-4-Agents-7:vdsm-hook-extra-ipv4-addrs-0:4.30.51-1.el7ev.ppc64le" }, "product_reference": "vdsm-hook-extra-ipv4-addrs-0:4.30.51-1.el7ev.ppc64le", "relates_to_product_reference": "7Server-RHEV-4-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-hook-extra-ipv4-addrs-0:4.30.51-1.el7ev.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "7Server-RHEV-4-Agents-7:vdsm-hook-extra-ipv4-addrs-0:4.30.51-1.el7ev.x86_64" }, "product_reference": "vdsm-hook-extra-ipv4-addrs-0:4.30.51-1.el7ev.x86_64", "relates_to_product_reference": "7Server-RHEV-4-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-hook-fcoe-0:4.30.51-1.el7ev.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "7Server-RHEV-4-Agents-7:vdsm-hook-fcoe-0:4.30.51-1.el7ev.noarch" }, "product_reference": "vdsm-hook-fcoe-0:4.30.51-1.el7ev.noarch", "relates_to_product_reference": "7Server-RHEV-4-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-hook-localdisk-0:4.30.51-1.el7ev.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "7Server-RHEV-4-Agents-7:vdsm-hook-localdisk-0:4.30.51-1.el7ev.noarch" }, "product_reference": "vdsm-hook-localdisk-0:4.30.51-1.el7ev.noarch", "relates_to_product_reference": "7Server-RHEV-4-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-hook-macspoof-0:4.30.51-1.el7ev.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "7Server-RHEV-4-Agents-7:vdsm-hook-macspoof-0:4.30.51-1.el7ev.noarch" }, "product_reference": "vdsm-hook-macspoof-0:4.30.51-1.el7ev.noarch", "relates_to_product_reference": "7Server-RHEV-4-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-hook-nestedvt-0:4.30.51-1.el7ev.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "7Server-RHEV-4-Agents-7:vdsm-hook-nestedvt-0:4.30.51-1.el7ev.noarch" }, "product_reference": "vdsm-hook-nestedvt-0:4.30.51-1.el7ev.noarch", "relates_to_product_reference": "7Server-RHEV-4-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-hook-openstacknet-0:4.30.51-1.el7ev.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "7Server-RHEV-4-Agents-7:vdsm-hook-openstacknet-0:4.30.51-1.el7ev.noarch" }, "product_reference": "vdsm-hook-openstacknet-0:4.30.51-1.el7ev.noarch", "relates_to_product_reference": "7Server-RHEV-4-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-hook-vhostmd-0:4.30.51-1.el7ev.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "7Server-RHEV-4-Agents-7:vdsm-hook-vhostmd-0:4.30.51-1.el7ev.noarch" }, "product_reference": "vdsm-hook-vhostmd-0:4.30.51-1.el7ev.noarch", "relates_to_product_reference": "7Server-RHEV-4-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-hook-vmfex-dev-0:4.30.51-1.el7ev.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "7Server-RHEV-4-Agents-7:vdsm-hook-vmfex-dev-0:4.30.51-1.el7ev.noarch" }, "product_reference": "vdsm-hook-vmfex-dev-0:4.30.51-1.el7ev.noarch", "relates_to_product_reference": "7Server-RHEV-4-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-http-0:4.30.51-1.el7ev.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "7Server-RHEV-4-Agents-7:vdsm-http-0:4.30.51-1.el7ev.noarch" }, "product_reference": "vdsm-http-0:4.30.51-1.el7ev.noarch", "relates_to_product_reference": "7Server-RHEV-4-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-jsonrpc-0:4.30.51-1.el7ev.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "7Server-RHEV-4-Agents-7:vdsm-jsonrpc-0:4.30.51-1.el7ev.noarch" }, "product_reference": "vdsm-jsonrpc-0:4.30.51-1.el7ev.noarch", "relates_to_product_reference": "7Server-RHEV-4-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-network-0:4.30.51-1.el7ev.ppc64le as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "7Server-RHEV-4-Agents-7:vdsm-network-0:4.30.51-1.el7ev.ppc64le" }, "product_reference": "vdsm-network-0:4.30.51-1.el7ev.ppc64le", "relates_to_product_reference": "7Server-RHEV-4-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-network-0:4.30.51-1.el7ev.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "7Server-RHEV-4-Agents-7:vdsm-network-0:4.30.51-1.el7ev.x86_64" }, "product_reference": "vdsm-network-0:4.30.51-1.el7ev.x86_64", "relates_to_product_reference": "7Server-RHEV-4-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-python-0:4.30.51-1.el7ev.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "7Server-RHEV-4-Agents-7:vdsm-python-0:4.30.51-1.el7ev.noarch" }, "product_reference": "vdsm-python-0:4.30.51-1.el7ev.noarch", "relates_to_product_reference": "7Server-RHEV-4-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-yajsonrpc-0:4.30.51-1.el7ev.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "7Server-RHEV-4-Agents-7:vdsm-yajsonrpc-0:4.30.51-1.el7ev.noarch" }, "product_reference": "vdsm-yajsonrpc-0:4.30.51-1.el7ev.noarch", "relates_to_product_reference": "7Server-RHEV-4-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "redhat-virtualization-host-0:4.3.13-20210127.0.el7_9.src as a component of Red Hat Virtualization 4 Hypervisor for RHEL 7", "product_id": "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.13-20210127.0.el7_9.src" }, "product_reference": "redhat-virtualization-host-0:4.3.13-20210127.0.el7_9.src", "relates_to_product_reference": "7Server-RHEV-4-Hypervisor-7" }, { "category": "default_component_of", "full_product_name": { "name": "redhat-virtualization-host-image-update-0:4.3.13-20210127.0.el7_9.noarch as a component of Red Hat Virtualization 4 Hypervisor for RHEL 7", "product_id": "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.13-20210127.0.el7_9.noarch" }, "product_reference": "redhat-virtualization-host-image-update-0:4.3.13-20210127.0.el7_9.noarch", "relates_to_product_reference": "7Server-RHEV-4-Hypervisor-7" }, { "category": "default_component_of", "full_product_name": { "name": "redhat-release-virtualization-host-0:4.3.13-2.el7ev.src as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)", "product_id": "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.13-2.el7ev.src" }, "product_reference": "redhat-release-virtualization-host-0:4.3.13-2.el7ev.src", "relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7" }, { "category": "default_component_of", "full_product_name": { "name": "redhat-release-virtualization-host-0:4.3.13-2.el7ev.x86_64 as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)", "product_id": "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.13-2.el7ev.x86_64" }, "product_reference": "redhat-release-virtualization-host-0:4.3.13-2.el7ev.x86_64", "relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7" }, { "category": "default_component_of", "full_product_name": { "name": "redhat-virtualization-host-0:4.3.13-20210127.0.el7_9.src as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)", "product_id": "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.13-20210127.0.el7_9.src" }, "product_reference": "redhat-virtualization-host-0:4.3.13-20210127.0.el7_9.src", "relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7" }, { "category": "default_component_of", "full_product_name": { "name": "redhat-virtualization-host-image-update-0:4.3.13-20210127.0.el7_9.noarch as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)", "product_id": "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.13-20210127.0.el7_9.noarch" }, "product_reference": "redhat-virtualization-host-image-update-0:4.3.13-20210127.0.el7_9.noarch", "relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7" }, { "category": "default_component_of", "full_product_name": { "name": "redhat-virtualization-host-image-update-placeholder-0:4.3.13-2.el7ev.noarch as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)", "product_id": "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.13-2.el7ev.noarch" }, "product_reference": "redhat-virtualization-host-image-update-placeholder-0:4.3.13-2.el7ev.noarch", "relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Moshe Kol", "Shlomi Oberman" ], "organization": "JSOF" } ], "cve": "CVE-2020-25684", "cwe": { "id": "CWE-358", "name": "Improperly Implemented Security Check for Standard" }, "discovery_date": "2020-09-03T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RHEV-4-Agents-7:vdsm-0:4.30.51-1.el7ev.ppc64le", "7Server-RHEV-4-Agents-7:vdsm-0:4.30.51-1.el7ev.src", "7Server-RHEV-4-Agents-7:vdsm-0:4.30.51-1.el7ev.x86_64", "7Server-RHEV-4-Agents-7:vdsm-api-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-client-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-common-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-gluster-0:4.30.51-1.el7ev.ppc64le", "7Server-RHEV-4-Agents-7:vdsm-gluster-0:4.30.51-1.el7ev.x86_64", "7Server-RHEV-4-Agents-7:vdsm-hook-checkips-0:4.30.51-1.el7ev.ppc64le", "7Server-RHEV-4-Agents-7:vdsm-hook-checkips-0:4.30.51-1.el7ev.x86_64", "7Server-RHEV-4-Agents-7:vdsm-hook-cpuflags-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-ethtool-options-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-extra-ipv4-addrs-0:4.30.51-1.el7ev.ppc64le", "7Server-RHEV-4-Agents-7:vdsm-hook-extra-ipv4-addrs-0:4.30.51-1.el7ev.x86_64", "7Server-RHEV-4-Agents-7:vdsm-hook-fcoe-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-localdisk-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-macspoof-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-nestedvt-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-openstacknet-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-vhostmd-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-vmfex-dev-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-http-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-jsonrpc-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-network-0:4.30.51-1.el7ev.ppc64le", "7Server-RHEV-4-Agents-7:vdsm-network-0:4.30.51-1.el7ev.x86_64", "7Server-RHEV-4-Agents-7:vdsm-python-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-yajsonrpc-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.13-2.el7ev.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.13-2.el7ev.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.13-2.el7ev.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1889686" } ], "notes": [ { "category": "description", "text": "A flaw was found in dnsmasq. When getting a reply from a forwarded query, dnsmasq checks in the forward.c:reply_query() if the reply destination address/port is used by the pending forwarded queries. However, it does not use the address/port to retrieve the exact forwarded query, substantially reducing the number of attempts an attacker on the network would have to perform to forge a reply and get it accepted by dnsmasq. This issue contrasts with RFC5452, which specifies a query\u0027s attributes that all must be used to match a reply. This flaw allows an attacker to perform a DNS Cache Poisoning attack. If chained with CVE-2020-25685 or CVE-2020-25686, the attack complexity of a successful attack is reduced. The highest threat from this vulnerability is to data integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "dnsmasq: loose address/port check in reply_query() makes forging replies easier for an off-path attacker", "title": "Vulnerability summary" }, { "category": "other", "text": "Dnsmasq may be run by libvirt and/or NetworkManager. libvirt uses dnsmasq by default to provide DNS service to its guests. NetworkManager may be configured to use dnsmasq to provide DNS service to the system, if a line `dns=dnsmasq` is present in the `[main]` section of the configuration file /etc/NetworkManager/NetworkManager.conf.\n\nIn Red Hat OpenStack Platform (RHOSP) and Red Hat Virtualization (RHV), the dnsmasq package is provided by the underlying Red Hat Enterprise Linux (RHEL) product. RHOSP and RHV are therefore indirectly affected, so please ensure that the underlying RHEL dnsmasq package is updated.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.13-20210127.0.el7_9.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.13-20210127.0.el7_9.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.13-20210127.0.el7_9.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.13-20210127.0.el7_9.noarch" ], "known_not_affected": [ "7Server-RHEV-4-Agents-7:vdsm-0:4.30.51-1.el7ev.ppc64le", "7Server-RHEV-4-Agents-7:vdsm-0:4.30.51-1.el7ev.src", "7Server-RHEV-4-Agents-7:vdsm-0:4.30.51-1.el7ev.x86_64", "7Server-RHEV-4-Agents-7:vdsm-api-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-client-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-common-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-gluster-0:4.30.51-1.el7ev.ppc64le", "7Server-RHEV-4-Agents-7:vdsm-gluster-0:4.30.51-1.el7ev.x86_64", "7Server-RHEV-4-Agents-7:vdsm-hook-checkips-0:4.30.51-1.el7ev.ppc64le", "7Server-RHEV-4-Agents-7:vdsm-hook-checkips-0:4.30.51-1.el7ev.x86_64", "7Server-RHEV-4-Agents-7:vdsm-hook-cpuflags-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-ethtool-options-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-extra-ipv4-addrs-0:4.30.51-1.el7ev.ppc64le", "7Server-RHEV-4-Agents-7:vdsm-hook-extra-ipv4-addrs-0:4.30.51-1.el7ev.x86_64", "7Server-RHEV-4-Agents-7:vdsm-hook-fcoe-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-localdisk-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-macspoof-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-nestedvt-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-openstacknet-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-vhostmd-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-vmfex-dev-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-http-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-jsonrpc-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-network-0:4.30.51-1.el7ev.ppc64le", "7Server-RHEV-4-Agents-7:vdsm-network-0:4.30.51-1.el7ev.x86_64", "7Server-RHEV-4-Agents-7:vdsm-python-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-yajsonrpc-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.13-2.el7ev.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.13-2.el7ev.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.13-2.el7ev.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-25684" }, { "category": "external", "summary": "RHBZ#1889686", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889686" }, { "category": "external", "summary": "RHSB-2021-001", "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-001" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-25684", "url": "https://www.cve.org/CVERecord?id=CVE-2020-25684" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25684", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25684" }, { "category": "external", "summary": "https://www.jsof-tech.com/disclosures/dnspooq/", "url": "https://www.jsof-tech.com/disclosures/dnspooq/" } ], "release_date": "2021-01-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-02-03T10:39:04+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891", "product_ids": [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.13-20210127.0.el7_9.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.13-20210127.0.el7_9.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.13-20210127.0.el7_9.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.13-20210127.0.el7_9.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0395" }, { "category": "workaround", "details": "The impact of this flaw can be reduced by disabling the dnsmasq cache by adding `--cache-size=0` when calling dnsmasq or by adding a line with `cache-size=0` to the dnsmasq configuration file (/etc/dnsmasq.conf by default).\n\nWhen using Red Hat Enterprise Linux 8.3 with libvirt through a virt:rhel module, use `virsh net-edit \u003cnetwork-name\u003e` and reference https://libvirt.org/formatnetwork.html#elementsNamespaces to add the suggested option `cache-size=0`. \n\nThere is no way to customize the dnsmasq configuration generated by libvirt, when using versions of Red Hat Enterprise Linux prior to version 8.3. If dnsmasq is being run through NetworkManager, create a new file in /etc/NetworkManager/dnsmasq.d/ and add `cache-size=0` to it.\n\nIn all cases, by disabling the cache, you may experience a performance loss in your environment due to all DNS queries being forwarded to the upstream servers. Please evaluate if the mitigation is appropriate for the system\u2019s environment before applying.", "product_ids": [ "7Server-RHEV-4-Agents-7:vdsm-0:4.30.51-1.el7ev.ppc64le", "7Server-RHEV-4-Agents-7:vdsm-0:4.30.51-1.el7ev.src", "7Server-RHEV-4-Agents-7:vdsm-0:4.30.51-1.el7ev.x86_64", "7Server-RHEV-4-Agents-7:vdsm-api-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-client-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-common-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-gluster-0:4.30.51-1.el7ev.ppc64le", "7Server-RHEV-4-Agents-7:vdsm-gluster-0:4.30.51-1.el7ev.x86_64", "7Server-RHEV-4-Agents-7:vdsm-hook-checkips-0:4.30.51-1.el7ev.ppc64le", "7Server-RHEV-4-Agents-7:vdsm-hook-checkips-0:4.30.51-1.el7ev.x86_64", "7Server-RHEV-4-Agents-7:vdsm-hook-cpuflags-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-ethtool-options-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-extra-ipv4-addrs-0:4.30.51-1.el7ev.ppc64le", "7Server-RHEV-4-Agents-7:vdsm-hook-extra-ipv4-addrs-0:4.30.51-1.el7ev.x86_64", "7Server-RHEV-4-Agents-7:vdsm-hook-fcoe-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-localdisk-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-macspoof-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-nestedvt-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-openstacknet-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-vhostmd-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-vmfex-dev-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-http-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-jsonrpc-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-network-0:4.30.51-1.el7ev.ppc64le", "7Server-RHEV-4-Agents-7:vdsm-network-0:4.30.51-1.el7ev.x86_64", "7Server-RHEV-4-Agents-7:vdsm-python-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-yajsonrpc-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.13-20210127.0.el7_9.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.13-20210127.0.el7_9.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.13-2.el7ev.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.13-2.el7ev.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.13-20210127.0.el7_9.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.13-20210127.0.el7_9.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.13-2.el7ev.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N", "version": "3.1" }, "products": [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.13-20210127.0.el7_9.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.13-20210127.0.el7_9.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.13-20210127.0.el7_9.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.13-20210127.0.el7_9.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "dnsmasq: loose address/port check in reply_query() makes forging replies easier for an off-path attacker" }, { "acknowledgments": [ { "names": [ "Moshe Kol", "Shlomi Oberman" ], "organization": "JSOF" } ], "cve": "CVE-2020-25685", "cwe": { "id": "CWE-326", "name": "Inadequate Encryption Strength" }, "discovery_date": "2020-09-03T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RHEV-4-Agents-7:vdsm-0:4.30.51-1.el7ev.ppc64le", "7Server-RHEV-4-Agents-7:vdsm-0:4.30.51-1.el7ev.src", "7Server-RHEV-4-Agents-7:vdsm-0:4.30.51-1.el7ev.x86_64", "7Server-RHEV-4-Agents-7:vdsm-api-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-client-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-common-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-gluster-0:4.30.51-1.el7ev.ppc64le", "7Server-RHEV-4-Agents-7:vdsm-gluster-0:4.30.51-1.el7ev.x86_64", "7Server-RHEV-4-Agents-7:vdsm-hook-checkips-0:4.30.51-1.el7ev.ppc64le", "7Server-RHEV-4-Agents-7:vdsm-hook-checkips-0:4.30.51-1.el7ev.x86_64", "7Server-RHEV-4-Agents-7:vdsm-hook-cpuflags-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-ethtool-options-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-extra-ipv4-addrs-0:4.30.51-1.el7ev.ppc64le", "7Server-RHEV-4-Agents-7:vdsm-hook-extra-ipv4-addrs-0:4.30.51-1.el7ev.x86_64", "7Server-RHEV-4-Agents-7:vdsm-hook-fcoe-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-localdisk-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-macspoof-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-nestedvt-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-openstacknet-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-vhostmd-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-vmfex-dev-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-http-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-jsonrpc-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-network-0:4.30.51-1.el7ev.ppc64le", "7Server-RHEV-4-Agents-7:vdsm-network-0:4.30.51-1.el7ev.x86_64", "7Server-RHEV-4-Agents-7:vdsm-python-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-yajsonrpc-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.13-2.el7ev.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.13-2.el7ev.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.13-2.el7ev.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1889688" } ], "notes": [ { "category": "description", "text": "A flaw was found in dnsmasq. When getting a reply from a forwarded query, dnsmasq checks in forward.c:reply_query(), which is the forwarded query that matches the reply, by only using a weak hash of the query name. Due to the weak hash (CRC32 when dnsmasq is compiled without DNSSEC, SHA-1 when it is) this flaw allows an off-path attacker to find several different domains all having the same hash, substantially reducing the number of attempts they would have to perform to forge a reply and get it accepted by dnsmasq. This is in contrast with RFC5452, which specifies that the query name is one of the attributes of a query that must be used to match a reply. This flaw could be abused to perform a DNS Cache Poisoning attack. If chained with CVE-2020-25684 the attack complexity of a successful attack is reduced. The highest threat from this vulnerability is to data integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "dnsmasq: loose query name check in reply_query() makes forging replies easier for an off-path attacker", "title": "Vulnerability summary" }, { "category": "other", "text": "Dnsmasq may be run by libvirt and/or NetworkManager. libvirt uses dnsmasq by default to provide DNS service to its guests. NetworkManager may be configured to use dnsmasq to provide DNS service to the system, if a line `dns=dnsmasq` is present in the `[main]` section of the configuration file /etc/NetworkManager/NetworkManager.conf.\n\nIn Red Hat OpenStack Platform (RHOSP) and Red Hat Virtualization (RHV), the dnsmasq package is provided by the underlying Red Hat Enterprise Linux (RHEL) product. RHOSP and RHV are therefore indirectly affected, so please ensure that the underlying RHEL dnsmasq package is updated.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.13-20210127.0.el7_9.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.13-20210127.0.el7_9.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.13-20210127.0.el7_9.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.13-20210127.0.el7_9.noarch" ], "known_not_affected": [ "7Server-RHEV-4-Agents-7:vdsm-0:4.30.51-1.el7ev.ppc64le", "7Server-RHEV-4-Agents-7:vdsm-0:4.30.51-1.el7ev.src", "7Server-RHEV-4-Agents-7:vdsm-0:4.30.51-1.el7ev.x86_64", "7Server-RHEV-4-Agents-7:vdsm-api-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-client-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-common-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-gluster-0:4.30.51-1.el7ev.ppc64le", "7Server-RHEV-4-Agents-7:vdsm-gluster-0:4.30.51-1.el7ev.x86_64", "7Server-RHEV-4-Agents-7:vdsm-hook-checkips-0:4.30.51-1.el7ev.ppc64le", "7Server-RHEV-4-Agents-7:vdsm-hook-checkips-0:4.30.51-1.el7ev.x86_64", "7Server-RHEV-4-Agents-7:vdsm-hook-cpuflags-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-ethtool-options-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-extra-ipv4-addrs-0:4.30.51-1.el7ev.ppc64le", "7Server-RHEV-4-Agents-7:vdsm-hook-extra-ipv4-addrs-0:4.30.51-1.el7ev.x86_64", "7Server-RHEV-4-Agents-7:vdsm-hook-fcoe-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-localdisk-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-macspoof-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-nestedvt-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-openstacknet-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-vhostmd-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-vmfex-dev-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-http-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-jsonrpc-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-network-0:4.30.51-1.el7ev.ppc64le", "7Server-RHEV-4-Agents-7:vdsm-network-0:4.30.51-1.el7ev.x86_64", "7Server-RHEV-4-Agents-7:vdsm-python-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-yajsonrpc-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.13-2.el7ev.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.13-2.el7ev.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.13-2.el7ev.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-25685" }, { "category": "external", "summary": "RHBZ#1889688", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889688" }, { "category": "external", "summary": "RHSB-2021-001", "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-001" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-25685", "url": "https://www.cve.org/CVERecord?id=CVE-2020-25685" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25685", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25685" }, { "category": "external", "summary": "https://www.jsof-tech.com/disclosures/dnspooq/", "url": "https://www.jsof-tech.com/disclosures/dnspooq/" } ], "release_date": "2021-01-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-02-03T10:39:04+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891", "product_ids": [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.13-20210127.0.el7_9.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.13-20210127.0.el7_9.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.13-20210127.0.el7_9.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.13-20210127.0.el7_9.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0395" }, { "category": "workaround", "details": "The impact of this flaw can be reduced by disabling the dnsmasq cache by adding `--cache-size=0` when calling dnsmasq or by adding a line with `cache-size=0` to the dnsmasq configuration file (/etc/dnsmasq.conf by default). \n\nWhen using Red Hat Enterprise Linux 8.3 with libvirt through a virt:rhel module, use `virsh net-edit \u003cnetwork-name\u003e` and reference https://libvirt.org/formatnetwork.html#elementsNamespaces to add the suggested option `cache-size=0`. \n\nThere is no way to customize the dnsmasq configuration generated by libvirt, when using versions of Red Hat Enterprise Linux prior to version 8.3. If dnsmasq is being run through NetworkManager, create a new file in /etc/NetworkManager/dnsmasq.d/ and add `cache-size=0` to it.\n\nIn all cases, by disabling the cache, you may experience a performance loss in your environment due to all DNS queries being forwarded to the upstream servers. Please evaluate if the mitigation is appropriate for the system\u2019s environment before applying.", "product_ids": [ "7Server-RHEV-4-Agents-7:vdsm-0:4.30.51-1.el7ev.ppc64le", "7Server-RHEV-4-Agents-7:vdsm-0:4.30.51-1.el7ev.src", "7Server-RHEV-4-Agents-7:vdsm-0:4.30.51-1.el7ev.x86_64", "7Server-RHEV-4-Agents-7:vdsm-api-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-client-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-common-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-gluster-0:4.30.51-1.el7ev.ppc64le", "7Server-RHEV-4-Agents-7:vdsm-gluster-0:4.30.51-1.el7ev.x86_64", "7Server-RHEV-4-Agents-7:vdsm-hook-checkips-0:4.30.51-1.el7ev.ppc64le", "7Server-RHEV-4-Agents-7:vdsm-hook-checkips-0:4.30.51-1.el7ev.x86_64", "7Server-RHEV-4-Agents-7:vdsm-hook-cpuflags-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-ethtool-options-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-extra-ipv4-addrs-0:4.30.51-1.el7ev.ppc64le", "7Server-RHEV-4-Agents-7:vdsm-hook-extra-ipv4-addrs-0:4.30.51-1.el7ev.x86_64", "7Server-RHEV-4-Agents-7:vdsm-hook-fcoe-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-localdisk-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-macspoof-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-nestedvt-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-openstacknet-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-vhostmd-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-vmfex-dev-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-http-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-jsonrpc-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-network-0:4.30.51-1.el7ev.ppc64le", "7Server-RHEV-4-Agents-7:vdsm-network-0:4.30.51-1.el7ev.x86_64", "7Server-RHEV-4-Agents-7:vdsm-python-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-yajsonrpc-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.13-20210127.0.el7_9.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.13-20210127.0.el7_9.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.13-2.el7ev.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.13-2.el7ev.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.13-20210127.0.el7_9.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.13-20210127.0.el7_9.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.13-2.el7ev.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N", "version": "3.1" }, "products": [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.13-20210127.0.el7_9.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.13-20210127.0.el7_9.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.13-20210127.0.el7_9.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.13-20210127.0.el7_9.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "dnsmasq: loose query name check in reply_query() makes forging replies easier for an off-path attacker" }, { "acknowledgments": [ { "names": [ "Moshe Kol", "Shlomi Oberman" ], "organization": "JSOF" } ], "cve": "CVE-2020-25686", "cwe": { "id": "CWE-290", "name": "Authentication Bypass by Spoofing" }, "discovery_date": "2020-09-03T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RHEV-4-Agents-7:vdsm-0:4.30.51-1.el7ev.ppc64le", "7Server-RHEV-4-Agents-7:vdsm-0:4.30.51-1.el7ev.src", "7Server-RHEV-4-Agents-7:vdsm-0:4.30.51-1.el7ev.x86_64", "7Server-RHEV-4-Agents-7:vdsm-api-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-client-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-common-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-gluster-0:4.30.51-1.el7ev.ppc64le", "7Server-RHEV-4-Agents-7:vdsm-gluster-0:4.30.51-1.el7ev.x86_64", "7Server-RHEV-4-Agents-7:vdsm-hook-checkips-0:4.30.51-1.el7ev.ppc64le", "7Server-RHEV-4-Agents-7:vdsm-hook-checkips-0:4.30.51-1.el7ev.x86_64", "7Server-RHEV-4-Agents-7:vdsm-hook-cpuflags-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-ethtool-options-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-extra-ipv4-addrs-0:4.30.51-1.el7ev.ppc64le", "7Server-RHEV-4-Agents-7:vdsm-hook-extra-ipv4-addrs-0:4.30.51-1.el7ev.x86_64", "7Server-RHEV-4-Agents-7:vdsm-hook-fcoe-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-localdisk-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-macspoof-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-nestedvt-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-openstacknet-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-vhostmd-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-vmfex-dev-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-http-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-jsonrpc-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-network-0:4.30.51-1.el7ev.ppc64le", "7Server-RHEV-4-Agents-7:vdsm-network-0:4.30.51-1.el7ev.x86_64", "7Server-RHEV-4-Agents-7:vdsm-python-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-yajsonrpc-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.13-2.el7ev.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.13-2.el7ev.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.13-2.el7ev.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1890125" } ], "notes": [ { "category": "description", "text": "A flaw was found in dnsmasq. When receiving a query, dnsmasq does not check for an existing pending request for the same name and forwards a new request. By default, a maximum of 150 pending queries can be sent to upstream servers, so there can be at most 150 queries for the same name. This flaw allows an off-path attacker on the network to substantially reduce the number of attempts that it would have to perform to forge a reply and have it accepted by dnsmasq. This issue is mentioned in the \"Birthday Attacks\" section of RFC5452. If chained with CVE-2020-25684, the attack complexity of a successful attack is reduced. The highest threat from this vulnerability is to data integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "dnsmasq: multiple queries forwarded for the same name makes forging replies easier for an off-path attacker", "title": "Vulnerability summary" }, { "category": "other", "text": "Dnsmasq may be run by libvirt and/or NetworkManager. libvirt uses dnsmasq by default to provide DNS service to its guests. NetworkManager may be configured to use dnsmasq to provide DNS service to the system, if a line `dns=dnsmasq` is present in the `[main]` section of the configuration file /etc/NetworkManager/NetworkManager.conf.\n\nIn Red Hat OpenStack Platform (RHOSP) and Red Hat Virtualization (RHV), the dnsmasq package is provided by the underlying Red Hat Enterprise Linux (RHEL) product. RHOSP and RHV are therefore indirectly affected, so please ensure that the underlying RHEL dnsmasq package is updated.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.13-20210127.0.el7_9.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.13-20210127.0.el7_9.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.13-20210127.0.el7_9.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.13-20210127.0.el7_9.noarch" ], "known_not_affected": [ "7Server-RHEV-4-Agents-7:vdsm-0:4.30.51-1.el7ev.ppc64le", "7Server-RHEV-4-Agents-7:vdsm-0:4.30.51-1.el7ev.src", "7Server-RHEV-4-Agents-7:vdsm-0:4.30.51-1.el7ev.x86_64", "7Server-RHEV-4-Agents-7:vdsm-api-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-client-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-common-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-gluster-0:4.30.51-1.el7ev.ppc64le", "7Server-RHEV-4-Agents-7:vdsm-gluster-0:4.30.51-1.el7ev.x86_64", "7Server-RHEV-4-Agents-7:vdsm-hook-checkips-0:4.30.51-1.el7ev.ppc64le", "7Server-RHEV-4-Agents-7:vdsm-hook-checkips-0:4.30.51-1.el7ev.x86_64", "7Server-RHEV-4-Agents-7:vdsm-hook-cpuflags-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-ethtool-options-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-extra-ipv4-addrs-0:4.30.51-1.el7ev.ppc64le", "7Server-RHEV-4-Agents-7:vdsm-hook-extra-ipv4-addrs-0:4.30.51-1.el7ev.x86_64", "7Server-RHEV-4-Agents-7:vdsm-hook-fcoe-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-localdisk-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-macspoof-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-nestedvt-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-openstacknet-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-vhostmd-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-vmfex-dev-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-http-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-jsonrpc-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-network-0:4.30.51-1.el7ev.ppc64le", "7Server-RHEV-4-Agents-7:vdsm-network-0:4.30.51-1.el7ev.x86_64", "7Server-RHEV-4-Agents-7:vdsm-python-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-yajsonrpc-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.13-2.el7ev.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.13-2.el7ev.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.13-2.el7ev.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-25686" }, { "category": "external", "summary": "RHBZ#1890125", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890125" }, { "category": "external", "summary": "RHSB-2021-001", "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-001" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-25686", "url": "https://www.cve.org/CVERecord?id=CVE-2020-25686" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25686", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25686" }, { "category": "external", "summary": "https://www.jsof-tech.com/disclosures/dnspooq/", "url": "https://www.jsof-tech.com/disclosures/dnspooq/" } ], "release_date": "2021-01-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-02-03T10:39:04+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891", "product_ids": [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.13-20210127.0.el7_9.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.13-20210127.0.el7_9.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.13-20210127.0.el7_9.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.13-20210127.0.el7_9.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0395" }, { "category": "workaround", "details": "The impact of this flaw can be reduced by disabling the dnsmasq cache by adding `--cache-size=0` when calling dnsmasq or by adding a line with `cache-size=0` to the dnsmasq configuration file (/etc/dnsmasq.conf by default). \n\nWhen using Red Hat Enterprise Linux 8.3 with libvirt through a virt:rhel module, use `virsh net-edit \u003cnetwork-name\u003e` and reference https://libvirt.org/formatnetwork.html#elementsNamespaces to add the suggested option `cache-size=0`. \n\nThere is no way to customize the dnsmasq configuration generated by libvirt, when using versions of Red Hat Enterprise Linux prior to version 8.3. If dnsmasq is being run through NetworkManager, create a new file in /etc/NetworkManager/dnsmasq.d/ and add `cache-size=0` to it.\n\nIn all cases, by disabling the cache, you may experience a performance loss in your environment due to all DNS queries being forwarded to the upstream servers. Please evaluate if the mitigation is appropriate for the system\u2019s environment before applying.", "product_ids": [ "7Server-RHEV-4-Agents-7:vdsm-0:4.30.51-1.el7ev.ppc64le", "7Server-RHEV-4-Agents-7:vdsm-0:4.30.51-1.el7ev.src", "7Server-RHEV-4-Agents-7:vdsm-0:4.30.51-1.el7ev.x86_64", "7Server-RHEV-4-Agents-7:vdsm-api-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-client-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-common-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-gluster-0:4.30.51-1.el7ev.ppc64le", "7Server-RHEV-4-Agents-7:vdsm-gluster-0:4.30.51-1.el7ev.x86_64", "7Server-RHEV-4-Agents-7:vdsm-hook-checkips-0:4.30.51-1.el7ev.ppc64le", "7Server-RHEV-4-Agents-7:vdsm-hook-checkips-0:4.30.51-1.el7ev.x86_64", "7Server-RHEV-4-Agents-7:vdsm-hook-cpuflags-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-ethtool-options-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-extra-ipv4-addrs-0:4.30.51-1.el7ev.ppc64le", "7Server-RHEV-4-Agents-7:vdsm-hook-extra-ipv4-addrs-0:4.30.51-1.el7ev.x86_64", "7Server-RHEV-4-Agents-7:vdsm-hook-fcoe-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-localdisk-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-macspoof-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-nestedvt-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-openstacknet-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-vhostmd-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-vmfex-dev-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-http-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-jsonrpc-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-network-0:4.30.51-1.el7ev.ppc64le", "7Server-RHEV-4-Agents-7:vdsm-network-0:4.30.51-1.el7ev.x86_64", "7Server-RHEV-4-Agents-7:vdsm-python-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-yajsonrpc-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.13-20210127.0.el7_9.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.13-20210127.0.el7_9.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.13-2.el7ev.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.13-2.el7ev.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.13-20210127.0.el7_9.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.13-20210127.0.el7_9.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.13-2.el7ev.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N", "version": "3.1" }, "products": [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.13-20210127.0.el7_9.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.13-20210127.0.el7_9.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.13-20210127.0.el7_9.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.13-20210127.0.el7_9.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "dnsmasq: multiple queries forwarded for the same name makes forging replies easier for an off-path attacker" }, { "cve": "CVE-2021-3156", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2021-01-19T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RHEV-4-Agents-7:vdsm-0:4.30.51-1.el7ev.ppc64le", "7Server-RHEV-4-Agents-7:vdsm-0:4.30.51-1.el7ev.src", "7Server-RHEV-4-Agents-7:vdsm-0:4.30.51-1.el7ev.x86_64", "7Server-RHEV-4-Agents-7:vdsm-api-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-client-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-common-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-gluster-0:4.30.51-1.el7ev.ppc64le", "7Server-RHEV-4-Agents-7:vdsm-gluster-0:4.30.51-1.el7ev.x86_64", "7Server-RHEV-4-Agents-7:vdsm-hook-checkips-0:4.30.51-1.el7ev.ppc64le", "7Server-RHEV-4-Agents-7:vdsm-hook-checkips-0:4.30.51-1.el7ev.x86_64", "7Server-RHEV-4-Agents-7:vdsm-hook-cpuflags-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-ethtool-options-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-extra-ipv4-addrs-0:4.30.51-1.el7ev.ppc64le", "7Server-RHEV-4-Agents-7:vdsm-hook-extra-ipv4-addrs-0:4.30.51-1.el7ev.x86_64", "7Server-RHEV-4-Agents-7:vdsm-hook-fcoe-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-localdisk-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-macspoof-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-nestedvt-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-openstacknet-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-vhostmd-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-vmfex-dev-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-http-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-jsonrpc-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-network-0:4.30.51-1.el7ev.ppc64le", "7Server-RHEV-4-Agents-7:vdsm-network-0:4.30.51-1.el7ev.x86_64", "7Server-RHEV-4-Agents-7:vdsm-python-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-yajsonrpc-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.13-2.el7ev.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.13-2.el7ev.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.13-2.el7ev.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1917684" } ], "notes": [ { "category": "description", "text": "A flaw was found in sudo. A heap-based buffer overflow was found in the way sudo parses command line arguments. This flaw is exploitable by any local user who can execute the sudo command (by default, any local user can execute sudo) without authentication. Successful exploitation of this flaw could lead to privilege escalation. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "sudo: Heap buffer overflow in argument parsing", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw does not affect the versions of sudo shipped with Red Hat Enterprise Linux 5, because the vulnerable code was not present in these versions.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.13-20210127.0.el7_9.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.13-20210127.0.el7_9.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.13-20210127.0.el7_9.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.13-20210127.0.el7_9.noarch" ], "known_not_affected": [ "7Server-RHEV-4-Agents-7:vdsm-0:4.30.51-1.el7ev.ppc64le", "7Server-RHEV-4-Agents-7:vdsm-0:4.30.51-1.el7ev.src", "7Server-RHEV-4-Agents-7:vdsm-0:4.30.51-1.el7ev.x86_64", "7Server-RHEV-4-Agents-7:vdsm-api-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-client-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-common-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-gluster-0:4.30.51-1.el7ev.ppc64le", "7Server-RHEV-4-Agents-7:vdsm-gluster-0:4.30.51-1.el7ev.x86_64", "7Server-RHEV-4-Agents-7:vdsm-hook-checkips-0:4.30.51-1.el7ev.ppc64le", "7Server-RHEV-4-Agents-7:vdsm-hook-checkips-0:4.30.51-1.el7ev.x86_64", "7Server-RHEV-4-Agents-7:vdsm-hook-cpuflags-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-ethtool-options-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-extra-ipv4-addrs-0:4.30.51-1.el7ev.ppc64le", "7Server-RHEV-4-Agents-7:vdsm-hook-extra-ipv4-addrs-0:4.30.51-1.el7ev.x86_64", "7Server-RHEV-4-Agents-7:vdsm-hook-fcoe-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-localdisk-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-macspoof-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-nestedvt-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-openstacknet-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-vhostmd-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-vmfex-dev-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-http-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-jsonrpc-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-network-0:4.30.51-1.el7ev.ppc64le", "7Server-RHEV-4-Agents-7:vdsm-network-0:4.30.51-1.el7ev.x86_64", "7Server-RHEV-4-Agents-7:vdsm-python-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-yajsonrpc-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.13-2.el7ev.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.13-2.el7ev.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.13-2.el7ev.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3156" }, { "category": "external", "summary": "RHBZ#1917684", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1917684" }, { "category": "external", "summary": "RHSB-2021-002", "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-002" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3156", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3156" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3156", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3156" }, { "category": "external", "summary": "https://www.qualys.com/2021/01/26/cve-2021-3156/baron-samedit-heap-based-overflow-sudo.txt", "url": "https://www.qualys.com/2021/01/26/cve-2021-3156/baron-samedit-heap-based-overflow-sudo.txt" }, { "category": "external", "summary": "https://www.sudo.ws/alerts/unescape_overflow.html", "url": "https://www.sudo.ws/alerts/unescape_overflow.html" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2021-01-26T18:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-02-03T10:39:04+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891", "product_ids": [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.13-20210127.0.el7_9.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.13-20210127.0.el7_9.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.13-20210127.0.el7_9.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.13-20210127.0.el7_9.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0395" }, { "category": "workaround", "details": "Red Hat Product Security strongly recommends customers to update to fixed sudo packages once they are available. For customers who cannot update immediately, the following interim partial mitigation using systemtap is suggested:\n\n1. Install required systemtap packages and dependencies: \n```\nsystemtap yum-utils kernel-devel-\"$(uname -r)\"\n```\n\nThen for RHEL 7 install kernel debuginfo, using:\n```\ndebuginfo-install -y kernel-\"$(uname -r)\" \n```\nThen for RHEL 8 \u0026 6 install sudo debuginfo, using:\n```\ndebuginfo-install sudo\n```\n \n2. Create the following systemtap script: (call the file as sudoedit-block.stap)\n```\nprobe process(\"/usr/bin/sudo\").function(\"main\") {\n command = cmdline_args(0,0,\"\");\n if (isinstr(command, \"edit\")) {\n raise(9);\n }\n}\n```\n3. Install the script using the following command: (using root)\n```\n# nohup stap -g sudoedit-block.stap \u0026\n```\n(This should output the PID number of the systemtap script)\n\nThis script will cause the vulnerable sudoedit binary to stop working. The sudo command will still work as usual.\nThe above change does not persist across reboots and must be applied after each reboot.\n\nPlease consult How to make a systemtap kernel module load persistently across reboots? (https://access.redhat.com/solutions/5752521) to learn how to\nturn this into a service managed by initd. \n\n4. Once the new fixed packages are installed, the systemtap script can be removed by killing the systemtap process. For example, by using:\n```\n# kill -s SIGTERM 7590\n```\n(where 7590 is the PID of the systemtap process)", "product_ids": [ "7Server-RHEV-4-Agents-7:vdsm-0:4.30.51-1.el7ev.ppc64le", "7Server-RHEV-4-Agents-7:vdsm-0:4.30.51-1.el7ev.src", "7Server-RHEV-4-Agents-7:vdsm-0:4.30.51-1.el7ev.x86_64", "7Server-RHEV-4-Agents-7:vdsm-api-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-client-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-common-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-gluster-0:4.30.51-1.el7ev.ppc64le", "7Server-RHEV-4-Agents-7:vdsm-gluster-0:4.30.51-1.el7ev.x86_64", "7Server-RHEV-4-Agents-7:vdsm-hook-checkips-0:4.30.51-1.el7ev.ppc64le", "7Server-RHEV-4-Agents-7:vdsm-hook-checkips-0:4.30.51-1.el7ev.x86_64", "7Server-RHEV-4-Agents-7:vdsm-hook-cpuflags-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-ethtool-options-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-extra-ipv4-addrs-0:4.30.51-1.el7ev.ppc64le", "7Server-RHEV-4-Agents-7:vdsm-hook-extra-ipv4-addrs-0:4.30.51-1.el7ev.x86_64", "7Server-RHEV-4-Agents-7:vdsm-hook-fcoe-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-localdisk-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-macspoof-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-nestedvt-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-openstacknet-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-vhostmd-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-vmfex-dev-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-http-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-jsonrpc-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-network-0:4.30.51-1.el7ev.ppc64le", "7Server-RHEV-4-Agents-7:vdsm-network-0:4.30.51-1.el7ev.x86_64", "7Server-RHEV-4-Agents-7:vdsm-python-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-yajsonrpc-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.13-20210127.0.el7_9.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.13-20210127.0.el7_9.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.13-2.el7ev.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.13-2.el7ev.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.13-20210127.0.el7_9.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.13-20210127.0.el7_9.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.13-2.el7ev.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.13-20210127.0.el7_9.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.13-20210127.0.el7_9.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.13-20210127.0.el7_9.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.13-20210127.0.el7_9.noarch" ] } ], "threats": [ { "category": "exploit_status", "date": "2022-04-06T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Important" } ], "title": "sudo: Heap buffer overflow in argument parsing" } ] }
rhsa-2021_0156
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for dnsmasq is now available for Red Hat Enterprise Linux 7.4 Advanced Update Support, Red Hat Enterprise Linux 7.4 Telco Extended Update Support, and Red Hat Enterprise Linux 7.4 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The dnsmasq packages contain Dnsmasq, a lightweight DNS (Domain Name Server) forwarder and DHCP (Dynamic Host Configuration Protocol) server.\n\nSecurity Fix(es):\n\n* dnsmasq: loose address/port check in reply_query() makes forging replies easier for an off-path attacker (CVE-2020-25684)\n\n* dnsmasq: loose query name check in reply_query() makes forging replies easier for an off-path attacker (CVE-2020-25685)\n\n* dnsmasq: multiple queries forwarded for the same name makes forging replies easier for an off-path attacker (CVE-2020-25686)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:0156", "url": "https://access.redhat.com/errata/RHSA-2021:0156" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-001", "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-001" }, { "category": "external", "summary": "1889686", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889686" }, { "category": "external", "summary": "1889688", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889688" }, { "category": "external", "summary": "1890125", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890125" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_0156.json" } ], "title": "Red Hat Security Advisory: dnsmasq security update", "tracking": { "current_release_date": "2024-11-15T07:27:34+00:00", "generator": { "date": "2024-11-15T07:27:34+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2021:0156", "initial_release_date": "2021-01-19T13:40:12+00:00", "revision_history": [ { "date": "2021-01-19T13:40:12+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-01-19T13:40:12+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-15T07:27:34+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Server AUS (v. 7.4)", "product": { "name": "Red Hat Enterprise Linux Server AUS (v. 7.4)", "product_id": "7Server-7.4.AUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_aus:7.4::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.4)", "product": { "name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.4)", "product_id": "7Server-optional-7.4.AUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_aus:7.4::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server E4S (v. 7.4)", "product": { "name": "Red Hat Enterprise Linux Server E4S (v. 7.4)", "product_id": "7Server-7.4.E4S", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_e4s:7.4::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.4)", "product": { "name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.4)", "product_id": "7Server-optional-7.4.E4S", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_e4s:7.4::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server TUS (v. 7.4)", "product": { "name": "Red Hat Enterprise Linux Server TUS (v. 7.4)", "product_id": "7Server-7.4.TUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_tus:7.4::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.4)", "product": { "name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.4)", "product_id": "7Server-optional-7.4.TUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_tus:7.4::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "dnsmasq-0:2.76-2.el7_4.3.src", "product": { "name": "dnsmasq-0:2.76-2.el7_4.3.src", "product_id": "dnsmasq-0:2.76-2.el7_4.3.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq@2.76-2.el7_4.3?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "dnsmasq-0:2.76-2.el7_4.3.x86_64", "product": { "name": "dnsmasq-0:2.76-2.el7_4.3.x86_64", "product_id": "dnsmasq-0:2.76-2.el7_4.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq@2.76-2.el7_4.3?arch=x86_64" } } }, { "category": "product_version", "name": "dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64", "product": { "name": "dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64", "product_id": "dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-debuginfo@2.76-2.el7_4.3?arch=x86_64" } } }, { "category": "product_version", "name": "dnsmasq-utils-0:2.76-2.el7_4.3.x86_64", "product": { "name": "dnsmasq-utils-0:2.76-2.el7_4.3.x86_64", "product_id": "dnsmasq-utils-0:2.76-2.el7_4.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-utils@2.76-2.el7_4.3?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "dnsmasq-0:2.76-2.el7_4.3.ppc64le", "product": { "name": "dnsmasq-0:2.76-2.el7_4.3.ppc64le", "product_id": "dnsmasq-0:2.76-2.el7_4.3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq@2.76-2.el7_4.3?arch=ppc64le" } } }, { "category": "product_version", "name": "dnsmasq-debuginfo-0:2.76-2.el7_4.3.ppc64le", "product": { "name": "dnsmasq-debuginfo-0:2.76-2.el7_4.3.ppc64le", "product_id": "dnsmasq-debuginfo-0:2.76-2.el7_4.3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-debuginfo@2.76-2.el7_4.3?arch=ppc64le" } } }, { "category": "product_version", "name": "dnsmasq-utils-0:2.76-2.el7_4.3.ppc64le", "product": { "name": "dnsmasq-utils-0:2.76-2.el7_4.3.ppc64le", "product_id": "dnsmasq-utils-0:2.76-2.el7_4.3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-utils@2.76-2.el7_4.3?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-2.el7_4.3.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)", "product_id": "7Server-7.4.AUS:dnsmasq-0:2.76-2.el7_4.3.src" }, "product_reference": "dnsmasq-0:2.76-2.el7_4.3.src", "relates_to_product_reference": "7Server-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-2.el7_4.3.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)", "product_id": "7Server-7.4.AUS:dnsmasq-0:2.76-2.el7_4.3.x86_64" }, "product_reference": "dnsmasq-0:2.76-2.el7_4.3.x86_64", "relates_to_product_reference": "7Server-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)", "product_id": "7Server-7.4.AUS:dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64" }, "product_reference": "dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64", "relates_to_product_reference": "7Server-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-2.el7_4.3.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)", "product_id": "7Server-7.4.AUS:dnsmasq-utils-0:2.76-2.el7_4.3.x86_64" }, "product_reference": "dnsmasq-utils-0:2.76-2.el7_4.3.x86_64", "relates_to_product_reference": "7Server-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-2.el7_4.3.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)", "product_id": "7Server-7.4.E4S:dnsmasq-0:2.76-2.el7_4.3.ppc64le" }, "product_reference": "dnsmasq-0:2.76-2.el7_4.3.ppc64le", "relates_to_product_reference": "7Server-7.4.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-2.el7_4.3.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)", "product_id": "7Server-7.4.E4S:dnsmasq-0:2.76-2.el7_4.3.src" }, "product_reference": "dnsmasq-0:2.76-2.el7_4.3.src", "relates_to_product_reference": "7Server-7.4.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-2.el7_4.3.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)", "product_id": "7Server-7.4.E4S:dnsmasq-0:2.76-2.el7_4.3.x86_64" }, "product_reference": "dnsmasq-0:2.76-2.el7_4.3.x86_64", "relates_to_product_reference": "7Server-7.4.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-2.el7_4.3.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)", "product_id": "7Server-7.4.E4S:dnsmasq-debuginfo-0:2.76-2.el7_4.3.ppc64le" }, "product_reference": "dnsmasq-debuginfo-0:2.76-2.el7_4.3.ppc64le", "relates_to_product_reference": "7Server-7.4.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)", "product_id": "7Server-7.4.E4S:dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64" }, "product_reference": "dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64", "relates_to_product_reference": "7Server-7.4.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-2.el7_4.3.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)", "product_id": "7Server-7.4.E4S:dnsmasq-utils-0:2.76-2.el7_4.3.ppc64le" }, "product_reference": "dnsmasq-utils-0:2.76-2.el7_4.3.ppc64le", "relates_to_product_reference": "7Server-7.4.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-2.el7_4.3.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)", "product_id": "7Server-7.4.E4S:dnsmasq-utils-0:2.76-2.el7_4.3.x86_64" }, "product_reference": "dnsmasq-utils-0:2.76-2.el7_4.3.x86_64", "relates_to_product_reference": "7Server-7.4.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-2.el7_4.3.src as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)", "product_id": "7Server-7.4.TUS:dnsmasq-0:2.76-2.el7_4.3.src" }, "product_reference": "dnsmasq-0:2.76-2.el7_4.3.src", "relates_to_product_reference": "7Server-7.4.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-2.el7_4.3.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)", "product_id": "7Server-7.4.TUS:dnsmasq-0:2.76-2.el7_4.3.x86_64" }, "product_reference": "dnsmasq-0:2.76-2.el7_4.3.x86_64", "relates_to_product_reference": "7Server-7.4.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)", "product_id": "7Server-7.4.TUS:dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64" }, "product_reference": "dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64", "relates_to_product_reference": "7Server-7.4.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-2.el7_4.3.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)", "product_id": "7Server-7.4.TUS:dnsmasq-utils-0:2.76-2.el7_4.3.x86_64" }, "product_reference": "dnsmasq-utils-0:2.76-2.el7_4.3.x86_64", "relates_to_product_reference": "7Server-7.4.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-2.el7_4.3.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)", "product_id": "7Server-optional-7.4.AUS:dnsmasq-0:2.76-2.el7_4.3.src" }, "product_reference": "dnsmasq-0:2.76-2.el7_4.3.src", "relates_to_product_reference": "7Server-optional-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-2.el7_4.3.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)", "product_id": "7Server-optional-7.4.AUS:dnsmasq-0:2.76-2.el7_4.3.x86_64" }, "product_reference": "dnsmasq-0:2.76-2.el7_4.3.x86_64", "relates_to_product_reference": "7Server-optional-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)", "product_id": "7Server-optional-7.4.AUS:dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64" }, "product_reference": "dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64", "relates_to_product_reference": "7Server-optional-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-2.el7_4.3.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)", "product_id": "7Server-optional-7.4.AUS:dnsmasq-utils-0:2.76-2.el7_4.3.x86_64" }, "product_reference": "dnsmasq-utils-0:2.76-2.el7_4.3.x86_64", "relates_to_product_reference": "7Server-optional-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-2.el7_4.3.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)", "product_id": "7Server-optional-7.4.E4S:dnsmasq-0:2.76-2.el7_4.3.ppc64le" }, "product_reference": "dnsmasq-0:2.76-2.el7_4.3.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-2.el7_4.3.src as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)", "product_id": "7Server-optional-7.4.E4S:dnsmasq-0:2.76-2.el7_4.3.src" }, "product_reference": "dnsmasq-0:2.76-2.el7_4.3.src", "relates_to_product_reference": "7Server-optional-7.4.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-2.el7_4.3.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)", "product_id": "7Server-optional-7.4.E4S:dnsmasq-0:2.76-2.el7_4.3.x86_64" }, "product_reference": "dnsmasq-0:2.76-2.el7_4.3.x86_64", "relates_to_product_reference": "7Server-optional-7.4.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-2.el7_4.3.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)", "product_id": "7Server-optional-7.4.E4S:dnsmasq-debuginfo-0:2.76-2.el7_4.3.ppc64le" }, "product_reference": "dnsmasq-debuginfo-0:2.76-2.el7_4.3.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)", "product_id": "7Server-optional-7.4.E4S:dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64" }, "product_reference": "dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64", "relates_to_product_reference": "7Server-optional-7.4.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-2.el7_4.3.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)", "product_id": "7Server-optional-7.4.E4S:dnsmasq-utils-0:2.76-2.el7_4.3.ppc64le" }, "product_reference": "dnsmasq-utils-0:2.76-2.el7_4.3.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-2.el7_4.3.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)", "product_id": "7Server-optional-7.4.E4S:dnsmasq-utils-0:2.76-2.el7_4.3.x86_64" }, "product_reference": "dnsmasq-utils-0:2.76-2.el7_4.3.x86_64", "relates_to_product_reference": "7Server-optional-7.4.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-2.el7_4.3.src as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.4)", "product_id": "7Server-optional-7.4.TUS:dnsmasq-0:2.76-2.el7_4.3.src" }, "product_reference": "dnsmasq-0:2.76-2.el7_4.3.src", "relates_to_product_reference": "7Server-optional-7.4.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-2.el7_4.3.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.4)", "product_id": "7Server-optional-7.4.TUS:dnsmasq-0:2.76-2.el7_4.3.x86_64" }, "product_reference": "dnsmasq-0:2.76-2.el7_4.3.x86_64", "relates_to_product_reference": "7Server-optional-7.4.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.4)", "product_id": "7Server-optional-7.4.TUS:dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64" }, "product_reference": "dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64", "relates_to_product_reference": "7Server-optional-7.4.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-2.el7_4.3.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.4)", "product_id": "7Server-optional-7.4.TUS:dnsmasq-utils-0:2.76-2.el7_4.3.x86_64" }, "product_reference": "dnsmasq-utils-0:2.76-2.el7_4.3.x86_64", "relates_to_product_reference": "7Server-optional-7.4.TUS" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Moshe Kol", "Shlomi Oberman" ], "organization": "JSOF" } ], "cve": "CVE-2020-25684", "cwe": { "id": "CWE-358", "name": "Improperly Implemented Security Check for Standard" }, "discovery_date": "2020-09-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1889686" } ], "notes": [ { "category": "description", "text": "A flaw was found in dnsmasq. When getting a reply from a forwarded query, dnsmasq checks in the forward.c:reply_query() if the reply destination address/port is used by the pending forwarded queries. However, it does not use the address/port to retrieve the exact forwarded query, substantially reducing the number of attempts an attacker on the network would have to perform to forge a reply and get it accepted by dnsmasq. This issue contrasts with RFC5452, which specifies a query\u0027s attributes that all must be used to match a reply. This flaw allows an attacker to perform a DNS Cache Poisoning attack. If chained with CVE-2020-25685 or CVE-2020-25686, the attack complexity of a successful attack is reduced. The highest threat from this vulnerability is to data integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "dnsmasq: loose address/port check in reply_query() makes forging replies easier for an off-path attacker", "title": "Vulnerability summary" }, { "category": "other", "text": "Dnsmasq may be run by libvirt and/or NetworkManager. libvirt uses dnsmasq by default to provide DNS service to its guests. NetworkManager may be configured to use dnsmasq to provide DNS service to the system, if a line `dns=dnsmasq` is present in the `[main]` section of the configuration file /etc/NetworkManager/NetworkManager.conf.\n\nIn Red Hat OpenStack Platform (RHOSP) and Red Hat Virtualization (RHV), the dnsmasq package is provided by the underlying Red Hat Enterprise Linux (RHEL) product. RHOSP and RHV are therefore indirectly affected, so please ensure that the underlying RHEL dnsmasq package is updated.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.4.AUS:dnsmasq-0:2.76-2.el7_4.3.src", "7Server-7.4.AUS:dnsmasq-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.AUS:dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.AUS:dnsmasq-utils-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.E4S:dnsmasq-0:2.76-2.el7_4.3.ppc64le", "7Server-7.4.E4S:dnsmasq-0:2.76-2.el7_4.3.src", "7Server-7.4.E4S:dnsmasq-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.E4S:dnsmasq-debuginfo-0:2.76-2.el7_4.3.ppc64le", "7Server-7.4.E4S:dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.E4S:dnsmasq-utils-0:2.76-2.el7_4.3.ppc64le", "7Server-7.4.E4S:dnsmasq-utils-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.TUS:dnsmasq-0:2.76-2.el7_4.3.src", "7Server-7.4.TUS:dnsmasq-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.TUS:dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.TUS:dnsmasq-utils-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.AUS:dnsmasq-0:2.76-2.el7_4.3.src", "7Server-optional-7.4.AUS:dnsmasq-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.AUS:dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.AUS:dnsmasq-utils-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.E4S:dnsmasq-0:2.76-2.el7_4.3.ppc64le", "7Server-optional-7.4.E4S:dnsmasq-0:2.76-2.el7_4.3.src", "7Server-optional-7.4.E4S:dnsmasq-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.E4S:dnsmasq-debuginfo-0:2.76-2.el7_4.3.ppc64le", "7Server-optional-7.4.E4S:dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.E4S:dnsmasq-utils-0:2.76-2.el7_4.3.ppc64le", "7Server-optional-7.4.E4S:dnsmasq-utils-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.TUS:dnsmasq-0:2.76-2.el7_4.3.src", "7Server-optional-7.4.TUS:dnsmasq-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.TUS:dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.TUS:dnsmasq-utils-0:2.76-2.el7_4.3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-25684" }, { "category": "external", "summary": "RHBZ#1889686", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889686" }, { "category": "external", "summary": "RHSB-2021-001", "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-001" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-25684", "url": "https://www.cve.org/CVERecord?id=CVE-2020-25684" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25684", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25684" }, { "category": "external", "summary": "https://www.jsof-tech.com/disclosures/dnspooq/", "url": "https://www.jsof-tech.com/disclosures/dnspooq/" } ], "release_date": "2021-01-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-01-19T13:40:12+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-7.4.AUS:dnsmasq-0:2.76-2.el7_4.3.src", "7Server-7.4.AUS:dnsmasq-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.AUS:dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.AUS:dnsmasq-utils-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.E4S:dnsmasq-0:2.76-2.el7_4.3.ppc64le", "7Server-7.4.E4S:dnsmasq-0:2.76-2.el7_4.3.src", "7Server-7.4.E4S:dnsmasq-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.E4S:dnsmasq-debuginfo-0:2.76-2.el7_4.3.ppc64le", "7Server-7.4.E4S:dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.E4S:dnsmasq-utils-0:2.76-2.el7_4.3.ppc64le", "7Server-7.4.E4S:dnsmasq-utils-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.TUS:dnsmasq-0:2.76-2.el7_4.3.src", "7Server-7.4.TUS:dnsmasq-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.TUS:dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.TUS:dnsmasq-utils-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.AUS:dnsmasq-0:2.76-2.el7_4.3.src", "7Server-optional-7.4.AUS:dnsmasq-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.AUS:dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.AUS:dnsmasq-utils-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.E4S:dnsmasq-0:2.76-2.el7_4.3.ppc64le", "7Server-optional-7.4.E4S:dnsmasq-0:2.76-2.el7_4.3.src", "7Server-optional-7.4.E4S:dnsmasq-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.E4S:dnsmasq-debuginfo-0:2.76-2.el7_4.3.ppc64le", "7Server-optional-7.4.E4S:dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.E4S:dnsmasq-utils-0:2.76-2.el7_4.3.ppc64le", "7Server-optional-7.4.E4S:dnsmasq-utils-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.TUS:dnsmasq-0:2.76-2.el7_4.3.src", "7Server-optional-7.4.TUS:dnsmasq-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.TUS:dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.TUS:dnsmasq-utils-0:2.76-2.el7_4.3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0156" }, { "category": "workaround", "details": "The impact of this flaw can be reduced by disabling the dnsmasq cache by adding `--cache-size=0` when calling dnsmasq or by adding a line with `cache-size=0` to the dnsmasq configuration file (/etc/dnsmasq.conf by default).\n\nWhen using Red Hat Enterprise Linux 8.3 with libvirt through a virt:rhel module, use `virsh net-edit \u003cnetwork-name\u003e` and reference https://libvirt.org/formatnetwork.html#elementsNamespaces to add the suggested option `cache-size=0`. \n\nThere is no way to customize the dnsmasq configuration generated by libvirt, when using versions of Red Hat Enterprise Linux prior to version 8.3. If dnsmasq is being run through NetworkManager, create a new file in /etc/NetworkManager/dnsmasq.d/ and add `cache-size=0` to it.\n\nIn all cases, by disabling the cache, you may experience a performance loss in your environment due to all DNS queries being forwarded to the upstream servers. Please evaluate if the mitigation is appropriate for the system\u2019s environment before applying.", "product_ids": [ "7Server-7.4.AUS:dnsmasq-0:2.76-2.el7_4.3.src", "7Server-7.4.AUS:dnsmasq-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.AUS:dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.AUS:dnsmasq-utils-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.E4S:dnsmasq-0:2.76-2.el7_4.3.ppc64le", "7Server-7.4.E4S:dnsmasq-0:2.76-2.el7_4.3.src", "7Server-7.4.E4S:dnsmasq-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.E4S:dnsmasq-debuginfo-0:2.76-2.el7_4.3.ppc64le", "7Server-7.4.E4S:dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.E4S:dnsmasq-utils-0:2.76-2.el7_4.3.ppc64le", "7Server-7.4.E4S:dnsmasq-utils-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.TUS:dnsmasq-0:2.76-2.el7_4.3.src", "7Server-7.4.TUS:dnsmasq-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.TUS:dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.TUS:dnsmasq-utils-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.AUS:dnsmasq-0:2.76-2.el7_4.3.src", "7Server-optional-7.4.AUS:dnsmasq-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.AUS:dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.AUS:dnsmasq-utils-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.E4S:dnsmasq-0:2.76-2.el7_4.3.ppc64le", "7Server-optional-7.4.E4S:dnsmasq-0:2.76-2.el7_4.3.src", "7Server-optional-7.4.E4S:dnsmasq-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.E4S:dnsmasq-debuginfo-0:2.76-2.el7_4.3.ppc64le", "7Server-optional-7.4.E4S:dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.E4S:dnsmasq-utils-0:2.76-2.el7_4.3.ppc64le", "7Server-optional-7.4.E4S:dnsmasq-utils-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.TUS:dnsmasq-0:2.76-2.el7_4.3.src", "7Server-optional-7.4.TUS:dnsmasq-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.TUS:dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.TUS:dnsmasq-utils-0:2.76-2.el7_4.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N", "version": "3.1" }, "products": [ "7Server-7.4.AUS:dnsmasq-0:2.76-2.el7_4.3.src", "7Server-7.4.AUS:dnsmasq-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.AUS:dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.AUS:dnsmasq-utils-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.E4S:dnsmasq-0:2.76-2.el7_4.3.ppc64le", "7Server-7.4.E4S:dnsmasq-0:2.76-2.el7_4.3.src", "7Server-7.4.E4S:dnsmasq-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.E4S:dnsmasq-debuginfo-0:2.76-2.el7_4.3.ppc64le", "7Server-7.4.E4S:dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.E4S:dnsmasq-utils-0:2.76-2.el7_4.3.ppc64le", "7Server-7.4.E4S:dnsmasq-utils-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.TUS:dnsmasq-0:2.76-2.el7_4.3.src", "7Server-7.4.TUS:dnsmasq-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.TUS:dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.TUS:dnsmasq-utils-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.AUS:dnsmasq-0:2.76-2.el7_4.3.src", "7Server-optional-7.4.AUS:dnsmasq-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.AUS:dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.AUS:dnsmasq-utils-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.E4S:dnsmasq-0:2.76-2.el7_4.3.ppc64le", "7Server-optional-7.4.E4S:dnsmasq-0:2.76-2.el7_4.3.src", "7Server-optional-7.4.E4S:dnsmasq-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.E4S:dnsmasq-debuginfo-0:2.76-2.el7_4.3.ppc64le", "7Server-optional-7.4.E4S:dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.E4S:dnsmasq-utils-0:2.76-2.el7_4.3.ppc64le", "7Server-optional-7.4.E4S:dnsmasq-utils-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.TUS:dnsmasq-0:2.76-2.el7_4.3.src", "7Server-optional-7.4.TUS:dnsmasq-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.TUS:dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.TUS:dnsmasq-utils-0:2.76-2.el7_4.3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "dnsmasq: loose address/port check in reply_query() makes forging replies easier for an off-path attacker" }, { "acknowledgments": [ { "names": [ "Moshe Kol", "Shlomi Oberman" ], "organization": "JSOF" } ], "cve": "CVE-2020-25685", "cwe": { "id": "CWE-326", "name": "Inadequate Encryption Strength" }, "discovery_date": "2020-09-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1889688" } ], "notes": [ { "category": "description", "text": "A flaw was found in dnsmasq. When getting a reply from a forwarded query, dnsmasq checks in forward.c:reply_query(), which is the forwarded query that matches the reply, by only using a weak hash of the query name. Due to the weak hash (CRC32 when dnsmasq is compiled without DNSSEC, SHA-1 when it is) this flaw allows an off-path attacker to find several different domains all having the same hash, substantially reducing the number of attempts they would have to perform to forge a reply and get it accepted by dnsmasq. This is in contrast with RFC5452, which specifies that the query name is one of the attributes of a query that must be used to match a reply. This flaw could be abused to perform a DNS Cache Poisoning attack. If chained with CVE-2020-25684 the attack complexity of a successful attack is reduced. The highest threat from this vulnerability is to data integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "dnsmasq: loose query name check in reply_query() makes forging replies easier for an off-path attacker", "title": "Vulnerability summary" }, { "category": "other", "text": "Dnsmasq may be run by libvirt and/or NetworkManager. libvirt uses dnsmasq by default to provide DNS service to its guests. NetworkManager may be configured to use dnsmasq to provide DNS service to the system, if a line `dns=dnsmasq` is present in the `[main]` section of the configuration file /etc/NetworkManager/NetworkManager.conf.\n\nIn Red Hat OpenStack Platform (RHOSP) and Red Hat Virtualization (RHV), the dnsmasq package is provided by the underlying Red Hat Enterprise Linux (RHEL) product. RHOSP and RHV are therefore indirectly affected, so please ensure that the underlying RHEL dnsmasq package is updated.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.4.AUS:dnsmasq-0:2.76-2.el7_4.3.src", "7Server-7.4.AUS:dnsmasq-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.AUS:dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.AUS:dnsmasq-utils-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.E4S:dnsmasq-0:2.76-2.el7_4.3.ppc64le", "7Server-7.4.E4S:dnsmasq-0:2.76-2.el7_4.3.src", "7Server-7.4.E4S:dnsmasq-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.E4S:dnsmasq-debuginfo-0:2.76-2.el7_4.3.ppc64le", "7Server-7.4.E4S:dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.E4S:dnsmasq-utils-0:2.76-2.el7_4.3.ppc64le", "7Server-7.4.E4S:dnsmasq-utils-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.TUS:dnsmasq-0:2.76-2.el7_4.3.src", "7Server-7.4.TUS:dnsmasq-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.TUS:dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.TUS:dnsmasq-utils-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.AUS:dnsmasq-0:2.76-2.el7_4.3.src", "7Server-optional-7.4.AUS:dnsmasq-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.AUS:dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.AUS:dnsmasq-utils-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.E4S:dnsmasq-0:2.76-2.el7_4.3.ppc64le", "7Server-optional-7.4.E4S:dnsmasq-0:2.76-2.el7_4.3.src", "7Server-optional-7.4.E4S:dnsmasq-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.E4S:dnsmasq-debuginfo-0:2.76-2.el7_4.3.ppc64le", "7Server-optional-7.4.E4S:dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.E4S:dnsmasq-utils-0:2.76-2.el7_4.3.ppc64le", "7Server-optional-7.4.E4S:dnsmasq-utils-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.TUS:dnsmasq-0:2.76-2.el7_4.3.src", "7Server-optional-7.4.TUS:dnsmasq-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.TUS:dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.TUS:dnsmasq-utils-0:2.76-2.el7_4.3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-25685" }, { "category": "external", "summary": "RHBZ#1889688", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889688" }, { "category": "external", "summary": "RHSB-2021-001", "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-001" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-25685", "url": "https://www.cve.org/CVERecord?id=CVE-2020-25685" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25685", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25685" }, { "category": "external", "summary": "https://www.jsof-tech.com/disclosures/dnspooq/", "url": "https://www.jsof-tech.com/disclosures/dnspooq/" } ], "release_date": "2021-01-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-01-19T13:40:12+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-7.4.AUS:dnsmasq-0:2.76-2.el7_4.3.src", "7Server-7.4.AUS:dnsmasq-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.AUS:dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.AUS:dnsmasq-utils-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.E4S:dnsmasq-0:2.76-2.el7_4.3.ppc64le", "7Server-7.4.E4S:dnsmasq-0:2.76-2.el7_4.3.src", "7Server-7.4.E4S:dnsmasq-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.E4S:dnsmasq-debuginfo-0:2.76-2.el7_4.3.ppc64le", "7Server-7.4.E4S:dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.E4S:dnsmasq-utils-0:2.76-2.el7_4.3.ppc64le", "7Server-7.4.E4S:dnsmasq-utils-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.TUS:dnsmasq-0:2.76-2.el7_4.3.src", "7Server-7.4.TUS:dnsmasq-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.TUS:dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.TUS:dnsmasq-utils-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.AUS:dnsmasq-0:2.76-2.el7_4.3.src", "7Server-optional-7.4.AUS:dnsmasq-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.AUS:dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.AUS:dnsmasq-utils-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.E4S:dnsmasq-0:2.76-2.el7_4.3.ppc64le", "7Server-optional-7.4.E4S:dnsmasq-0:2.76-2.el7_4.3.src", "7Server-optional-7.4.E4S:dnsmasq-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.E4S:dnsmasq-debuginfo-0:2.76-2.el7_4.3.ppc64le", "7Server-optional-7.4.E4S:dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.E4S:dnsmasq-utils-0:2.76-2.el7_4.3.ppc64le", "7Server-optional-7.4.E4S:dnsmasq-utils-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.TUS:dnsmasq-0:2.76-2.el7_4.3.src", "7Server-optional-7.4.TUS:dnsmasq-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.TUS:dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.TUS:dnsmasq-utils-0:2.76-2.el7_4.3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0156" }, { "category": "workaround", "details": "The impact of this flaw can be reduced by disabling the dnsmasq cache by adding `--cache-size=0` when calling dnsmasq or by adding a line with `cache-size=0` to the dnsmasq configuration file (/etc/dnsmasq.conf by default). \n\nWhen using Red Hat Enterprise Linux 8.3 with libvirt through a virt:rhel module, use `virsh net-edit \u003cnetwork-name\u003e` and reference https://libvirt.org/formatnetwork.html#elementsNamespaces to add the suggested option `cache-size=0`. \n\nThere is no way to customize the dnsmasq configuration generated by libvirt, when using versions of Red Hat Enterprise Linux prior to version 8.3. If dnsmasq is being run through NetworkManager, create a new file in /etc/NetworkManager/dnsmasq.d/ and add `cache-size=0` to it.\n\nIn all cases, by disabling the cache, you may experience a performance loss in your environment due to all DNS queries being forwarded to the upstream servers. Please evaluate if the mitigation is appropriate for the system\u2019s environment before applying.", "product_ids": [ "7Server-7.4.AUS:dnsmasq-0:2.76-2.el7_4.3.src", "7Server-7.4.AUS:dnsmasq-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.AUS:dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.AUS:dnsmasq-utils-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.E4S:dnsmasq-0:2.76-2.el7_4.3.ppc64le", "7Server-7.4.E4S:dnsmasq-0:2.76-2.el7_4.3.src", "7Server-7.4.E4S:dnsmasq-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.E4S:dnsmasq-debuginfo-0:2.76-2.el7_4.3.ppc64le", "7Server-7.4.E4S:dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.E4S:dnsmasq-utils-0:2.76-2.el7_4.3.ppc64le", "7Server-7.4.E4S:dnsmasq-utils-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.TUS:dnsmasq-0:2.76-2.el7_4.3.src", "7Server-7.4.TUS:dnsmasq-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.TUS:dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.TUS:dnsmasq-utils-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.AUS:dnsmasq-0:2.76-2.el7_4.3.src", "7Server-optional-7.4.AUS:dnsmasq-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.AUS:dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.AUS:dnsmasq-utils-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.E4S:dnsmasq-0:2.76-2.el7_4.3.ppc64le", "7Server-optional-7.4.E4S:dnsmasq-0:2.76-2.el7_4.3.src", "7Server-optional-7.4.E4S:dnsmasq-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.E4S:dnsmasq-debuginfo-0:2.76-2.el7_4.3.ppc64le", "7Server-optional-7.4.E4S:dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.E4S:dnsmasq-utils-0:2.76-2.el7_4.3.ppc64le", "7Server-optional-7.4.E4S:dnsmasq-utils-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.TUS:dnsmasq-0:2.76-2.el7_4.3.src", "7Server-optional-7.4.TUS:dnsmasq-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.TUS:dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.TUS:dnsmasq-utils-0:2.76-2.el7_4.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N", "version": "3.1" }, "products": [ "7Server-7.4.AUS:dnsmasq-0:2.76-2.el7_4.3.src", "7Server-7.4.AUS:dnsmasq-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.AUS:dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.AUS:dnsmasq-utils-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.E4S:dnsmasq-0:2.76-2.el7_4.3.ppc64le", "7Server-7.4.E4S:dnsmasq-0:2.76-2.el7_4.3.src", "7Server-7.4.E4S:dnsmasq-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.E4S:dnsmasq-debuginfo-0:2.76-2.el7_4.3.ppc64le", "7Server-7.4.E4S:dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.E4S:dnsmasq-utils-0:2.76-2.el7_4.3.ppc64le", "7Server-7.4.E4S:dnsmasq-utils-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.TUS:dnsmasq-0:2.76-2.el7_4.3.src", "7Server-7.4.TUS:dnsmasq-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.TUS:dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.TUS:dnsmasq-utils-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.AUS:dnsmasq-0:2.76-2.el7_4.3.src", "7Server-optional-7.4.AUS:dnsmasq-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.AUS:dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.AUS:dnsmasq-utils-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.E4S:dnsmasq-0:2.76-2.el7_4.3.ppc64le", "7Server-optional-7.4.E4S:dnsmasq-0:2.76-2.el7_4.3.src", "7Server-optional-7.4.E4S:dnsmasq-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.E4S:dnsmasq-debuginfo-0:2.76-2.el7_4.3.ppc64le", "7Server-optional-7.4.E4S:dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.E4S:dnsmasq-utils-0:2.76-2.el7_4.3.ppc64le", "7Server-optional-7.4.E4S:dnsmasq-utils-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.TUS:dnsmasq-0:2.76-2.el7_4.3.src", "7Server-optional-7.4.TUS:dnsmasq-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.TUS:dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.TUS:dnsmasq-utils-0:2.76-2.el7_4.3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "dnsmasq: loose query name check in reply_query() makes forging replies easier for an off-path attacker" }, { "acknowledgments": [ { "names": [ "Moshe Kol", "Shlomi Oberman" ], "organization": "JSOF" } ], "cve": "CVE-2020-25686", "cwe": { "id": "CWE-290", "name": "Authentication Bypass by Spoofing" }, "discovery_date": "2020-09-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1890125" } ], "notes": [ { "category": "description", "text": "A flaw was found in dnsmasq. When receiving a query, dnsmasq does not check for an existing pending request for the same name and forwards a new request. By default, a maximum of 150 pending queries can be sent to upstream servers, so there can be at most 150 queries for the same name. This flaw allows an off-path attacker on the network to substantially reduce the number of attempts that it would have to perform to forge a reply and have it accepted by dnsmasq. This issue is mentioned in the \"Birthday Attacks\" section of RFC5452. If chained with CVE-2020-25684, the attack complexity of a successful attack is reduced. The highest threat from this vulnerability is to data integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "dnsmasq: multiple queries forwarded for the same name makes forging replies easier for an off-path attacker", "title": "Vulnerability summary" }, { "category": "other", "text": "Dnsmasq may be run by libvirt and/or NetworkManager. libvirt uses dnsmasq by default to provide DNS service to its guests. NetworkManager may be configured to use dnsmasq to provide DNS service to the system, if a line `dns=dnsmasq` is present in the `[main]` section of the configuration file /etc/NetworkManager/NetworkManager.conf.\n\nIn Red Hat OpenStack Platform (RHOSP) and Red Hat Virtualization (RHV), the dnsmasq package is provided by the underlying Red Hat Enterprise Linux (RHEL) product. RHOSP and RHV are therefore indirectly affected, so please ensure that the underlying RHEL dnsmasq package is updated.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.4.AUS:dnsmasq-0:2.76-2.el7_4.3.src", "7Server-7.4.AUS:dnsmasq-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.AUS:dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.AUS:dnsmasq-utils-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.E4S:dnsmasq-0:2.76-2.el7_4.3.ppc64le", "7Server-7.4.E4S:dnsmasq-0:2.76-2.el7_4.3.src", "7Server-7.4.E4S:dnsmasq-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.E4S:dnsmasq-debuginfo-0:2.76-2.el7_4.3.ppc64le", "7Server-7.4.E4S:dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.E4S:dnsmasq-utils-0:2.76-2.el7_4.3.ppc64le", "7Server-7.4.E4S:dnsmasq-utils-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.TUS:dnsmasq-0:2.76-2.el7_4.3.src", "7Server-7.4.TUS:dnsmasq-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.TUS:dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.TUS:dnsmasq-utils-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.AUS:dnsmasq-0:2.76-2.el7_4.3.src", "7Server-optional-7.4.AUS:dnsmasq-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.AUS:dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.AUS:dnsmasq-utils-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.E4S:dnsmasq-0:2.76-2.el7_4.3.ppc64le", "7Server-optional-7.4.E4S:dnsmasq-0:2.76-2.el7_4.3.src", "7Server-optional-7.4.E4S:dnsmasq-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.E4S:dnsmasq-debuginfo-0:2.76-2.el7_4.3.ppc64le", "7Server-optional-7.4.E4S:dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.E4S:dnsmasq-utils-0:2.76-2.el7_4.3.ppc64le", "7Server-optional-7.4.E4S:dnsmasq-utils-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.TUS:dnsmasq-0:2.76-2.el7_4.3.src", "7Server-optional-7.4.TUS:dnsmasq-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.TUS:dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.TUS:dnsmasq-utils-0:2.76-2.el7_4.3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-25686" }, { "category": "external", "summary": "RHBZ#1890125", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890125" }, { "category": "external", "summary": "RHSB-2021-001", "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-001" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-25686", "url": "https://www.cve.org/CVERecord?id=CVE-2020-25686" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25686", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25686" }, { "category": "external", "summary": "https://www.jsof-tech.com/disclosures/dnspooq/", "url": "https://www.jsof-tech.com/disclosures/dnspooq/" } ], "release_date": "2021-01-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-01-19T13:40:12+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-7.4.AUS:dnsmasq-0:2.76-2.el7_4.3.src", "7Server-7.4.AUS:dnsmasq-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.AUS:dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.AUS:dnsmasq-utils-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.E4S:dnsmasq-0:2.76-2.el7_4.3.ppc64le", "7Server-7.4.E4S:dnsmasq-0:2.76-2.el7_4.3.src", "7Server-7.4.E4S:dnsmasq-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.E4S:dnsmasq-debuginfo-0:2.76-2.el7_4.3.ppc64le", "7Server-7.4.E4S:dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.E4S:dnsmasq-utils-0:2.76-2.el7_4.3.ppc64le", "7Server-7.4.E4S:dnsmasq-utils-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.TUS:dnsmasq-0:2.76-2.el7_4.3.src", "7Server-7.4.TUS:dnsmasq-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.TUS:dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.TUS:dnsmasq-utils-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.AUS:dnsmasq-0:2.76-2.el7_4.3.src", "7Server-optional-7.4.AUS:dnsmasq-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.AUS:dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.AUS:dnsmasq-utils-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.E4S:dnsmasq-0:2.76-2.el7_4.3.ppc64le", "7Server-optional-7.4.E4S:dnsmasq-0:2.76-2.el7_4.3.src", "7Server-optional-7.4.E4S:dnsmasq-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.E4S:dnsmasq-debuginfo-0:2.76-2.el7_4.3.ppc64le", "7Server-optional-7.4.E4S:dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.E4S:dnsmasq-utils-0:2.76-2.el7_4.3.ppc64le", "7Server-optional-7.4.E4S:dnsmasq-utils-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.TUS:dnsmasq-0:2.76-2.el7_4.3.src", "7Server-optional-7.4.TUS:dnsmasq-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.TUS:dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.TUS:dnsmasq-utils-0:2.76-2.el7_4.3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0156" }, { "category": "workaround", "details": "The impact of this flaw can be reduced by disabling the dnsmasq cache by adding `--cache-size=0` when calling dnsmasq or by adding a line with `cache-size=0` to the dnsmasq configuration file (/etc/dnsmasq.conf by default). \n\nWhen using Red Hat Enterprise Linux 8.3 with libvirt through a virt:rhel module, use `virsh net-edit \u003cnetwork-name\u003e` and reference https://libvirt.org/formatnetwork.html#elementsNamespaces to add the suggested option `cache-size=0`. \n\nThere is no way to customize the dnsmasq configuration generated by libvirt, when using versions of Red Hat Enterprise Linux prior to version 8.3. If dnsmasq is being run through NetworkManager, create a new file in /etc/NetworkManager/dnsmasq.d/ and add `cache-size=0` to it.\n\nIn all cases, by disabling the cache, you may experience a performance loss in your environment due to all DNS queries being forwarded to the upstream servers. Please evaluate if the mitigation is appropriate for the system\u2019s environment before applying.", "product_ids": [ "7Server-7.4.AUS:dnsmasq-0:2.76-2.el7_4.3.src", "7Server-7.4.AUS:dnsmasq-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.AUS:dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.AUS:dnsmasq-utils-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.E4S:dnsmasq-0:2.76-2.el7_4.3.ppc64le", "7Server-7.4.E4S:dnsmasq-0:2.76-2.el7_4.3.src", "7Server-7.4.E4S:dnsmasq-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.E4S:dnsmasq-debuginfo-0:2.76-2.el7_4.3.ppc64le", "7Server-7.4.E4S:dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.E4S:dnsmasq-utils-0:2.76-2.el7_4.3.ppc64le", "7Server-7.4.E4S:dnsmasq-utils-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.TUS:dnsmasq-0:2.76-2.el7_4.3.src", "7Server-7.4.TUS:dnsmasq-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.TUS:dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.TUS:dnsmasq-utils-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.AUS:dnsmasq-0:2.76-2.el7_4.3.src", "7Server-optional-7.4.AUS:dnsmasq-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.AUS:dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.AUS:dnsmasq-utils-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.E4S:dnsmasq-0:2.76-2.el7_4.3.ppc64le", "7Server-optional-7.4.E4S:dnsmasq-0:2.76-2.el7_4.3.src", "7Server-optional-7.4.E4S:dnsmasq-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.E4S:dnsmasq-debuginfo-0:2.76-2.el7_4.3.ppc64le", "7Server-optional-7.4.E4S:dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.E4S:dnsmasq-utils-0:2.76-2.el7_4.3.ppc64le", "7Server-optional-7.4.E4S:dnsmasq-utils-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.TUS:dnsmasq-0:2.76-2.el7_4.3.src", "7Server-optional-7.4.TUS:dnsmasq-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.TUS:dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.TUS:dnsmasq-utils-0:2.76-2.el7_4.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N", "version": "3.1" }, "products": [ "7Server-7.4.AUS:dnsmasq-0:2.76-2.el7_4.3.src", "7Server-7.4.AUS:dnsmasq-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.AUS:dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.AUS:dnsmasq-utils-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.E4S:dnsmasq-0:2.76-2.el7_4.3.ppc64le", "7Server-7.4.E4S:dnsmasq-0:2.76-2.el7_4.3.src", "7Server-7.4.E4S:dnsmasq-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.E4S:dnsmasq-debuginfo-0:2.76-2.el7_4.3.ppc64le", "7Server-7.4.E4S:dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.E4S:dnsmasq-utils-0:2.76-2.el7_4.3.ppc64le", "7Server-7.4.E4S:dnsmasq-utils-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.TUS:dnsmasq-0:2.76-2.el7_4.3.src", "7Server-7.4.TUS:dnsmasq-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.TUS:dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.TUS:dnsmasq-utils-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.AUS:dnsmasq-0:2.76-2.el7_4.3.src", "7Server-optional-7.4.AUS:dnsmasq-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.AUS:dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.AUS:dnsmasq-utils-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.E4S:dnsmasq-0:2.76-2.el7_4.3.ppc64le", "7Server-optional-7.4.E4S:dnsmasq-0:2.76-2.el7_4.3.src", "7Server-optional-7.4.E4S:dnsmasq-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.E4S:dnsmasq-debuginfo-0:2.76-2.el7_4.3.ppc64le", "7Server-optional-7.4.E4S:dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.E4S:dnsmasq-utils-0:2.76-2.el7_4.3.ppc64le", "7Server-optional-7.4.E4S:dnsmasq-utils-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.TUS:dnsmasq-0:2.76-2.el7_4.3.src", "7Server-optional-7.4.TUS:dnsmasq-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.TUS:dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.TUS:dnsmasq-utils-0:2.76-2.el7_4.3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "dnsmasq: multiple queries forwarded for the same name makes forging replies easier for an off-path attacker" } ] }
rhsa-2021_0152
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for dnsmasq is now available for Red Hat Enterprise Linux 8.1 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The dnsmasq packages contain Dnsmasq, a lightweight DNS (Domain Name Server) forwarder and DHCP (Dynamic Host Configuration Protocol) server.\n\nSecurity Fix(es):\n\n* dnsmasq: heap-based buffer overflow in sort_rrset() when DNSSEC is enabled (CVE-2020-25681)\n\n* dnsmasq: buffer overflow in extract_name() due to missing length check when DNSSEC is enabled (CVE-2020-25682)\n\n* dnsmasq: heap-based buffer overflow with large memcpy in get_rdata() when DNSSEC is enabled (CVE-2020-25683)\n\n* dnsmasq: loose address/port check in reply_query() makes forging replies easier for an off-path attacker (CVE-2020-25684)\n\n* dnsmasq: loose query name check in reply_query() makes forging replies easier for an off-path attacker (CVE-2020-25685)\n\n* dnsmasq: multiple queries forwarded for the same name makes forging replies easier for an off-path attacker (CVE-2020-25686)\n\n* dnsmasq: heap-based buffer overflow with large memcpy in sort_rrset() when DNSSEC is enabled (CVE-2020-25687)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:0152", "url": "https://access.redhat.com/errata/RHSA-2021:0152" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-001", "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-001" }, { "category": "external", "summary": "1881875", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1881875" }, { "category": "external", "summary": "1882014", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1882014" }, { "category": "external", "summary": "1882018", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1882018" }, { "category": "external", "summary": "1889686", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889686" }, { "category": "external", "summary": "1889688", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889688" }, { "category": "external", "summary": "1890125", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890125" }, { "category": "external", "summary": "1891568", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1891568" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_0152.json" } ], "title": "Red Hat Security Advisory: dnsmasq security update", "tracking": { "current_release_date": "2024-11-15T07:27:49+00:00", "generator": { "date": "2024-11-15T07:27:49+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2021:0152", "initial_release_date": "2021-01-19T13:11:33+00:00", "revision_history": [ { "date": "2021-01-19T13:11:33+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-01-19T13:11:33+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-15T07:27:49+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product": { "name": "Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_eus:8.1::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "dnsmasq-0:2.79-6.el8_1.1.src", "product": { "name": "dnsmasq-0:2.79-6.el8_1.1.src", "product_id": "dnsmasq-0:2.79-6.el8_1.1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq@2.79-6.el8_1.1?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "dnsmasq-0:2.79-6.el8_1.1.aarch64", "product": { "name": "dnsmasq-0:2.79-6.el8_1.1.aarch64", "product_id": "dnsmasq-0:2.79-6.el8_1.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq@2.79-6.el8_1.1?arch=aarch64" } } }, { "category": "product_version", "name": "dnsmasq-utils-0:2.79-6.el8_1.1.aarch64", "product": { "name": "dnsmasq-utils-0:2.79-6.el8_1.1.aarch64", "product_id": "dnsmasq-utils-0:2.79-6.el8_1.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-utils@2.79-6.el8_1.1?arch=aarch64" } } }, { "category": "product_version", "name": "dnsmasq-debugsource-0:2.79-6.el8_1.1.aarch64", "product": { "name": "dnsmasq-debugsource-0:2.79-6.el8_1.1.aarch64", "product_id": "dnsmasq-debugsource-0:2.79-6.el8_1.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-debugsource@2.79-6.el8_1.1?arch=aarch64" } } }, { "category": "product_version", "name": "dnsmasq-debuginfo-0:2.79-6.el8_1.1.aarch64", "product": { "name": "dnsmasq-debuginfo-0:2.79-6.el8_1.1.aarch64", "product_id": "dnsmasq-debuginfo-0:2.79-6.el8_1.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-debuginfo@2.79-6.el8_1.1?arch=aarch64" } } }, { "category": "product_version", "name": "dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.aarch64", "product": { "name": "dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.aarch64", "product_id": "dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-utils-debuginfo@2.79-6.el8_1.1?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "dnsmasq-0:2.79-6.el8_1.1.ppc64le", "product": { "name": "dnsmasq-0:2.79-6.el8_1.1.ppc64le", "product_id": "dnsmasq-0:2.79-6.el8_1.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq@2.79-6.el8_1.1?arch=ppc64le" } } }, { "category": "product_version", "name": "dnsmasq-utils-0:2.79-6.el8_1.1.ppc64le", "product": { "name": "dnsmasq-utils-0:2.79-6.el8_1.1.ppc64le", "product_id": "dnsmasq-utils-0:2.79-6.el8_1.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-utils@2.79-6.el8_1.1?arch=ppc64le" } } }, { "category": "product_version", "name": "dnsmasq-debugsource-0:2.79-6.el8_1.1.ppc64le", "product": { "name": "dnsmasq-debugsource-0:2.79-6.el8_1.1.ppc64le", "product_id": "dnsmasq-debugsource-0:2.79-6.el8_1.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-debugsource@2.79-6.el8_1.1?arch=ppc64le" } } }, { "category": "product_version", "name": "dnsmasq-debuginfo-0:2.79-6.el8_1.1.ppc64le", "product": { "name": "dnsmasq-debuginfo-0:2.79-6.el8_1.1.ppc64le", "product_id": "dnsmasq-debuginfo-0:2.79-6.el8_1.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-debuginfo@2.79-6.el8_1.1?arch=ppc64le" } } }, { "category": "product_version", "name": "dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.ppc64le", "product": { "name": "dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.ppc64le", "product_id": "dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-utils-debuginfo@2.79-6.el8_1.1?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "dnsmasq-0:2.79-6.el8_1.1.x86_64", "product": { "name": "dnsmasq-0:2.79-6.el8_1.1.x86_64", "product_id": "dnsmasq-0:2.79-6.el8_1.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq@2.79-6.el8_1.1?arch=x86_64" } } }, { "category": "product_version", "name": "dnsmasq-utils-0:2.79-6.el8_1.1.x86_64", "product": { "name": "dnsmasq-utils-0:2.79-6.el8_1.1.x86_64", "product_id": "dnsmasq-utils-0:2.79-6.el8_1.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-utils@2.79-6.el8_1.1?arch=x86_64" } } }, { "category": "product_version", "name": "dnsmasq-debugsource-0:2.79-6.el8_1.1.x86_64", "product": { "name": "dnsmasq-debugsource-0:2.79-6.el8_1.1.x86_64", "product_id": "dnsmasq-debugsource-0:2.79-6.el8_1.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-debugsource@2.79-6.el8_1.1?arch=x86_64" } } }, { "category": "product_version", "name": "dnsmasq-debuginfo-0:2.79-6.el8_1.1.x86_64", "product": { "name": "dnsmasq-debuginfo-0:2.79-6.el8_1.1.x86_64", "product_id": "dnsmasq-debuginfo-0:2.79-6.el8_1.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-debuginfo@2.79-6.el8_1.1?arch=x86_64" } } }, { "category": "product_version", "name": "dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.x86_64", "product": { "name": "dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.x86_64", "product_id": "dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-utils-debuginfo@2.79-6.el8_1.1?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "dnsmasq-0:2.79-6.el8_1.1.s390x", "product": { "name": "dnsmasq-0:2.79-6.el8_1.1.s390x", "product_id": "dnsmasq-0:2.79-6.el8_1.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq@2.79-6.el8_1.1?arch=s390x" } } }, { "category": "product_version", "name": "dnsmasq-utils-0:2.79-6.el8_1.1.s390x", "product": { "name": "dnsmasq-utils-0:2.79-6.el8_1.1.s390x", "product_id": "dnsmasq-utils-0:2.79-6.el8_1.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-utils@2.79-6.el8_1.1?arch=s390x" } } }, { "category": "product_version", "name": "dnsmasq-debugsource-0:2.79-6.el8_1.1.s390x", "product": { "name": "dnsmasq-debugsource-0:2.79-6.el8_1.1.s390x", "product_id": "dnsmasq-debugsource-0:2.79-6.el8_1.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-debugsource@2.79-6.el8_1.1?arch=s390x" } } }, { "category": "product_version", "name": "dnsmasq-debuginfo-0:2.79-6.el8_1.1.s390x", "product": { "name": "dnsmasq-debuginfo-0:2.79-6.el8_1.1.s390x", "product_id": "dnsmasq-debuginfo-0:2.79-6.el8_1.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-debuginfo@2.79-6.el8_1.1?arch=s390x" } } }, { "category": "product_version", "name": "dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.s390x", "product": { "name": "dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.s390x", "product_id": "dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-utils-debuginfo@2.79-6.el8_1.1?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.79-6.el8_1.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.aarch64" }, "product_reference": "dnsmasq-0:2.79-6.el8_1.1.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.79-6.el8_1.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.ppc64le" }, "product_reference": "dnsmasq-0:2.79-6.el8_1.1.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.79-6.el8_1.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.s390x" }, "product_reference": "dnsmasq-0:2.79-6.el8_1.1.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.79-6.el8_1.1.src as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.src" }, "product_reference": "dnsmasq-0:2.79-6.el8_1.1.src", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.79-6.el8_1.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.x86_64" }, "product_reference": "dnsmasq-0:2.79-6.el8_1.1.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.79-6.el8_1.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.aarch64" }, "product_reference": "dnsmasq-debuginfo-0:2.79-6.el8_1.1.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.79-6.el8_1.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.ppc64le" }, "product_reference": "dnsmasq-debuginfo-0:2.79-6.el8_1.1.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.79-6.el8_1.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.s390x" }, "product_reference": "dnsmasq-debuginfo-0:2.79-6.el8_1.1.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.79-6.el8_1.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.x86_64" }, "product_reference": "dnsmasq-debuginfo-0:2.79-6.el8_1.1.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debugsource-0:2.79-6.el8_1.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.aarch64" }, "product_reference": "dnsmasq-debugsource-0:2.79-6.el8_1.1.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debugsource-0:2.79-6.el8_1.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.ppc64le" }, "product_reference": "dnsmasq-debugsource-0:2.79-6.el8_1.1.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debugsource-0:2.79-6.el8_1.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.s390x" }, "product_reference": "dnsmasq-debugsource-0:2.79-6.el8_1.1.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debugsource-0:2.79-6.el8_1.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.x86_64" }, "product_reference": "dnsmasq-debugsource-0:2.79-6.el8_1.1.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.79-6.el8_1.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.aarch64" }, "product_reference": "dnsmasq-utils-0:2.79-6.el8_1.1.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.79-6.el8_1.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.ppc64le" }, "product_reference": "dnsmasq-utils-0:2.79-6.el8_1.1.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.79-6.el8_1.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.s390x" }, "product_reference": "dnsmasq-utils-0:2.79-6.el8_1.1.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.79-6.el8_1.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.x86_64" }, "product_reference": "dnsmasq-utils-0:2.79-6.el8_1.1.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.aarch64" }, "product_reference": "dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.ppc64le" }, "product_reference": "dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.s390x" }, "product_reference": "dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.x86_64" }, "product_reference": "dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Moshe Kol", "Shlomi Oberman" ], "organization": "JSOF" } ], "cve": "CVE-2020-25681", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2020-09-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1881875" } ], "notes": [ { "category": "description", "text": "A flaw was found in dnsmasq. A heap-based buffer overflow was discovered in the way RRSets are sorted before validating with DNSSEC data. An attacker on the network, who can forge DNS replies such as that they are accepted as valid, could use this flaw to cause a buffer overflow with arbitrary data in a heap memory segment, possibly executing code on the machine. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "dnsmasq: heap-based buffer overflow in sort_rrset() when DNSSEC is enabled", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the versions of dnsmasq as shipped with Red Hat Enterprise Linux 5, 6, and 7 as they are not compiled with DNSSEC support.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.src", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-25681" }, { "category": "external", "summary": "RHBZ#1881875", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1881875" }, { "category": "external", "summary": "RHSB-2021-001", "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-001" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-25681", "url": "https://www.cve.org/CVERecord?id=CVE-2020-25681" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25681", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25681" }, { "category": "external", "summary": "https://www.jsof-tech.com/disclosures/dnspooq/", "url": "https://www.jsof-tech.com/disclosures/dnspooq/" } ], "release_date": "2021-01-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-01-19T13:11:33+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.src", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0152" }, { "category": "workaround", "details": "The only known way to mitigate this flaw is to disable DNSSEC altogether, by removing the `--dnssec` command line option or the `dnssec` option from dnsmasq configuration file.", "product_ids": [ "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.src", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.src", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "dnsmasq: heap-based buffer overflow in sort_rrset() when DNSSEC is enabled" }, { "acknowledgments": [ { "names": [ "Moshe Kol", "Shlomi Oberman" ], "organization": "JSOF" } ], "cve": "CVE-2020-25682", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2020-09-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1882014" } ], "notes": [ { "category": "description", "text": "A flaw was found in dnsmasq. A buffer overflow vulnerability was discovered in the way dnsmasq extract names from DNS packets before validating them with DNSSEC data. An attacker on the network, who can create valid DNS replies, could use this flaw to cause an overflow with arbitrary data in a heap-allocated memory, possibly executing code on the machine. The flaw is in the rfc1035.c:extract_name() function, which writes data to the memory pointed by name assuming MAXDNAME*2 bytes are available in the buffer. However, in some code execution paths, it is possible extract_name() gets passed an offset from the base buffer, thus reducing, in practice, the number of available bytes that can be written in the buffer. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "dnsmasq: buffer overflow in extract_name() due to missing length check when DNSSEC is enabled", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the versions of dnsmasq as shipped with Red Hat Enterprise Linux 5, 6, and 7 as they are not compiled with DNSSEC support.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.src", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-25682" }, { "category": "external", "summary": "RHBZ#1882014", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1882014" }, { "category": "external", "summary": "RHSB-2021-001", "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-001" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-25682", "url": "https://www.cve.org/CVERecord?id=CVE-2020-25682" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25682", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25682" }, { "category": "external", "summary": "https://www.jsof-tech.com/disclosures/dnspooq/", "url": "https://www.jsof-tech.com/disclosures/dnspooq/" } ], "release_date": "2021-01-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-01-19T13:11:33+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.src", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0152" }, { "category": "workaround", "details": "The only known way to mitigate this flaw is to disable DNSSEC altogether, by removing the `--dnssec` command line option or the `dnssec` option from dnsmasq configuration file.", "product_ids": [ "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.src", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.src", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "dnsmasq: buffer overflow in extract_name() due to missing length check when DNSSEC is enabled" }, { "acknowledgments": [ { "names": [ "Moshe Kol", "Shlomi Oberman" ], "organization": "JSOF" } ], "cve": "CVE-2020-25683", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2020-09-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1882018" } ], "notes": [ { "category": "description", "text": "A flaw was found in dnsmasq. A heap-based buffer overflow was discovered in dnsmasq when DNSSEC is enabled and before it validates the received DNS entries. A remote attacker, who can create valid DNS replies, could use this flaw to cause an overflow in a heap-allocated memory. This flaw is caused by the lack of length checks in rfc1035.c:extract_name(), which could be abused to make the code execute memcpy() with a negative size in get_rdata() and cause a crash in dnsmasq, resulting in a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "dnsmasq: heap-based buffer overflow with large memcpy in get_rdata() when DNSSEC is enabled", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the versions of dnsmasq as shipped with Red Hat Enterprise Linux 5, 6, and 7 as they are not compiled with DNSSEC support.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.src", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-25683" }, { "category": "external", "summary": "RHBZ#1882018", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1882018" }, { "category": "external", "summary": "RHSB-2021-001", "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-001" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-25683", "url": "https://www.cve.org/CVERecord?id=CVE-2020-25683" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25683", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25683" }, { "category": "external", "summary": "https://www.jsof-tech.com/disclosures/dnspooq/", "url": "https://www.jsof-tech.com/disclosures/dnspooq/" } ], "release_date": "2021-01-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-01-19T13:11:33+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.src", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0152" }, { "category": "workaround", "details": "The only known way to mitigate this flaw is to disable DNSSEC altogether, by removing the `--dnssec` command line option or the `dnssec` option from dnsmasq configuration file.", "product_ids": [ "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.src", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.src", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "dnsmasq: heap-based buffer overflow with large memcpy in get_rdata() when DNSSEC is enabled" }, { "acknowledgments": [ { "names": [ "Moshe Kol", "Shlomi Oberman" ], "organization": "JSOF" } ], "cve": "CVE-2020-25684", "cwe": { "id": "CWE-358", "name": "Improperly Implemented Security Check for Standard" }, "discovery_date": "2020-09-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1889686" } ], "notes": [ { "category": "description", "text": "A flaw was found in dnsmasq. When getting a reply from a forwarded query, dnsmasq checks in the forward.c:reply_query() if the reply destination address/port is used by the pending forwarded queries. However, it does not use the address/port to retrieve the exact forwarded query, substantially reducing the number of attempts an attacker on the network would have to perform to forge a reply and get it accepted by dnsmasq. This issue contrasts with RFC5452, which specifies a query\u0027s attributes that all must be used to match a reply. This flaw allows an attacker to perform a DNS Cache Poisoning attack. If chained with CVE-2020-25685 or CVE-2020-25686, the attack complexity of a successful attack is reduced. The highest threat from this vulnerability is to data integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "dnsmasq: loose address/port check in reply_query() makes forging replies easier for an off-path attacker", "title": "Vulnerability summary" }, { "category": "other", "text": "Dnsmasq may be run by libvirt and/or NetworkManager. libvirt uses dnsmasq by default to provide DNS service to its guests. NetworkManager may be configured to use dnsmasq to provide DNS service to the system, if a line `dns=dnsmasq` is present in the `[main]` section of the configuration file /etc/NetworkManager/NetworkManager.conf.\n\nIn Red Hat OpenStack Platform (RHOSP) and Red Hat Virtualization (RHV), the dnsmasq package is provided by the underlying Red Hat Enterprise Linux (RHEL) product. RHOSP and RHV are therefore indirectly affected, so please ensure that the underlying RHEL dnsmasq package is updated.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.src", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-25684" }, { "category": "external", "summary": "RHBZ#1889686", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889686" }, { "category": "external", "summary": "RHSB-2021-001", "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-001" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-25684", "url": "https://www.cve.org/CVERecord?id=CVE-2020-25684" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25684", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25684" }, { "category": "external", "summary": "https://www.jsof-tech.com/disclosures/dnspooq/", "url": "https://www.jsof-tech.com/disclosures/dnspooq/" } ], "release_date": "2021-01-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-01-19T13:11:33+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.src", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0152" }, { "category": "workaround", "details": "The impact of this flaw can be reduced by disabling the dnsmasq cache by adding `--cache-size=0` when calling dnsmasq or by adding a line with `cache-size=0` to the dnsmasq configuration file (/etc/dnsmasq.conf by default).\n\nWhen using Red Hat Enterprise Linux 8.3 with libvirt through a virt:rhel module, use `virsh net-edit \u003cnetwork-name\u003e` and reference https://libvirt.org/formatnetwork.html#elementsNamespaces to add the suggested option `cache-size=0`. \n\nThere is no way to customize the dnsmasq configuration generated by libvirt, when using versions of Red Hat Enterprise Linux prior to version 8.3. If dnsmasq is being run through NetworkManager, create a new file in /etc/NetworkManager/dnsmasq.d/ and add `cache-size=0` to it.\n\nIn all cases, by disabling the cache, you may experience a performance loss in your environment due to all DNS queries being forwarded to the upstream servers. Please evaluate if the mitigation is appropriate for the system\u2019s environment before applying.", "product_ids": [ "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.src", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N", "version": "3.1" }, "products": [ "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.src", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "dnsmasq: loose address/port check in reply_query() makes forging replies easier for an off-path attacker" }, { "acknowledgments": [ { "names": [ "Moshe Kol", "Shlomi Oberman" ], "organization": "JSOF" } ], "cve": "CVE-2020-25685", "cwe": { "id": "CWE-326", "name": "Inadequate Encryption Strength" }, "discovery_date": "2020-09-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1889688" } ], "notes": [ { "category": "description", "text": "A flaw was found in dnsmasq. When getting a reply from a forwarded query, dnsmasq checks in forward.c:reply_query(), which is the forwarded query that matches the reply, by only using a weak hash of the query name. Due to the weak hash (CRC32 when dnsmasq is compiled without DNSSEC, SHA-1 when it is) this flaw allows an off-path attacker to find several different domains all having the same hash, substantially reducing the number of attempts they would have to perform to forge a reply and get it accepted by dnsmasq. This is in contrast with RFC5452, which specifies that the query name is one of the attributes of a query that must be used to match a reply. This flaw could be abused to perform a DNS Cache Poisoning attack. If chained with CVE-2020-25684 the attack complexity of a successful attack is reduced. The highest threat from this vulnerability is to data integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "dnsmasq: loose query name check in reply_query() makes forging replies easier for an off-path attacker", "title": "Vulnerability summary" }, { "category": "other", "text": "Dnsmasq may be run by libvirt and/or NetworkManager. libvirt uses dnsmasq by default to provide DNS service to its guests. NetworkManager may be configured to use dnsmasq to provide DNS service to the system, if a line `dns=dnsmasq` is present in the `[main]` section of the configuration file /etc/NetworkManager/NetworkManager.conf.\n\nIn Red Hat OpenStack Platform (RHOSP) and Red Hat Virtualization (RHV), the dnsmasq package is provided by the underlying Red Hat Enterprise Linux (RHEL) product. RHOSP and RHV are therefore indirectly affected, so please ensure that the underlying RHEL dnsmasq package is updated.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.src", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-25685" }, { "category": "external", "summary": "RHBZ#1889688", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889688" }, { "category": "external", "summary": "RHSB-2021-001", "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-001" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-25685", "url": "https://www.cve.org/CVERecord?id=CVE-2020-25685" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25685", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25685" }, { "category": "external", "summary": "https://www.jsof-tech.com/disclosures/dnspooq/", "url": "https://www.jsof-tech.com/disclosures/dnspooq/" } ], "release_date": "2021-01-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-01-19T13:11:33+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.src", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0152" }, { "category": "workaround", "details": "The impact of this flaw can be reduced by disabling the dnsmasq cache by adding `--cache-size=0` when calling dnsmasq or by adding a line with `cache-size=0` to the dnsmasq configuration file (/etc/dnsmasq.conf by default). \n\nWhen using Red Hat Enterprise Linux 8.3 with libvirt through a virt:rhel module, use `virsh net-edit \u003cnetwork-name\u003e` and reference https://libvirt.org/formatnetwork.html#elementsNamespaces to add the suggested option `cache-size=0`. \n\nThere is no way to customize the dnsmasq configuration generated by libvirt, when using versions of Red Hat Enterprise Linux prior to version 8.3. If dnsmasq is being run through NetworkManager, create a new file in /etc/NetworkManager/dnsmasq.d/ and add `cache-size=0` to it.\n\nIn all cases, by disabling the cache, you may experience a performance loss in your environment due to all DNS queries being forwarded to the upstream servers. Please evaluate if the mitigation is appropriate for the system\u2019s environment before applying.", "product_ids": [ "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.src", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N", "version": "3.1" }, "products": [ "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.src", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "dnsmasq: loose query name check in reply_query() makes forging replies easier for an off-path attacker" }, { "acknowledgments": [ { "names": [ "Moshe Kol", "Shlomi Oberman" ], "organization": "JSOF" } ], "cve": "CVE-2020-25686", "cwe": { "id": "CWE-290", "name": "Authentication Bypass by Spoofing" }, "discovery_date": "2020-09-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1890125" } ], "notes": [ { "category": "description", "text": "A flaw was found in dnsmasq. When receiving a query, dnsmasq does not check for an existing pending request for the same name and forwards a new request. By default, a maximum of 150 pending queries can be sent to upstream servers, so there can be at most 150 queries for the same name. This flaw allows an off-path attacker on the network to substantially reduce the number of attempts that it would have to perform to forge a reply and have it accepted by dnsmasq. This issue is mentioned in the \"Birthday Attacks\" section of RFC5452. If chained with CVE-2020-25684, the attack complexity of a successful attack is reduced. The highest threat from this vulnerability is to data integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "dnsmasq: multiple queries forwarded for the same name makes forging replies easier for an off-path attacker", "title": "Vulnerability summary" }, { "category": "other", "text": "Dnsmasq may be run by libvirt and/or NetworkManager. libvirt uses dnsmasq by default to provide DNS service to its guests. NetworkManager may be configured to use dnsmasq to provide DNS service to the system, if a line `dns=dnsmasq` is present in the `[main]` section of the configuration file /etc/NetworkManager/NetworkManager.conf.\n\nIn Red Hat OpenStack Platform (RHOSP) and Red Hat Virtualization (RHV), the dnsmasq package is provided by the underlying Red Hat Enterprise Linux (RHEL) product. RHOSP and RHV are therefore indirectly affected, so please ensure that the underlying RHEL dnsmasq package is updated.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.src", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-25686" }, { "category": "external", "summary": "RHBZ#1890125", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890125" }, { "category": "external", "summary": "RHSB-2021-001", "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-001" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-25686", "url": "https://www.cve.org/CVERecord?id=CVE-2020-25686" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25686", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25686" }, { "category": "external", "summary": "https://www.jsof-tech.com/disclosures/dnspooq/", "url": "https://www.jsof-tech.com/disclosures/dnspooq/" } ], "release_date": "2021-01-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-01-19T13:11:33+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.src", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0152" }, { "category": "workaround", "details": "The impact of this flaw can be reduced by disabling the dnsmasq cache by adding `--cache-size=0` when calling dnsmasq or by adding a line with `cache-size=0` to the dnsmasq configuration file (/etc/dnsmasq.conf by default). \n\nWhen using Red Hat Enterprise Linux 8.3 with libvirt through a virt:rhel module, use `virsh net-edit \u003cnetwork-name\u003e` and reference https://libvirt.org/formatnetwork.html#elementsNamespaces to add the suggested option `cache-size=0`. \n\nThere is no way to customize the dnsmasq configuration generated by libvirt, when using versions of Red Hat Enterprise Linux prior to version 8.3. If dnsmasq is being run through NetworkManager, create a new file in /etc/NetworkManager/dnsmasq.d/ and add `cache-size=0` to it.\n\nIn all cases, by disabling the cache, you may experience a performance loss in your environment due to all DNS queries being forwarded to the upstream servers. Please evaluate if the mitigation is appropriate for the system\u2019s environment before applying.", "product_ids": [ "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.src", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N", "version": "3.1" }, "products": [ "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.src", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "dnsmasq: multiple queries forwarded for the same name makes forging replies easier for an off-path attacker" }, { "acknowledgments": [ { "names": [ "Moshe Kol", "Shlomi Oberman" ], "organization": "JSOF" } ], "cve": "CVE-2020-25687", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2020-09-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1891568" } ], "notes": [ { "category": "description", "text": "A flaw was found in dnsmasq. A heap-based buffer overflow was discovered in dnsmasq when DNSSEC is enabled and before it validates the received DNS entries. This flaw allows a remote attacker, who can create valid DNS replies, to cause an overflow in a heap-allocated memory. This flaw is caused by the lack of length checks in rfc1035.c:extract_name(), which could be abused to make the code execute memcpy() with a negative size in sort_rrset() and cause a crash in dnsmasq, resulting in a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "dnsmasq: heap-based buffer overflow with large memcpy in sort_rrset() when DNSSEC is enabled", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the versions of dnsmasq as shipped with Red Hat Enterprise Linux 5, 6, and 7 as they are not compiled with DNSSEC support.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.src", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-25687" }, { "category": "external", "summary": "RHBZ#1891568", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1891568" }, { "category": "external", "summary": "RHSB-2021-001", "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-001" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-25687", "url": "https://www.cve.org/CVERecord?id=CVE-2020-25687" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25687", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25687" }, { "category": "external", "summary": "https://www.jsof-tech.com/disclosures/dnspooq/", "url": "https://www.jsof-tech.com/disclosures/dnspooq/" } ], "release_date": "2021-01-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-01-19T13:11:33+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.src", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0152" }, { "category": "workaround", "details": "The only known way to mitigate this flaw is to disable DNSSEC altogether, by removing the `--dnssec` command line option or the `dnssec` option from dnsmasq configuration file.", "product_ids": [ "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.src", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.src", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "dnsmasq: heap-based buffer overflow with large memcpy in sort_rrset() when DNSSEC is enabled" } ] }
rhsa-2021_0153
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for dnsmasq is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The dnsmasq packages contain Dnsmasq, a lightweight DNS (Domain Name Server) forwarder and DHCP (Dynamic Host Configuration Protocol) server.\n\nSecurity Fix(es):\n\n* dnsmasq: loose address/port check in reply_query() makes forging replies easier for an off-path attacker (CVE-2020-25684)\n\n* dnsmasq: loose query name check in reply_query() makes forging replies easier for an off-path attacker (CVE-2020-25685)\n\n* dnsmasq: multiple queries forwarded for the same name makes forging replies easier for an off-path attacker (CVE-2020-25686)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:0153", "url": "https://access.redhat.com/errata/RHSA-2021:0153" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-001", "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-001" }, { "category": "external", "summary": "1889686", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889686" }, { "category": "external", "summary": "1889688", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889688" }, { "category": "external", "summary": "1890125", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890125" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_0153.json" } ], "title": "Red Hat Security Advisory: dnsmasq security update", "tracking": { "current_release_date": "2024-11-15T07:27:56+00:00", "generator": { "date": "2024-11-15T07:27:56+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2021:0153", "initial_release_date": "2021-01-19T18:02:16+00:00", "revision_history": [ { "date": "2021-01-19T18:02:16+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-01-19T18:02:16+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-15T07:27:56+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Client (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Client Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "dnsmasq-0:2.76-16.el7_9.1.src", "product": { "name": "dnsmasq-0:2.76-16.el7_9.1.src", "product_id": "dnsmasq-0:2.76-16.el7_9.1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq@2.76-16.el7_9.1?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "dnsmasq-0:2.76-16.el7_9.1.x86_64", "product": { "name": "dnsmasq-0:2.76-16.el7_9.1.x86_64", "product_id": "dnsmasq-0:2.76-16.el7_9.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq@2.76-16.el7_9.1?arch=x86_64" } } }, { "category": "product_version", "name": "dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "product": { "name": "dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "product_id": "dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-debuginfo@2.76-16.el7_9.1?arch=x86_64" } } }, { "category": "product_version", "name": "dnsmasq-utils-0:2.76-16.el7_9.1.x86_64", "product": { "name": "dnsmasq-utils-0:2.76-16.el7_9.1.x86_64", "product_id": "dnsmasq-utils-0:2.76-16.el7_9.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-utils@2.76-16.el7_9.1?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "dnsmasq-0:2.76-16.el7_9.1.ppc64le", "product": { "name": "dnsmasq-0:2.76-16.el7_9.1.ppc64le", "product_id": "dnsmasq-0:2.76-16.el7_9.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq@2.76-16.el7_9.1?arch=ppc64le" } } }, { "category": "product_version", "name": "dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "product": { "name": "dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "product_id": "dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-debuginfo@2.76-16.el7_9.1?arch=ppc64le" } } }, { "category": "product_version", "name": "dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "product": { "name": "dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "product_id": "dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-utils@2.76-16.el7_9.1?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "dnsmasq-0:2.76-16.el7_9.1.ppc64", "product": { "name": "dnsmasq-0:2.76-16.el7_9.1.ppc64", "product_id": "dnsmasq-0:2.76-16.el7_9.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq@2.76-16.el7_9.1?arch=ppc64" } } }, { "category": "product_version", "name": "dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "product": { "name": "dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "product_id": "dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-debuginfo@2.76-16.el7_9.1?arch=ppc64" } } }, { "category": "product_version", "name": "dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "product": { "name": "dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "product_id": "dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-utils@2.76-16.el7_9.1?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "dnsmasq-0:2.76-16.el7_9.1.s390x", "product": { "name": "dnsmasq-0:2.76-16.el7_9.1.s390x", "product_id": "dnsmasq-0:2.76-16.el7_9.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq@2.76-16.el7_9.1?arch=s390x" } } }, { "category": "product_version", "name": "dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "product": { "name": "dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "product_id": "dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-debuginfo@2.76-16.el7_9.1?arch=s390x" } } }, { "category": "product_version", "name": "dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "product": { "name": "dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "product_id": "dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-utils@2.76-16.el7_9.1?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-16.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64" }, "product_reference": "dnsmasq-0:2.76-16.el7_9.1.ppc64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-16.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le" }, "product_reference": "dnsmasq-0:2.76-16.el7_9.1.ppc64le", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-16.el7_9.1.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x" }, "product_reference": "dnsmasq-0:2.76-16.el7_9.1.s390x", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-16.el7_9.1.src as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src" }, "product_reference": "dnsmasq-0:2.76-16.el7_9.1.src", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-16.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64" }, "product_reference": "dnsmasq-0:2.76-16.el7_9.1.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64" }, "product_reference": "dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le" }, "product_reference": "dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x" }, "product_reference": "dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64" }, "product_reference": "dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-16.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64" }, "product_reference": "dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le" }, "product_reference": "dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-16.el7_9.1.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x" }, "product_reference": "dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-16.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64" }, "product_reference": "dnsmasq-utils-0:2.76-16.el7_9.1.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-16.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64" }, "product_reference": "dnsmasq-0:2.76-16.el7_9.1.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-16.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le" }, "product_reference": "dnsmasq-0:2.76-16.el7_9.1.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-16.el7_9.1.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x" }, "product_reference": "dnsmasq-0:2.76-16.el7_9.1.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-16.el7_9.1.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src" }, "product_reference": "dnsmasq-0:2.76-16.el7_9.1.src", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-16.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64" }, "product_reference": "dnsmasq-0:2.76-16.el7_9.1.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64" }, "product_reference": "dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le" }, "product_reference": "dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x" }, "product_reference": "dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64" }, "product_reference": "dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-16.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64" }, "product_reference": "dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le" }, "product_reference": "dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-16.el7_9.1.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x" }, "product_reference": "dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-16.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64" }, "product_reference": "dnsmasq-utils-0:2.76-16.el7_9.1.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-16.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64" }, "product_reference": "dnsmasq-0:2.76-16.el7_9.1.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-16.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le" }, "product_reference": "dnsmasq-0:2.76-16.el7_9.1.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-16.el7_9.1.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x" }, "product_reference": "dnsmasq-0:2.76-16.el7_9.1.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-16.el7_9.1.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src" }, "product_reference": "dnsmasq-0:2.76-16.el7_9.1.src", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-16.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64" }, "product_reference": "dnsmasq-0:2.76-16.el7_9.1.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64" }, "product_reference": "dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le" }, "product_reference": "dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x" }, "product_reference": "dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64" }, "product_reference": "dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-16.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64" }, "product_reference": "dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le" }, "product_reference": "dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-16.el7_9.1.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x" }, "product_reference": "dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-16.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64" }, "product_reference": "dnsmasq-utils-0:2.76-16.el7_9.1.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-16.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64" }, "product_reference": "dnsmasq-0:2.76-16.el7_9.1.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-16.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le" }, "product_reference": "dnsmasq-0:2.76-16.el7_9.1.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-16.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x" }, "product_reference": "dnsmasq-0:2.76-16.el7_9.1.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-16.el7_9.1.src as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src" }, "product_reference": "dnsmasq-0:2.76-16.el7_9.1.src", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-16.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64" }, "product_reference": "dnsmasq-0:2.76-16.el7_9.1.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64" }, "product_reference": "dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le" }, "product_reference": "dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x" }, "product_reference": "dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64" }, "product_reference": "dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-16.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64" }, "product_reference": "dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le" }, "product_reference": "dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-16.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x" }, "product_reference": "dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-16.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64" }, "product_reference": "dnsmasq-utils-0:2.76-16.el7_9.1.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-16.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64" }, "product_reference": "dnsmasq-0:2.76-16.el7_9.1.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-16.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le" }, "product_reference": "dnsmasq-0:2.76-16.el7_9.1.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-16.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x" }, "product_reference": "dnsmasq-0:2.76-16.el7_9.1.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-16.el7_9.1.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src" }, "product_reference": "dnsmasq-0:2.76-16.el7_9.1.src", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-16.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64" }, "product_reference": "dnsmasq-0:2.76-16.el7_9.1.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64" }, "product_reference": "dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le" }, "product_reference": "dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x" }, "product_reference": "dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64" }, "product_reference": "dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-16.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64" }, "product_reference": "dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le" }, "product_reference": "dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-16.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x" }, "product_reference": "dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-16.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64" }, "product_reference": "dnsmasq-utils-0:2.76-16.el7_9.1.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-16.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64" }, "product_reference": "dnsmasq-0:2.76-16.el7_9.1.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-16.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le" }, "product_reference": "dnsmasq-0:2.76-16.el7_9.1.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-16.el7_9.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x" }, "product_reference": "dnsmasq-0:2.76-16.el7_9.1.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-16.el7_9.1.src as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src" }, "product_reference": "dnsmasq-0:2.76-16.el7_9.1.src", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-16.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64" }, "product_reference": "dnsmasq-0:2.76-16.el7_9.1.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64" }, "product_reference": "dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le" }, "product_reference": "dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x" }, "product_reference": "dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64" }, "product_reference": "dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-16.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64" }, "product_reference": "dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le" }, "product_reference": "dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-16.el7_9.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x" }, "product_reference": "dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-16.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64" }, "product_reference": "dnsmasq-utils-0:2.76-16.el7_9.1.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-16.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64" }, "product_reference": "dnsmasq-0:2.76-16.el7_9.1.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-16.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le" }, "product_reference": "dnsmasq-0:2.76-16.el7_9.1.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-16.el7_9.1.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x" }, "product_reference": "dnsmasq-0:2.76-16.el7_9.1.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-16.el7_9.1.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src" }, "product_reference": "dnsmasq-0:2.76-16.el7_9.1.src", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-16.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64" }, "product_reference": "dnsmasq-0:2.76-16.el7_9.1.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64" }, "product_reference": "dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le" }, "product_reference": "dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x" }, "product_reference": "dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64" }, "product_reference": "dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-16.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64" }, "product_reference": "dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le" }, "product_reference": "dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-16.el7_9.1.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x" }, "product_reference": "dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-16.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64" }, "product_reference": "dnsmasq-utils-0:2.76-16.el7_9.1.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Moshe Kol", "Shlomi Oberman" ], "organization": "JSOF" } ], "cve": "CVE-2020-25684", "cwe": { "id": "CWE-358", "name": "Improperly Implemented Security Check for Standard" }, "discovery_date": "2020-09-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1889686" } ], "notes": [ { "category": "description", "text": "A flaw was found in dnsmasq. When getting a reply from a forwarded query, dnsmasq checks in the forward.c:reply_query() if the reply destination address/port is used by the pending forwarded queries. However, it does not use the address/port to retrieve the exact forwarded query, substantially reducing the number of attempts an attacker on the network would have to perform to forge a reply and get it accepted by dnsmasq. This issue contrasts with RFC5452, which specifies a query\u0027s attributes that all must be used to match a reply. This flaw allows an attacker to perform a DNS Cache Poisoning attack. If chained with CVE-2020-25685 or CVE-2020-25686, the attack complexity of a successful attack is reduced. The highest threat from this vulnerability is to data integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "dnsmasq: loose address/port check in reply_query() makes forging replies easier for an off-path attacker", "title": "Vulnerability summary" }, { "category": "other", "text": "Dnsmasq may be run by libvirt and/or NetworkManager. libvirt uses dnsmasq by default to provide DNS service to its guests. NetworkManager may be configured to use dnsmasq to provide DNS service to the system, if a line `dns=dnsmasq` is present in the `[main]` section of the configuration file /etc/NetworkManager/NetworkManager.conf.\n\nIn Red Hat OpenStack Platform (RHOSP) and Red Hat Virtualization (RHV), the dnsmasq package is provided by the underlying Red Hat Enterprise Linux (RHEL) product. RHOSP and RHV are therefore indirectly affected, so please ensure that the underlying RHEL dnsmasq package is updated.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7Client-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7Client-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7Client-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7Client-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7Client-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7Client-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7Client-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7Client-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7Client-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7Client-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7Client-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7Client-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64", "7Client-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7Client-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7Client-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7Client-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7Client-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7Client-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7Client-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7Client-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7Client-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7Client-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7Client-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7Client-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7Client-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64", "7ComputeNode-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7ComputeNode-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7ComputeNode-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7ComputeNode-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7ComputeNode-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7ComputeNode-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7ComputeNode-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7ComputeNode-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7ComputeNode-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7ComputeNode-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7ComputeNode-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7ComputeNode-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7ComputeNode-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64", "7Server-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7Server-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7Server-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7Server-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7Server-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7Server-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7Server-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7Server-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7Server-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7Server-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7Server-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7Server-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7Server-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64", "7Server-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7Server-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7Server-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7Server-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7Server-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7Server-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7Server-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7Server-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7Server-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7Server-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7Server-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7Server-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7Server-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64", "7Workstation-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7Workstation-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7Workstation-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7Workstation-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7Workstation-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7Workstation-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7Workstation-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7Workstation-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7Workstation-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7Workstation-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7Workstation-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7Workstation-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7Workstation-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64", "7Workstation-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7Workstation-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7Workstation-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7Workstation-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7Workstation-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7Workstation-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7Workstation-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7Workstation-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7Workstation-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7Workstation-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7Workstation-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7Workstation-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7Workstation-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-25684" }, { "category": "external", "summary": "RHBZ#1889686", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889686" }, { "category": "external", "summary": "RHSB-2021-001", "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-001" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-25684", "url": "https://www.cve.org/CVERecord?id=CVE-2020-25684" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25684", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25684" }, { "category": "external", "summary": "https://www.jsof-tech.com/disclosures/dnspooq/", "url": "https://www.jsof-tech.com/disclosures/dnspooq/" } ], "release_date": "2021-01-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-01-19T18:02:16+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Client-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7Client-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7Client-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7Client-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7Client-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7Client-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7Client-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7Client-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7Client-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7Client-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7Client-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7Client-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7Client-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64", "7Client-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7Client-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7Client-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7Client-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7Client-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7Client-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7Client-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7Client-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7Client-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7Client-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7Client-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7Client-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7Client-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64", "7ComputeNode-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7ComputeNode-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7ComputeNode-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7ComputeNode-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7ComputeNode-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7ComputeNode-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7ComputeNode-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7ComputeNode-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7ComputeNode-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7ComputeNode-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7ComputeNode-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7ComputeNode-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7ComputeNode-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64", "7Server-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7Server-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7Server-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7Server-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7Server-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7Server-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7Server-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7Server-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7Server-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7Server-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7Server-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7Server-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7Server-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64", "7Server-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7Server-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7Server-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7Server-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7Server-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7Server-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7Server-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7Server-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7Server-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7Server-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7Server-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7Server-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7Server-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64", "7Workstation-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7Workstation-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7Workstation-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7Workstation-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7Workstation-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7Workstation-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7Workstation-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7Workstation-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7Workstation-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7Workstation-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7Workstation-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7Workstation-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7Workstation-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64", "7Workstation-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7Workstation-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7Workstation-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7Workstation-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7Workstation-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7Workstation-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7Workstation-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7Workstation-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7Workstation-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7Workstation-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7Workstation-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7Workstation-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7Workstation-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0153" }, { "category": "workaround", "details": "The impact of this flaw can be reduced by disabling the dnsmasq cache by adding `--cache-size=0` when calling dnsmasq or by adding a line with `cache-size=0` to the dnsmasq configuration file (/etc/dnsmasq.conf by default).\n\nWhen using Red Hat Enterprise Linux 8.3 with libvirt through a virt:rhel module, use `virsh net-edit \u003cnetwork-name\u003e` and reference https://libvirt.org/formatnetwork.html#elementsNamespaces to add the suggested option `cache-size=0`. \n\nThere is no way to customize the dnsmasq configuration generated by libvirt, when using versions of Red Hat Enterprise Linux prior to version 8.3. If dnsmasq is being run through NetworkManager, create a new file in /etc/NetworkManager/dnsmasq.d/ and add `cache-size=0` to it.\n\nIn all cases, by disabling the cache, you may experience a performance loss in your environment due to all DNS queries being forwarded to the upstream servers. Please evaluate if the mitigation is appropriate for the system\u2019s environment before applying.", "product_ids": [ "7Client-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7Client-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7Client-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7Client-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7Client-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7Client-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7Client-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7Client-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7Client-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7Client-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7Client-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7Client-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7Client-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64", "7Client-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7Client-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7Client-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7Client-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7Client-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7Client-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7Client-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7Client-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7Client-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7Client-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7Client-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7Client-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7Client-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64", "7ComputeNode-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7ComputeNode-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7ComputeNode-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7ComputeNode-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7ComputeNode-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7ComputeNode-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7ComputeNode-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7ComputeNode-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7ComputeNode-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7ComputeNode-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7ComputeNode-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7ComputeNode-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7ComputeNode-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64", "7Server-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7Server-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7Server-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7Server-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7Server-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7Server-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7Server-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7Server-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7Server-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7Server-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7Server-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7Server-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7Server-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64", "7Server-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7Server-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7Server-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7Server-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7Server-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7Server-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7Server-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7Server-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7Server-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7Server-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7Server-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7Server-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7Server-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64", "7Workstation-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7Workstation-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7Workstation-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7Workstation-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7Workstation-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7Workstation-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7Workstation-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7Workstation-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7Workstation-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7Workstation-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7Workstation-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7Workstation-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7Workstation-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64", "7Workstation-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7Workstation-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7Workstation-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7Workstation-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7Workstation-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7Workstation-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7Workstation-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7Workstation-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7Workstation-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7Workstation-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7Workstation-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7Workstation-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7Workstation-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N", "version": "3.1" }, "products": [ "7Client-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7Client-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7Client-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7Client-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7Client-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7Client-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7Client-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7Client-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7Client-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7Client-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7Client-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7Client-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7Client-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64", "7Client-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7Client-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7Client-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7Client-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7Client-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7Client-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7Client-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7Client-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7Client-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7Client-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7Client-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7Client-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7Client-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64", "7ComputeNode-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7ComputeNode-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7ComputeNode-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7ComputeNode-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7ComputeNode-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7ComputeNode-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7ComputeNode-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7ComputeNode-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7ComputeNode-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7ComputeNode-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7ComputeNode-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7ComputeNode-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7ComputeNode-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64", "7Server-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7Server-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7Server-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7Server-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7Server-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7Server-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7Server-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7Server-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7Server-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7Server-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7Server-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7Server-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7Server-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64", "7Server-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7Server-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7Server-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7Server-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7Server-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7Server-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7Server-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7Server-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7Server-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7Server-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7Server-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7Server-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7Server-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64", "7Workstation-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7Workstation-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7Workstation-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7Workstation-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7Workstation-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7Workstation-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7Workstation-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7Workstation-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7Workstation-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7Workstation-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7Workstation-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7Workstation-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7Workstation-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64", "7Workstation-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7Workstation-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7Workstation-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7Workstation-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7Workstation-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7Workstation-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7Workstation-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7Workstation-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7Workstation-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7Workstation-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7Workstation-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7Workstation-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7Workstation-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "dnsmasq: loose address/port check in reply_query() makes forging replies easier for an off-path attacker" }, { "acknowledgments": [ { "names": [ "Moshe Kol", "Shlomi Oberman" ], "organization": "JSOF" } ], "cve": "CVE-2020-25685", "cwe": { "id": "CWE-326", "name": "Inadequate Encryption Strength" }, "discovery_date": "2020-09-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1889688" } ], "notes": [ { "category": "description", "text": "A flaw was found in dnsmasq. When getting a reply from a forwarded query, dnsmasq checks in forward.c:reply_query(), which is the forwarded query that matches the reply, by only using a weak hash of the query name. Due to the weak hash (CRC32 when dnsmasq is compiled without DNSSEC, SHA-1 when it is) this flaw allows an off-path attacker to find several different domains all having the same hash, substantially reducing the number of attempts they would have to perform to forge a reply and get it accepted by dnsmasq. This is in contrast with RFC5452, which specifies that the query name is one of the attributes of a query that must be used to match a reply. This flaw could be abused to perform a DNS Cache Poisoning attack. If chained with CVE-2020-25684 the attack complexity of a successful attack is reduced. The highest threat from this vulnerability is to data integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "dnsmasq: loose query name check in reply_query() makes forging replies easier for an off-path attacker", "title": "Vulnerability summary" }, { "category": "other", "text": "Dnsmasq may be run by libvirt and/or NetworkManager. libvirt uses dnsmasq by default to provide DNS service to its guests. NetworkManager may be configured to use dnsmasq to provide DNS service to the system, if a line `dns=dnsmasq` is present in the `[main]` section of the configuration file /etc/NetworkManager/NetworkManager.conf.\n\nIn Red Hat OpenStack Platform (RHOSP) and Red Hat Virtualization (RHV), the dnsmasq package is provided by the underlying Red Hat Enterprise Linux (RHEL) product. RHOSP and RHV are therefore indirectly affected, so please ensure that the underlying RHEL dnsmasq package is updated.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7Client-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7Client-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7Client-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7Client-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7Client-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7Client-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7Client-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7Client-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7Client-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7Client-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7Client-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7Client-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64", "7Client-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7Client-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7Client-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7Client-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7Client-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7Client-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7Client-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7Client-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7Client-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7Client-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7Client-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7Client-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7Client-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64", "7ComputeNode-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7ComputeNode-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7ComputeNode-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7ComputeNode-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7ComputeNode-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7ComputeNode-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7ComputeNode-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7ComputeNode-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7ComputeNode-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7ComputeNode-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7ComputeNode-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7ComputeNode-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7ComputeNode-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64", "7Server-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7Server-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7Server-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7Server-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7Server-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7Server-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7Server-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7Server-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7Server-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7Server-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7Server-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7Server-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7Server-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64", "7Server-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7Server-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7Server-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7Server-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7Server-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7Server-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7Server-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7Server-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7Server-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7Server-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7Server-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7Server-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7Server-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64", "7Workstation-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7Workstation-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7Workstation-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7Workstation-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7Workstation-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7Workstation-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7Workstation-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7Workstation-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7Workstation-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7Workstation-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7Workstation-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7Workstation-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7Workstation-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64", "7Workstation-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7Workstation-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7Workstation-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7Workstation-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7Workstation-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7Workstation-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7Workstation-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7Workstation-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7Workstation-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7Workstation-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7Workstation-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7Workstation-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7Workstation-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-25685" }, { "category": "external", "summary": "RHBZ#1889688", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889688" }, { "category": "external", "summary": "RHSB-2021-001", "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-001" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-25685", "url": "https://www.cve.org/CVERecord?id=CVE-2020-25685" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25685", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25685" }, { "category": "external", "summary": "https://www.jsof-tech.com/disclosures/dnspooq/", "url": "https://www.jsof-tech.com/disclosures/dnspooq/" } ], "release_date": "2021-01-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-01-19T18:02:16+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Client-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7Client-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7Client-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7Client-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7Client-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7Client-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7Client-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7Client-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7Client-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7Client-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7Client-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7Client-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7Client-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64", "7Client-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7Client-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7Client-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7Client-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7Client-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7Client-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7Client-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7Client-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7Client-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7Client-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7Client-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7Client-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7Client-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64", "7ComputeNode-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7ComputeNode-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7ComputeNode-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7ComputeNode-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7ComputeNode-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7ComputeNode-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7ComputeNode-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7ComputeNode-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7ComputeNode-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7ComputeNode-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7ComputeNode-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7ComputeNode-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7ComputeNode-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64", "7Server-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7Server-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7Server-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7Server-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7Server-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7Server-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7Server-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7Server-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7Server-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7Server-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7Server-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7Server-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7Server-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64", "7Server-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7Server-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7Server-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7Server-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7Server-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7Server-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7Server-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7Server-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7Server-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7Server-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7Server-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7Server-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7Server-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64", "7Workstation-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7Workstation-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7Workstation-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7Workstation-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7Workstation-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7Workstation-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7Workstation-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7Workstation-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7Workstation-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7Workstation-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7Workstation-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7Workstation-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7Workstation-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64", "7Workstation-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7Workstation-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7Workstation-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7Workstation-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7Workstation-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7Workstation-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7Workstation-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7Workstation-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7Workstation-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7Workstation-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7Workstation-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7Workstation-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7Workstation-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0153" }, { "category": "workaround", "details": "The impact of this flaw can be reduced by disabling the dnsmasq cache by adding `--cache-size=0` when calling dnsmasq or by adding a line with `cache-size=0` to the dnsmasq configuration file (/etc/dnsmasq.conf by default). \n\nWhen using Red Hat Enterprise Linux 8.3 with libvirt through a virt:rhel module, use `virsh net-edit \u003cnetwork-name\u003e` and reference https://libvirt.org/formatnetwork.html#elementsNamespaces to add the suggested option `cache-size=0`. \n\nThere is no way to customize the dnsmasq configuration generated by libvirt, when using versions of Red Hat Enterprise Linux prior to version 8.3. If dnsmasq is being run through NetworkManager, create a new file in /etc/NetworkManager/dnsmasq.d/ and add `cache-size=0` to it.\n\nIn all cases, by disabling the cache, you may experience a performance loss in your environment due to all DNS queries being forwarded to the upstream servers. Please evaluate if the mitigation is appropriate for the system\u2019s environment before applying.", "product_ids": [ "7Client-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7Client-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7Client-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7Client-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7Client-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7Client-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7Client-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7Client-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7Client-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7Client-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7Client-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7Client-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7Client-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64", "7Client-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7Client-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7Client-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7Client-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7Client-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7Client-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7Client-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7Client-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7Client-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7Client-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7Client-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7Client-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7Client-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64", "7ComputeNode-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7ComputeNode-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7ComputeNode-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7ComputeNode-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7ComputeNode-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7ComputeNode-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7ComputeNode-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7ComputeNode-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7ComputeNode-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7ComputeNode-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7ComputeNode-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7ComputeNode-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7ComputeNode-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64", "7Server-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7Server-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7Server-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7Server-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7Server-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7Server-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7Server-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7Server-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7Server-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7Server-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7Server-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7Server-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7Server-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64", "7Server-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7Server-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7Server-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7Server-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7Server-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7Server-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7Server-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7Server-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7Server-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7Server-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7Server-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7Server-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7Server-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64", "7Workstation-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7Workstation-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7Workstation-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7Workstation-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7Workstation-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7Workstation-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7Workstation-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7Workstation-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7Workstation-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7Workstation-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7Workstation-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7Workstation-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7Workstation-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64", "7Workstation-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7Workstation-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7Workstation-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7Workstation-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7Workstation-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7Workstation-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7Workstation-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7Workstation-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7Workstation-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7Workstation-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7Workstation-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7Workstation-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7Workstation-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N", "version": "3.1" }, "products": [ "7Client-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7Client-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7Client-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7Client-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7Client-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7Client-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7Client-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7Client-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7Client-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7Client-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7Client-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7Client-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7Client-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64", "7Client-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7Client-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7Client-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7Client-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7Client-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7Client-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7Client-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7Client-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7Client-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7Client-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7Client-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7Client-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7Client-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64", "7ComputeNode-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7ComputeNode-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7ComputeNode-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7ComputeNode-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7ComputeNode-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7ComputeNode-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7ComputeNode-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7ComputeNode-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7ComputeNode-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7ComputeNode-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7ComputeNode-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7ComputeNode-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7ComputeNode-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64", "7Server-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7Server-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7Server-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7Server-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7Server-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7Server-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7Server-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7Server-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7Server-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7Server-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7Server-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7Server-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7Server-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64", "7Server-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7Server-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7Server-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7Server-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7Server-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7Server-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7Server-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7Server-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7Server-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7Server-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7Server-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7Server-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7Server-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64", "7Workstation-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7Workstation-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7Workstation-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7Workstation-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7Workstation-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7Workstation-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7Workstation-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7Workstation-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7Workstation-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7Workstation-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7Workstation-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7Workstation-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7Workstation-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64", "7Workstation-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7Workstation-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7Workstation-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7Workstation-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7Workstation-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7Workstation-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7Workstation-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7Workstation-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7Workstation-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7Workstation-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7Workstation-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7Workstation-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7Workstation-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "dnsmasq: loose query name check in reply_query() makes forging replies easier for an off-path attacker" }, { "acknowledgments": [ { "names": [ "Moshe Kol", "Shlomi Oberman" ], "organization": "JSOF" } ], "cve": "CVE-2020-25686", "cwe": { "id": "CWE-290", "name": "Authentication Bypass by Spoofing" }, "discovery_date": "2020-09-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1890125" } ], "notes": [ { "category": "description", "text": "A flaw was found in dnsmasq. When receiving a query, dnsmasq does not check for an existing pending request for the same name and forwards a new request. By default, a maximum of 150 pending queries can be sent to upstream servers, so there can be at most 150 queries for the same name. This flaw allows an off-path attacker on the network to substantially reduce the number of attempts that it would have to perform to forge a reply and have it accepted by dnsmasq. This issue is mentioned in the \"Birthday Attacks\" section of RFC5452. If chained with CVE-2020-25684, the attack complexity of a successful attack is reduced. The highest threat from this vulnerability is to data integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "dnsmasq: multiple queries forwarded for the same name makes forging replies easier for an off-path attacker", "title": "Vulnerability summary" }, { "category": "other", "text": "Dnsmasq may be run by libvirt and/or NetworkManager. libvirt uses dnsmasq by default to provide DNS service to its guests. NetworkManager may be configured to use dnsmasq to provide DNS service to the system, if a line `dns=dnsmasq` is present in the `[main]` section of the configuration file /etc/NetworkManager/NetworkManager.conf.\n\nIn Red Hat OpenStack Platform (RHOSP) and Red Hat Virtualization (RHV), the dnsmasq package is provided by the underlying Red Hat Enterprise Linux (RHEL) product. RHOSP and RHV are therefore indirectly affected, so please ensure that the underlying RHEL dnsmasq package is updated.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7Client-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7Client-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7Client-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7Client-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7Client-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7Client-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7Client-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7Client-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7Client-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7Client-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7Client-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7Client-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64", "7Client-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7Client-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7Client-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7Client-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7Client-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7Client-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7Client-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7Client-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7Client-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7Client-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7Client-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7Client-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7Client-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64", "7ComputeNode-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7ComputeNode-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7ComputeNode-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7ComputeNode-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7ComputeNode-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7ComputeNode-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7ComputeNode-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7ComputeNode-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7ComputeNode-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7ComputeNode-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7ComputeNode-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7ComputeNode-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7ComputeNode-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64", "7Server-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7Server-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7Server-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7Server-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7Server-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7Server-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7Server-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7Server-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7Server-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7Server-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7Server-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7Server-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7Server-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64", "7Server-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7Server-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7Server-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7Server-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7Server-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7Server-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7Server-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7Server-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7Server-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7Server-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7Server-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7Server-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7Server-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64", "7Workstation-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7Workstation-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7Workstation-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7Workstation-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7Workstation-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7Workstation-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7Workstation-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7Workstation-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7Workstation-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7Workstation-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7Workstation-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7Workstation-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7Workstation-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64", "7Workstation-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7Workstation-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7Workstation-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7Workstation-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7Workstation-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7Workstation-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7Workstation-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7Workstation-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7Workstation-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7Workstation-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7Workstation-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7Workstation-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7Workstation-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-25686" }, { "category": "external", "summary": "RHBZ#1890125", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890125" }, { "category": "external", "summary": "RHSB-2021-001", "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-001" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-25686", "url": "https://www.cve.org/CVERecord?id=CVE-2020-25686" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25686", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25686" }, { "category": "external", "summary": "https://www.jsof-tech.com/disclosures/dnspooq/", "url": "https://www.jsof-tech.com/disclosures/dnspooq/" } ], "release_date": "2021-01-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-01-19T18:02:16+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Client-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7Client-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7Client-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7Client-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7Client-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7Client-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7Client-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7Client-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7Client-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7Client-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7Client-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7Client-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7Client-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64", "7Client-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7Client-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7Client-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7Client-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7Client-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7Client-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7Client-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7Client-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7Client-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7Client-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7Client-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7Client-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7Client-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64", "7ComputeNode-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7ComputeNode-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7ComputeNode-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7ComputeNode-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7ComputeNode-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7ComputeNode-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7ComputeNode-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7ComputeNode-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7ComputeNode-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7ComputeNode-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7ComputeNode-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7ComputeNode-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7ComputeNode-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64", "7Server-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7Server-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7Server-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7Server-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7Server-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7Server-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7Server-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7Server-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7Server-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7Server-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7Server-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7Server-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7Server-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64", "7Server-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7Server-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7Server-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7Server-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7Server-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7Server-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7Server-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7Server-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7Server-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7Server-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7Server-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7Server-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7Server-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64", "7Workstation-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7Workstation-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7Workstation-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7Workstation-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7Workstation-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7Workstation-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7Workstation-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7Workstation-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7Workstation-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7Workstation-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7Workstation-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7Workstation-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7Workstation-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64", "7Workstation-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7Workstation-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7Workstation-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7Workstation-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7Workstation-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7Workstation-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7Workstation-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7Workstation-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7Workstation-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7Workstation-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7Workstation-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7Workstation-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7Workstation-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0153" }, { "category": "workaround", "details": "The impact of this flaw can be reduced by disabling the dnsmasq cache by adding `--cache-size=0` when calling dnsmasq or by adding a line with `cache-size=0` to the dnsmasq configuration file (/etc/dnsmasq.conf by default). \n\nWhen using Red Hat Enterprise Linux 8.3 with libvirt through a virt:rhel module, use `virsh net-edit \u003cnetwork-name\u003e` and reference https://libvirt.org/formatnetwork.html#elementsNamespaces to add the suggested option `cache-size=0`. \n\nThere is no way to customize the dnsmasq configuration generated by libvirt, when using versions of Red Hat Enterprise Linux prior to version 8.3. If dnsmasq is being run through NetworkManager, create a new file in /etc/NetworkManager/dnsmasq.d/ and add `cache-size=0` to it.\n\nIn all cases, by disabling the cache, you may experience a performance loss in your environment due to all DNS queries being forwarded to the upstream servers. Please evaluate if the mitigation is appropriate for the system\u2019s environment before applying.", "product_ids": [ "7Client-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7Client-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7Client-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7Client-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7Client-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7Client-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7Client-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7Client-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7Client-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7Client-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7Client-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7Client-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7Client-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64", "7Client-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7Client-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7Client-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7Client-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7Client-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7Client-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7Client-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7Client-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7Client-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7Client-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7Client-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7Client-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7Client-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64", "7ComputeNode-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7ComputeNode-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7ComputeNode-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7ComputeNode-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7ComputeNode-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7ComputeNode-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7ComputeNode-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7ComputeNode-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7ComputeNode-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7ComputeNode-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7ComputeNode-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7ComputeNode-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7ComputeNode-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64", "7Server-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7Server-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7Server-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7Server-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7Server-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7Server-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7Server-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7Server-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7Server-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7Server-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7Server-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7Server-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7Server-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64", "7Server-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7Server-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7Server-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7Server-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7Server-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7Server-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7Server-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7Server-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7Server-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7Server-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7Server-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7Server-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7Server-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64", "7Workstation-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7Workstation-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7Workstation-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7Workstation-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7Workstation-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7Workstation-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7Workstation-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7Workstation-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7Workstation-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7Workstation-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7Workstation-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7Workstation-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7Workstation-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64", "7Workstation-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7Workstation-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7Workstation-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7Workstation-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7Workstation-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7Workstation-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7Workstation-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7Workstation-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7Workstation-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7Workstation-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7Workstation-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7Workstation-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7Workstation-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N", "version": "3.1" }, "products": [ "7Client-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7Client-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7Client-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7Client-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7Client-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7Client-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7Client-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7Client-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7Client-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7Client-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7Client-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7Client-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7Client-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64", "7Client-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7Client-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7Client-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7Client-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7Client-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7Client-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7Client-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7Client-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7Client-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7Client-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7Client-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7Client-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7Client-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64", "7ComputeNode-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7ComputeNode-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7ComputeNode-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7ComputeNode-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7ComputeNode-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7ComputeNode-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7ComputeNode-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7ComputeNode-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7ComputeNode-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7ComputeNode-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7ComputeNode-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7ComputeNode-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7ComputeNode-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64", "7Server-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7Server-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7Server-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7Server-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7Server-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7Server-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7Server-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7Server-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7Server-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7Server-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7Server-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7Server-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7Server-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64", "7Server-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7Server-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7Server-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7Server-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7Server-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7Server-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7Server-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7Server-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7Server-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7Server-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7Server-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7Server-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7Server-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64", "7Workstation-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7Workstation-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7Workstation-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7Workstation-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7Workstation-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7Workstation-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7Workstation-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7Workstation-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7Workstation-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7Workstation-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7Workstation-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7Workstation-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7Workstation-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64", "7Workstation-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7Workstation-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7Workstation-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7Workstation-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7Workstation-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7Workstation-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7Workstation-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7Workstation-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7Workstation-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7Workstation-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7Workstation-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7Workstation-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7Workstation-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "dnsmasq: multiple queries forwarded for the same name makes forging replies easier for an off-path attacker" } ] }
rhsa-2021_0154
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for dnsmasq is now available for Red Hat Enterprise Linux 7.7 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The dnsmasq packages contain Dnsmasq, a lightweight DNS (Domain Name Server) forwarder and DHCP (Dynamic Host Configuration Protocol) server.\n\nSecurity Fix(es):\n\n* dnsmasq: loose address/port check in reply_query() makes forging replies easier for an off-path attacker (CVE-2020-25684)\n\n* dnsmasq: loose query name check in reply_query() makes forging replies easier for an off-path attacker (CVE-2020-25685)\n\n* dnsmasq: multiple queries forwarded for the same name makes forging replies easier for an off-path attacker (CVE-2020-25686)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:0154", "url": "https://access.redhat.com/errata/RHSA-2021:0154" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-001", "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-001" }, { "category": "external", "summary": "1889686", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889686" }, { "category": "external", "summary": "1889688", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889688" }, { "category": "external", "summary": "1890125", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890125" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_0154.json" } ], "title": "Red Hat Security Advisory: dnsmasq security update", "tracking": { "current_release_date": "2024-11-15T07:27:27+00:00", "generator": { "date": "2024-11-15T07:27:27+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2021:0154", "initial_release_date": "2021-01-19T14:11:04+00:00", "revision_history": [ { "date": "2021-01-19T14:11:04+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-01-19T14:11:04+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-15T07:27:27+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)", "product": { "name": "Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)", "product_id": "7ComputeNode-optional-7.7.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:7.7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)", "product": { "name": "Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)", "product_id": "7ComputeNode-7.7.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:7.7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server EUS (v. 7.7)", "product": { "name": "Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-7.7.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:7.7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional EUS (v. 7.7)", "product": { "name": "Red Hat Enterprise Linux Server Optional EUS (v. 7.7)", "product_id": "7Server-optional-7.7.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:7.7::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "dnsmasq-0:2.76-10.el7_7.2.src", "product": { "name": "dnsmasq-0:2.76-10.el7_7.2.src", "product_id": "dnsmasq-0:2.76-10.el7_7.2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq@2.76-10.el7_7.2?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "dnsmasq-0:2.76-10.el7_7.2.x86_64", "product": { "name": "dnsmasq-0:2.76-10.el7_7.2.x86_64", "product_id": "dnsmasq-0:2.76-10.el7_7.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq@2.76-10.el7_7.2?arch=x86_64" } } }, { "category": "product_version", "name": "dnsmasq-debuginfo-0:2.76-10.el7_7.2.x86_64", "product": { "name": "dnsmasq-debuginfo-0:2.76-10.el7_7.2.x86_64", "product_id": "dnsmasq-debuginfo-0:2.76-10.el7_7.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-debuginfo@2.76-10.el7_7.2?arch=x86_64" } } }, { "category": "product_version", "name": "dnsmasq-utils-0:2.76-10.el7_7.2.x86_64", "product": { "name": "dnsmasq-utils-0:2.76-10.el7_7.2.x86_64", "product_id": "dnsmasq-utils-0:2.76-10.el7_7.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-utils@2.76-10.el7_7.2?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "dnsmasq-0:2.76-10.el7_7.2.ppc64le", "product": { "name": "dnsmasq-0:2.76-10.el7_7.2.ppc64le", "product_id": "dnsmasq-0:2.76-10.el7_7.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq@2.76-10.el7_7.2?arch=ppc64le" } } }, { "category": "product_version", "name": "dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64le", "product": { "name": "dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64le", "product_id": "dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-debuginfo@2.76-10.el7_7.2?arch=ppc64le" } } }, { "category": "product_version", "name": "dnsmasq-utils-0:2.76-10.el7_7.2.ppc64le", "product": { "name": "dnsmasq-utils-0:2.76-10.el7_7.2.ppc64le", "product_id": "dnsmasq-utils-0:2.76-10.el7_7.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-utils@2.76-10.el7_7.2?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "dnsmasq-0:2.76-10.el7_7.2.ppc64", "product": { "name": "dnsmasq-0:2.76-10.el7_7.2.ppc64", "product_id": "dnsmasq-0:2.76-10.el7_7.2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq@2.76-10.el7_7.2?arch=ppc64" } } }, { "category": "product_version", "name": "dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64", "product": { "name": "dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64", "product_id": "dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-debuginfo@2.76-10.el7_7.2?arch=ppc64" } } }, { "category": "product_version", "name": "dnsmasq-utils-0:2.76-10.el7_7.2.ppc64", "product": { "name": "dnsmasq-utils-0:2.76-10.el7_7.2.ppc64", "product_id": "dnsmasq-utils-0:2.76-10.el7_7.2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-utils@2.76-10.el7_7.2?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "dnsmasq-0:2.76-10.el7_7.2.s390x", "product": { "name": "dnsmasq-0:2.76-10.el7_7.2.s390x", "product_id": "dnsmasq-0:2.76-10.el7_7.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq@2.76-10.el7_7.2?arch=s390x" } } }, { "category": "product_version", "name": "dnsmasq-debuginfo-0:2.76-10.el7_7.2.s390x", "product": { "name": "dnsmasq-debuginfo-0:2.76-10.el7_7.2.s390x", "product_id": "dnsmasq-debuginfo-0:2.76-10.el7_7.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-debuginfo@2.76-10.el7_7.2?arch=s390x" } } }, { "category": "product_version", "name": "dnsmasq-utils-0:2.76-10.el7_7.2.s390x", "product": { "name": "dnsmasq-utils-0:2.76-10.el7_7.2.s390x", "product_id": "dnsmasq-utils-0:2.76-10.el7_7.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-utils@2.76-10.el7_7.2?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-10.el7_7.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)", "product_id": "7ComputeNode-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64" }, "product_reference": "dnsmasq-0:2.76-10.el7_7.2.ppc64", "relates_to_product_reference": "7ComputeNode-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-10.el7_7.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)", "product_id": "7ComputeNode-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64le" }, "product_reference": "dnsmasq-0:2.76-10.el7_7.2.ppc64le", "relates_to_product_reference": "7ComputeNode-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-10.el7_7.2.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)", "product_id": "7ComputeNode-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.s390x" }, "product_reference": "dnsmasq-0:2.76-10.el7_7.2.s390x", "relates_to_product_reference": "7ComputeNode-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-10.el7_7.2.src as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)", "product_id": "7ComputeNode-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.src" }, "product_reference": "dnsmasq-0:2.76-10.el7_7.2.src", "relates_to_product_reference": "7ComputeNode-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-10.el7_7.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)", "product_id": "7ComputeNode-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.x86_64" }, "product_reference": "dnsmasq-0:2.76-10.el7_7.2.x86_64", "relates_to_product_reference": "7ComputeNode-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)", "product_id": "7ComputeNode-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64" }, "product_reference": "dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64", "relates_to_product_reference": "7ComputeNode-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)", "product_id": "7ComputeNode-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64le" }, "product_reference": "dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64le", "relates_to_product_reference": "7ComputeNode-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-10.el7_7.2.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)", "product_id": "7ComputeNode-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.s390x" }, "product_reference": "dnsmasq-debuginfo-0:2.76-10.el7_7.2.s390x", "relates_to_product_reference": "7ComputeNode-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-10.el7_7.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)", "product_id": "7ComputeNode-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.x86_64" }, "product_reference": "dnsmasq-debuginfo-0:2.76-10.el7_7.2.x86_64", "relates_to_product_reference": "7ComputeNode-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-10.el7_7.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)", "product_id": "7ComputeNode-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64" }, "product_reference": "dnsmasq-utils-0:2.76-10.el7_7.2.ppc64", "relates_to_product_reference": "7ComputeNode-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-10.el7_7.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)", "product_id": "7ComputeNode-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64le" }, "product_reference": "dnsmasq-utils-0:2.76-10.el7_7.2.ppc64le", "relates_to_product_reference": "7ComputeNode-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-10.el7_7.2.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)", "product_id": "7ComputeNode-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.s390x" }, "product_reference": "dnsmasq-utils-0:2.76-10.el7_7.2.s390x", "relates_to_product_reference": "7ComputeNode-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-10.el7_7.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)", "product_id": "7ComputeNode-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.x86_64" }, "product_reference": "dnsmasq-utils-0:2.76-10.el7_7.2.x86_64", "relates_to_product_reference": "7ComputeNode-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-10.el7_7.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)", "product_id": "7ComputeNode-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64" }, "product_reference": "dnsmasq-0:2.76-10.el7_7.2.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-10.el7_7.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)", "product_id": "7ComputeNode-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64le" }, "product_reference": "dnsmasq-0:2.76-10.el7_7.2.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-10.el7_7.2.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)", "product_id": "7ComputeNode-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.s390x" }, "product_reference": "dnsmasq-0:2.76-10.el7_7.2.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-10.el7_7.2.src as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)", "product_id": "7ComputeNode-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.src" }, "product_reference": "dnsmasq-0:2.76-10.el7_7.2.src", "relates_to_product_reference": "7ComputeNode-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-10.el7_7.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)", "product_id": "7ComputeNode-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.x86_64" }, "product_reference": "dnsmasq-0:2.76-10.el7_7.2.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)", "product_id": "7ComputeNode-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64" }, "product_reference": "dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)", "product_id": "7ComputeNode-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64le" }, "product_reference": "dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-10.el7_7.2.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)", "product_id": "7ComputeNode-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.s390x" }, "product_reference": "dnsmasq-debuginfo-0:2.76-10.el7_7.2.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-10.el7_7.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)", "product_id": "7ComputeNode-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.x86_64" }, "product_reference": "dnsmasq-debuginfo-0:2.76-10.el7_7.2.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-10.el7_7.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)", "product_id": "7ComputeNode-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64" }, "product_reference": "dnsmasq-utils-0:2.76-10.el7_7.2.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-10.el7_7.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)", "product_id": "7ComputeNode-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64le" }, "product_reference": "dnsmasq-utils-0:2.76-10.el7_7.2.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-10.el7_7.2.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)", "product_id": "7ComputeNode-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.s390x" }, "product_reference": "dnsmasq-utils-0:2.76-10.el7_7.2.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-10.el7_7.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)", "product_id": "7ComputeNode-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.x86_64" }, "product_reference": "dnsmasq-utils-0:2.76-10.el7_7.2.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-10.el7_7.2.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64" }, "product_reference": "dnsmasq-0:2.76-10.el7_7.2.ppc64", "relates_to_product_reference": "7Server-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-10.el7_7.2.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64le" }, "product_reference": "dnsmasq-0:2.76-10.el7_7.2.ppc64le", "relates_to_product_reference": "7Server-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-10.el7_7.2.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.s390x" }, "product_reference": "dnsmasq-0:2.76-10.el7_7.2.s390x", "relates_to_product_reference": "7Server-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-10.el7_7.2.src as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.src" }, "product_reference": "dnsmasq-0:2.76-10.el7_7.2.src", "relates_to_product_reference": "7Server-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-10.el7_7.2.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.x86_64" }, "product_reference": "dnsmasq-0:2.76-10.el7_7.2.x86_64", "relates_to_product_reference": "7Server-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64" }, "product_reference": "dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64", "relates_to_product_reference": "7Server-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64le" }, "product_reference": "dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64le", "relates_to_product_reference": "7Server-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-10.el7_7.2.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.s390x" }, "product_reference": "dnsmasq-debuginfo-0:2.76-10.el7_7.2.s390x", "relates_to_product_reference": "7Server-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-10.el7_7.2.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.x86_64" }, "product_reference": "dnsmasq-debuginfo-0:2.76-10.el7_7.2.x86_64", "relates_to_product_reference": "7Server-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-10.el7_7.2.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64" }, "product_reference": "dnsmasq-utils-0:2.76-10.el7_7.2.ppc64", "relates_to_product_reference": "7Server-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-10.el7_7.2.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64le" }, "product_reference": "dnsmasq-utils-0:2.76-10.el7_7.2.ppc64le", "relates_to_product_reference": "7Server-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-10.el7_7.2.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.s390x" }, "product_reference": "dnsmasq-utils-0:2.76-10.el7_7.2.s390x", "relates_to_product_reference": "7Server-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-10.el7_7.2.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.x86_64" }, "product_reference": "dnsmasq-utils-0:2.76-10.el7_7.2.x86_64", "relates_to_product_reference": "7Server-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-10.el7_7.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)", "product_id": "7Server-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64" }, "product_reference": "dnsmasq-0:2.76-10.el7_7.2.ppc64", "relates_to_product_reference": "7Server-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-10.el7_7.2.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)", "product_id": "7Server-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64le" }, "product_reference": "dnsmasq-0:2.76-10.el7_7.2.ppc64le", "relates_to_product_reference": "7Server-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-10.el7_7.2.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)", "product_id": "7Server-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.s390x" }, "product_reference": "dnsmasq-0:2.76-10.el7_7.2.s390x", "relates_to_product_reference": "7Server-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-10.el7_7.2.src as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)", "product_id": "7Server-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.src" }, "product_reference": "dnsmasq-0:2.76-10.el7_7.2.src", "relates_to_product_reference": "7Server-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-10.el7_7.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)", "product_id": "7Server-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.x86_64" }, "product_reference": "dnsmasq-0:2.76-10.el7_7.2.x86_64", "relates_to_product_reference": "7Server-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)", "product_id": "7Server-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64" }, "product_reference": "dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64", "relates_to_product_reference": "7Server-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)", "product_id": "7Server-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64le" }, "product_reference": "dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64le", "relates_to_product_reference": "7Server-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-10.el7_7.2.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)", "product_id": "7Server-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.s390x" }, "product_reference": "dnsmasq-debuginfo-0:2.76-10.el7_7.2.s390x", "relates_to_product_reference": "7Server-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-10.el7_7.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)", "product_id": "7Server-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.x86_64" }, "product_reference": "dnsmasq-debuginfo-0:2.76-10.el7_7.2.x86_64", "relates_to_product_reference": "7Server-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-10.el7_7.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)", "product_id": "7Server-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64" }, "product_reference": "dnsmasq-utils-0:2.76-10.el7_7.2.ppc64", "relates_to_product_reference": "7Server-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-10.el7_7.2.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)", "product_id": "7Server-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64le" }, "product_reference": "dnsmasq-utils-0:2.76-10.el7_7.2.ppc64le", "relates_to_product_reference": "7Server-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-10.el7_7.2.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)", "product_id": "7Server-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.s390x" }, "product_reference": "dnsmasq-utils-0:2.76-10.el7_7.2.s390x", "relates_to_product_reference": "7Server-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-10.el7_7.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)", "product_id": "7Server-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.x86_64" }, "product_reference": "dnsmasq-utils-0:2.76-10.el7_7.2.x86_64", "relates_to_product_reference": "7Server-optional-7.7.EUS" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Moshe Kol", "Shlomi Oberman" ], "organization": "JSOF" } ], "cve": "CVE-2020-25684", "cwe": { "id": "CWE-358", "name": "Improperly Implemented Security Check for Standard" }, "discovery_date": "2020-09-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1889686" } ], "notes": [ { "category": "description", "text": "A flaw was found in dnsmasq. When getting a reply from a forwarded query, dnsmasq checks in the forward.c:reply_query() if the reply destination address/port is used by the pending forwarded queries. However, it does not use the address/port to retrieve the exact forwarded query, substantially reducing the number of attempts an attacker on the network would have to perform to forge a reply and get it accepted by dnsmasq. This issue contrasts with RFC5452, which specifies a query\u0027s attributes that all must be used to match a reply. This flaw allows an attacker to perform a DNS Cache Poisoning attack. If chained with CVE-2020-25685 or CVE-2020-25686, the attack complexity of a successful attack is reduced. The highest threat from this vulnerability is to data integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "dnsmasq: loose address/port check in reply_query() makes forging replies easier for an off-path attacker", "title": "Vulnerability summary" }, { "category": "other", "text": "Dnsmasq may be run by libvirt and/or NetworkManager. libvirt uses dnsmasq by default to provide DNS service to its guests. NetworkManager may be configured to use dnsmasq to provide DNS service to the system, if a line `dns=dnsmasq` is present in the `[main]` section of the configuration file /etc/NetworkManager/NetworkManager.conf.\n\nIn Red Hat OpenStack Platform (RHOSP) and Red Hat Virtualization (RHV), the dnsmasq package is provided by the underlying Red Hat Enterprise Linux (RHEL) product. RHOSP and RHV are therefore indirectly affected, so please ensure that the underlying RHEL dnsmasq package is updated.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7ComputeNode-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64", "7ComputeNode-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64le", "7ComputeNode-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.s390x", "7ComputeNode-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.src", "7ComputeNode-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.x86_64", "7ComputeNode-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64", "7ComputeNode-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64le", "7ComputeNode-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.s390x", "7ComputeNode-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.x86_64", "7ComputeNode-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64", "7ComputeNode-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64le", "7ComputeNode-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.s390x", "7ComputeNode-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.x86_64", "7ComputeNode-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64", "7ComputeNode-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64le", "7ComputeNode-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.s390x", "7ComputeNode-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.src", "7ComputeNode-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.x86_64", "7ComputeNode-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64", "7ComputeNode-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64le", "7ComputeNode-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.s390x", "7ComputeNode-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.x86_64", "7ComputeNode-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64", "7ComputeNode-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64le", "7ComputeNode-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.s390x", "7ComputeNode-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.x86_64", "7Server-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64", "7Server-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64le", "7Server-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.s390x", "7Server-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.src", "7Server-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.x86_64", "7Server-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64", "7Server-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64le", "7Server-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.s390x", "7Server-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.x86_64", "7Server-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64", "7Server-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64le", "7Server-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.s390x", "7Server-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.x86_64", "7Server-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64", "7Server-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64le", "7Server-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.s390x", "7Server-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.src", "7Server-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.x86_64", "7Server-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64", "7Server-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64le", "7Server-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.s390x", "7Server-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.x86_64", "7Server-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64", "7Server-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64le", "7Server-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.s390x", "7Server-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-25684" }, { "category": "external", "summary": "RHBZ#1889686", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889686" }, { "category": "external", "summary": "RHSB-2021-001", "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-001" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-25684", "url": "https://www.cve.org/CVERecord?id=CVE-2020-25684" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25684", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25684" }, { "category": "external", "summary": "https://www.jsof-tech.com/disclosures/dnspooq/", "url": "https://www.jsof-tech.com/disclosures/dnspooq/" } ], "release_date": "2021-01-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-01-19T14:11:04+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7ComputeNode-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64", "7ComputeNode-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64le", "7ComputeNode-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.s390x", "7ComputeNode-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.src", "7ComputeNode-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.x86_64", "7ComputeNode-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64", "7ComputeNode-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64le", "7ComputeNode-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.s390x", "7ComputeNode-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.x86_64", "7ComputeNode-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64", "7ComputeNode-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64le", "7ComputeNode-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.s390x", "7ComputeNode-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.x86_64", "7ComputeNode-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64", "7ComputeNode-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64le", "7ComputeNode-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.s390x", "7ComputeNode-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.src", "7ComputeNode-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.x86_64", "7ComputeNode-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64", "7ComputeNode-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64le", "7ComputeNode-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.s390x", "7ComputeNode-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.x86_64", "7ComputeNode-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64", "7ComputeNode-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64le", "7ComputeNode-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.s390x", "7ComputeNode-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.x86_64", "7Server-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64", "7Server-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64le", "7Server-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.s390x", "7Server-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.src", "7Server-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.x86_64", "7Server-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64", "7Server-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64le", "7Server-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.s390x", "7Server-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.x86_64", "7Server-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64", "7Server-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64le", "7Server-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.s390x", "7Server-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.x86_64", "7Server-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64", "7Server-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64le", "7Server-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.s390x", "7Server-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.src", "7Server-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.x86_64", "7Server-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64", "7Server-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64le", "7Server-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.s390x", "7Server-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.x86_64", "7Server-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64", "7Server-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64le", "7Server-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.s390x", "7Server-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0154" }, { "category": "workaround", "details": "The impact of this flaw can be reduced by disabling the dnsmasq cache by adding `--cache-size=0` when calling dnsmasq or by adding a line with `cache-size=0` to the dnsmasq configuration file (/etc/dnsmasq.conf by default).\n\nWhen using Red Hat Enterprise Linux 8.3 with libvirt through a virt:rhel module, use `virsh net-edit \u003cnetwork-name\u003e` and reference https://libvirt.org/formatnetwork.html#elementsNamespaces to add the suggested option `cache-size=0`. \n\nThere is no way to customize the dnsmasq configuration generated by libvirt, when using versions of Red Hat Enterprise Linux prior to version 8.3. If dnsmasq is being run through NetworkManager, create a new file in /etc/NetworkManager/dnsmasq.d/ and add `cache-size=0` to it.\n\nIn all cases, by disabling the cache, you may experience a performance loss in your environment due to all DNS queries being forwarded to the upstream servers. Please evaluate if the mitigation is appropriate for the system\u2019s environment before applying.", "product_ids": [ "7ComputeNode-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64", "7ComputeNode-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64le", "7ComputeNode-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.s390x", "7ComputeNode-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.src", "7ComputeNode-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.x86_64", "7ComputeNode-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64", "7ComputeNode-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64le", "7ComputeNode-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.s390x", "7ComputeNode-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.x86_64", "7ComputeNode-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64", "7ComputeNode-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64le", "7ComputeNode-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.s390x", "7ComputeNode-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.x86_64", "7ComputeNode-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64", "7ComputeNode-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64le", "7ComputeNode-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.s390x", "7ComputeNode-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.src", "7ComputeNode-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.x86_64", "7ComputeNode-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64", "7ComputeNode-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64le", "7ComputeNode-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.s390x", "7ComputeNode-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.x86_64", "7ComputeNode-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64", "7ComputeNode-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64le", "7ComputeNode-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.s390x", "7ComputeNode-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.x86_64", "7Server-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64", "7Server-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64le", "7Server-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.s390x", "7Server-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.src", "7Server-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.x86_64", "7Server-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64", "7Server-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64le", "7Server-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.s390x", "7Server-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.x86_64", "7Server-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64", "7Server-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64le", "7Server-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.s390x", "7Server-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.x86_64", "7Server-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64", "7Server-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64le", "7Server-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.s390x", "7Server-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.src", "7Server-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.x86_64", "7Server-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64", "7Server-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64le", "7Server-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.s390x", "7Server-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.x86_64", "7Server-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64", "7Server-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64le", "7Server-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.s390x", "7Server-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N", "version": "3.1" }, "products": [ "7ComputeNode-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64", "7ComputeNode-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64le", "7ComputeNode-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.s390x", "7ComputeNode-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.src", "7ComputeNode-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.x86_64", "7ComputeNode-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64", "7ComputeNode-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64le", "7ComputeNode-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.s390x", "7ComputeNode-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.x86_64", "7ComputeNode-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64", "7ComputeNode-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64le", "7ComputeNode-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.s390x", "7ComputeNode-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.x86_64", "7ComputeNode-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64", "7ComputeNode-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64le", "7ComputeNode-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.s390x", "7ComputeNode-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.src", "7ComputeNode-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.x86_64", "7ComputeNode-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64", "7ComputeNode-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64le", "7ComputeNode-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.s390x", "7ComputeNode-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.x86_64", "7ComputeNode-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64", "7ComputeNode-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64le", "7ComputeNode-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.s390x", "7ComputeNode-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.x86_64", "7Server-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64", "7Server-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64le", "7Server-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.s390x", "7Server-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.src", "7Server-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.x86_64", "7Server-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64", "7Server-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64le", "7Server-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.s390x", "7Server-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.x86_64", "7Server-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64", "7Server-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64le", "7Server-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.s390x", "7Server-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.x86_64", "7Server-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64", "7Server-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64le", "7Server-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.s390x", "7Server-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.src", "7Server-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.x86_64", "7Server-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64", "7Server-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64le", "7Server-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.s390x", "7Server-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.x86_64", "7Server-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64", "7Server-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64le", "7Server-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.s390x", "7Server-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "dnsmasq: loose address/port check in reply_query() makes forging replies easier for an off-path attacker" }, { "acknowledgments": [ { "names": [ "Moshe Kol", "Shlomi Oberman" ], "organization": "JSOF" } ], "cve": "CVE-2020-25685", "cwe": { "id": "CWE-326", "name": "Inadequate Encryption Strength" }, "discovery_date": "2020-09-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1889688" } ], "notes": [ { "category": "description", "text": "A flaw was found in dnsmasq. When getting a reply from a forwarded query, dnsmasq checks in forward.c:reply_query(), which is the forwarded query that matches the reply, by only using a weak hash of the query name. Due to the weak hash (CRC32 when dnsmasq is compiled without DNSSEC, SHA-1 when it is) this flaw allows an off-path attacker to find several different domains all having the same hash, substantially reducing the number of attempts they would have to perform to forge a reply and get it accepted by dnsmasq. This is in contrast with RFC5452, which specifies that the query name is one of the attributes of a query that must be used to match a reply. This flaw could be abused to perform a DNS Cache Poisoning attack. If chained with CVE-2020-25684 the attack complexity of a successful attack is reduced. The highest threat from this vulnerability is to data integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "dnsmasq: loose query name check in reply_query() makes forging replies easier for an off-path attacker", "title": "Vulnerability summary" }, { "category": "other", "text": "Dnsmasq may be run by libvirt and/or NetworkManager. libvirt uses dnsmasq by default to provide DNS service to its guests. NetworkManager may be configured to use dnsmasq to provide DNS service to the system, if a line `dns=dnsmasq` is present in the `[main]` section of the configuration file /etc/NetworkManager/NetworkManager.conf.\n\nIn Red Hat OpenStack Platform (RHOSP) and Red Hat Virtualization (RHV), the dnsmasq package is provided by the underlying Red Hat Enterprise Linux (RHEL) product. RHOSP and RHV are therefore indirectly affected, so please ensure that the underlying RHEL dnsmasq package is updated.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7ComputeNode-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64", "7ComputeNode-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64le", "7ComputeNode-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.s390x", "7ComputeNode-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.src", "7ComputeNode-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.x86_64", "7ComputeNode-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64", "7ComputeNode-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64le", "7ComputeNode-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.s390x", "7ComputeNode-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.x86_64", "7ComputeNode-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64", "7ComputeNode-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64le", "7ComputeNode-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.s390x", "7ComputeNode-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.x86_64", "7ComputeNode-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64", "7ComputeNode-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64le", "7ComputeNode-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.s390x", "7ComputeNode-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.src", "7ComputeNode-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.x86_64", "7ComputeNode-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64", "7ComputeNode-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64le", "7ComputeNode-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.s390x", "7ComputeNode-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.x86_64", "7ComputeNode-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64", "7ComputeNode-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64le", "7ComputeNode-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.s390x", "7ComputeNode-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.x86_64", "7Server-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64", "7Server-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64le", "7Server-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.s390x", "7Server-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.src", "7Server-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.x86_64", "7Server-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64", "7Server-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64le", "7Server-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.s390x", "7Server-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.x86_64", "7Server-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64", "7Server-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64le", "7Server-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.s390x", "7Server-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.x86_64", "7Server-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64", "7Server-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64le", "7Server-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.s390x", "7Server-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.src", "7Server-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.x86_64", "7Server-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64", "7Server-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64le", "7Server-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.s390x", "7Server-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.x86_64", "7Server-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64", "7Server-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64le", "7Server-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.s390x", "7Server-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-25685" }, { "category": "external", "summary": "RHBZ#1889688", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889688" }, { "category": "external", "summary": "RHSB-2021-001", "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-001" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-25685", "url": "https://www.cve.org/CVERecord?id=CVE-2020-25685" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25685", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25685" }, { "category": "external", "summary": "https://www.jsof-tech.com/disclosures/dnspooq/", "url": "https://www.jsof-tech.com/disclosures/dnspooq/" } ], "release_date": "2021-01-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-01-19T14:11:04+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7ComputeNode-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64", "7ComputeNode-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64le", "7ComputeNode-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.s390x", "7ComputeNode-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.src", "7ComputeNode-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.x86_64", "7ComputeNode-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64", "7ComputeNode-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64le", "7ComputeNode-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.s390x", "7ComputeNode-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.x86_64", "7ComputeNode-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64", "7ComputeNode-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64le", "7ComputeNode-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.s390x", "7ComputeNode-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.x86_64", "7ComputeNode-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64", "7ComputeNode-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64le", "7ComputeNode-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.s390x", "7ComputeNode-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.src", "7ComputeNode-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.x86_64", "7ComputeNode-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64", "7ComputeNode-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64le", "7ComputeNode-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.s390x", "7ComputeNode-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.x86_64", "7ComputeNode-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64", "7ComputeNode-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64le", "7ComputeNode-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.s390x", "7ComputeNode-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.x86_64", "7Server-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64", "7Server-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64le", "7Server-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.s390x", "7Server-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.src", "7Server-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.x86_64", "7Server-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64", "7Server-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64le", "7Server-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.s390x", "7Server-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.x86_64", "7Server-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64", "7Server-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64le", "7Server-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.s390x", "7Server-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.x86_64", "7Server-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64", "7Server-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64le", "7Server-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.s390x", "7Server-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.src", "7Server-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.x86_64", "7Server-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64", "7Server-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64le", "7Server-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.s390x", "7Server-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.x86_64", "7Server-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64", "7Server-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64le", "7Server-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.s390x", "7Server-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0154" }, { "category": "workaround", "details": "The impact of this flaw can be reduced by disabling the dnsmasq cache by adding `--cache-size=0` when calling dnsmasq or by adding a line with `cache-size=0` to the dnsmasq configuration file (/etc/dnsmasq.conf by default). \n\nWhen using Red Hat Enterprise Linux 8.3 with libvirt through a virt:rhel module, use `virsh net-edit \u003cnetwork-name\u003e` and reference https://libvirt.org/formatnetwork.html#elementsNamespaces to add the suggested option `cache-size=0`. \n\nThere is no way to customize the dnsmasq configuration generated by libvirt, when using versions of Red Hat Enterprise Linux prior to version 8.3. If dnsmasq is being run through NetworkManager, create a new file in /etc/NetworkManager/dnsmasq.d/ and add `cache-size=0` to it.\n\nIn all cases, by disabling the cache, you may experience a performance loss in your environment due to all DNS queries being forwarded to the upstream servers. Please evaluate if the mitigation is appropriate for the system\u2019s environment before applying.", "product_ids": [ "7ComputeNode-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64", "7ComputeNode-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64le", "7ComputeNode-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.s390x", "7ComputeNode-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.src", "7ComputeNode-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.x86_64", "7ComputeNode-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64", "7ComputeNode-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64le", "7ComputeNode-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.s390x", "7ComputeNode-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.x86_64", "7ComputeNode-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64", "7ComputeNode-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64le", "7ComputeNode-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.s390x", "7ComputeNode-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.x86_64", "7ComputeNode-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64", "7ComputeNode-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64le", "7ComputeNode-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.s390x", "7ComputeNode-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.src", "7ComputeNode-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.x86_64", "7ComputeNode-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64", "7ComputeNode-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64le", "7ComputeNode-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.s390x", "7ComputeNode-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.x86_64", "7ComputeNode-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64", "7ComputeNode-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64le", "7ComputeNode-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.s390x", "7ComputeNode-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.x86_64", "7Server-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64", "7Server-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64le", "7Server-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.s390x", "7Server-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.src", "7Server-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.x86_64", "7Server-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64", "7Server-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64le", "7Server-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.s390x", "7Server-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.x86_64", "7Server-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64", "7Server-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64le", "7Server-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.s390x", "7Server-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.x86_64", "7Server-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64", "7Server-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64le", "7Server-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.s390x", "7Server-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.src", "7Server-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.x86_64", "7Server-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64", "7Server-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64le", "7Server-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.s390x", "7Server-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.x86_64", "7Server-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64", "7Server-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64le", "7Server-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.s390x", "7Server-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N", "version": "3.1" }, "products": [ "7ComputeNode-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64", "7ComputeNode-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64le", "7ComputeNode-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.s390x", "7ComputeNode-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.src", "7ComputeNode-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.x86_64", "7ComputeNode-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64", "7ComputeNode-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64le", "7ComputeNode-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.s390x", "7ComputeNode-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.x86_64", "7ComputeNode-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64", "7ComputeNode-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64le", "7ComputeNode-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.s390x", "7ComputeNode-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.x86_64", "7ComputeNode-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64", "7ComputeNode-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64le", "7ComputeNode-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.s390x", "7ComputeNode-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.src", "7ComputeNode-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.x86_64", "7ComputeNode-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64", "7ComputeNode-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64le", "7ComputeNode-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.s390x", "7ComputeNode-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.x86_64", "7ComputeNode-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64", "7ComputeNode-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64le", "7ComputeNode-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.s390x", "7ComputeNode-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.x86_64", "7Server-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64", "7Server-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64le", "7Server-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.s390x", "7Server-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.src", "7Server-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.x86_64", "7Server-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64", "7Server-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64le", "7Server-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.s390x", "7Server-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.x86_64", "7Server-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64", "7Server-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64le", "7Server-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.s390x", "7Server-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.x86_64", "7Server-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64", "7Server-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64le", "7Server-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.s390x", "7Server-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.src", "7Server-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.x86_64", "7Server-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64", "7Server-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64le", "7Server-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.s390x", "7Server-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.x86_64", "7Server-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64", "7Server-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64le", "7Server-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.s390x", "7Server-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "dnsmasq: loose query name check in reply_query() makes forging replies easier for an off-path attacker" }, { "acknowledgments": [ { "names": [ "Moshe Kol", "Shlomi Oberman" ], "organization": "JSOF" } ], "cve": "CVE-2020-25686", "cwe": { "id": "CWE-290", "name": "Authentication Bypass by Spoofing" }, "discovery_date": "2020-09-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1890125" } ], "notes": [ { "category": "description", "text": "A flaw was found in dnsmasq. When receiving a query, dnsmasq does not check for an existing pending request for the same name and forwards a new request. By default, a maximum of 150 pending queries can be sent to upstream servers, so there can be at most 150 queries for the same name. This flaw allows an off-path attacker on the network to substantially reduce the number of attempts that it would have to perform to forge a reply and have it accepted by dnsmasq. This issue is mentioned in the \"Birthday Attacks\" section of RFC5452. If chained with CVE-2020-25684, the attack complexity of a successful attack is reduced. The highest threat from this vulnerability is to data integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "dnsmasq: multiple queries forwarded for the same name makes forging replies easier for an off-path attacker", "title": "Vulnerability summary" }, { "category": "other", "text": "Dnsmasq may be run by libvirt and/or NetworkManager. libvirt uses dnsmasq by default to provide DNS service to its guests. NetworkManager may be configured to use dnsmasq to provide DNS service to the system, if a line `dns=dnsmasq` is present in the `[main]` section of the configuration file /etc/NetworkManager/NetworkManager.conf.\n\nIn Red Hat OpenStack Platform (RHOSP) and Red Hat Virtualization (RHV), the dnsmasq package is provided by the underlying Red Hat Enterprise Linux (RHEL) product. RHOSP and RHV are therefore indirectly affected, so please ensure that the underlying RHEL dnsmasq package is updated.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7ComputeNode-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64", "7ComputeNode-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64le", "7ComputeNode-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.s390x", "7ComputeNode-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.src", "7ComputeNode-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.x86_64", "7ComputeNode-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64", "7ComputeNode-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64le", "7ComputeNode-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.s390x", "7ComputeNode-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.x86_64", "7ComputeNode-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64", "7ComputeNode-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64le", "7ComputeNode-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.s390x", "7ComputeNode-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.x86_64", "7ComputeNode-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64", "7ComputeNode-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64le", "7ComputeNode-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.s390x", "7ComputeNode-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.src", "7ComputeNode-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.x86_64", "7ComputeNode-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64", "7ComputeNode-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64le", "7ComputeNode-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.s390x", "7ComputeNode-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.x86_64", "7ComputeNode-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64", "7ComputeNode-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64le", "7ComputeNode-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.s390x", "7ComputeNode-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.x86_64", "7Server-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64", "7Server-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64le", "7Server-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.s390x", "7Server-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.src", "7Server-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.x86_64", "7Server-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64", "7Server-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64le", "7Server-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.s390x", "7Server-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.x86_64", "7Server-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64", "7Server-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64le", "7Server-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.s390x", "7Server-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.x86_64", "7Server-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64", "7Server-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64le", "7Server-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.s390x", "7Server-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.src", "7Server-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.x86_64", "7Server-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64", "7Server-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64le", "7Server-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.s390x", "7Server-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.x86_64", "7Server-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64", "7Server-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64le", "7Server-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.s390x", "7Server-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-25686" }, { "category": "external", "summary": "RHBZ#1890125", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890125" }, { "category": "external", "summary": "RHSB-2021-001", "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-001" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-25686", "url": "https://www.cve.org/CVERecord?id=CVE-2020-25686" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25686", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25686" }, { "category": "external", "summary": "https://www.jsof-tech.com/disclosures/dnspooq/", "url": "https://www.jsof-tech.com/disclosures/dnspooq/" } ], "release_date": "2021-01-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-01-19T14:11:04+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7ComputeNode-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64", "7ComputeNode-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64le", "7ComputeNode-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.s390x", "7ComputeNode-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.src", "7ComputeNode-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.x86_64", "7ComputeNode-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64", "7ComputeNode-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64le", "7ComputeNode-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.s390x", "7ComputeNode-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.x86_64", "7ComputeNode-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64", "7ComputeNode-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64le", "7ComputeNode-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.s390x", "7ComputeNode-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.x86_64", "7ComputeNode-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64", "7ComputeNode-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64le", "7ComputeNode-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.s390x", "7ComputeNode-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.src", "7ComputeNode-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.x86_64", "7ComputeNode-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64", "7ComputeNode-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64le", "7ComputeNode-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.s390x", "7ComputeNode-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.x86_64", "7ComputeNode-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64", "7ComputeNode-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64le", "7ComputeNode-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.s390x", "7ComputeNode-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.x86_64", "7Server-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64", "7Server-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64le", "7Server-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.s390x", "7Server-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.src", "7Server-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.x86_64", "7Server-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64", "7Server-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64le", "7Server-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.s390x", "7Server-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.x86_64", "7Server-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64", "7Server-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64le", "7Server-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.s390x", "7Server-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.x86_64", "7Server-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64", "7Server-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64le", "7Server-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.s390x", "7Server-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.src", "7Server-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.x86_64", "7Server-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64", "7Server-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64le", "7Server-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.s390x", "7Server-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.x86_64", "7Server-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64", "7Server-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64le", "7Server-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.s390x", "7Server-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0154" }, { "category": "workaround", "details": "The impact of this flaw can be reduced by disabling the dnsmasq cache by adding `--cache-size=0` when calling dnsmasq or by adding a line with `cache-size=0` to the dnsmasq configuration file (/etc/dnsmasq.conf by default). \n\nWhen using Red Hat Enterprise Linux 8.3 with libvirt through a virt:rhel module, use `virsh net-edit \u003cnetwork-name\u003e` and reference https://libvirt.org/formatnetwork.html#elementsNamespaces to add the suggested option `cache-size=0`. \n\nThere is no way to customize the dnsmasq configuration generated by libvirt, when using versions of Red Hat Enterprise Linux prior to version 8.3. If dnsmasq is being run through NetworkManager, create a new file in /etc/NetworkManager/dnsmasq.d/ and add `cache-size=0` to it.\n\nIn all cases, by disabling the cache, you may experience a performance loss in your environment due to all DNS queries being forwarded to the upstream servers. Please evaluate if the mitigation is appropriate for the system\u2019s environment before applying.", "product_ids": [ "7ComputeNode-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64", "7ComputeNode-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64le", "7ComputeNode-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.s390x", "7ComputeNode-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.src", "7ComputeNode-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.x86_64", "7ComputeNode-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64", "7ComputeNode-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64le", "7ComputeNode-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.s390x", "7ComputeNode-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.x86_64", "7ComputeNode-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64", "7ComputeNode-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64le", "7ComputeNode-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.s390x", "7ComputeNode-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.x86_64", "7ComputeNode-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64", "7ComputeNode-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64le", "7ComputeNode-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.s390x", "7ComputeNode-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.src", "7ComputeNode-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.x86_64", "7ComputeNode-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64", "7ComputeNode-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64le", "7ComputeNode-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.s390x", "7ComputeNode-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.x86_64", "7ComputeNode-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64", "7ComputeNode-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64le", "7ComputeNode-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.s390x", "7ComputeNode-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.x86_64", "7Server-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64", "7Server-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64le", "7Server-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.s390x", "7Server-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.src", "7Server-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.x86_64", "7Server-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64", "7Server-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64le", "7Server-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.s390x", "7Server-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.x86_64", "7Server-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64", "7Server-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64le", "7Server-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.s390x", "7Server-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.x86_64", "7Server-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64", "7Server-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64le", "7Server-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.s390x", "7Server-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.src", "7Server-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.x86_64", "7Server-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64", "7Server-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64le", "7Server-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.s390x", "7Server-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.x86_64", "7Server-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64", "7Server-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64le", "7Server-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.s390x", "7Server-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N", "version": "3.1" }, "products": [ "7ComputeNode-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64", "7ComputeNode-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64le", "7ComputeNode-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.s390x", "7ComputeNode-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.src", "7ComputeNode-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.x86_64", "7ComputeNode-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64", "7ComputeNode-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64le", "7ComputeNode-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.s390x", "7ComputeNode-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.x86_64", "7ComputeNode-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64", "7ComputeNode-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64le", "7ComputeNode-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.s390x", "7ComputeNode-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.x86_64", "7ComputeNode-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64", "7ComputeNode-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64le", "7ComputeNode-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.s390x", "7ComputeNode-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.src", "7ComputeNode-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.x86_64", "7ComputeNode-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64", "7ComputeNode-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64le", "7ComputeNode-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.s390x", "7ComputeNode-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.x86_64", "7ComputeNode-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64", "7ComputeNode-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64le", "7ComputeNode-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.s390x", "7ComputeNode-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.x86_64", "7Server-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64", "7Server-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64le", "7Server-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.s390x", "7Server-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.src", "7Server-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.x86_64", "7Server-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64", "7Server-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64le", "7Server-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.s390x", "7Server-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.x86_64", "7Server-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64", "7Server-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64le", "7Server-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.s390x", "7Server-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.x86_64", "7Server-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64", "7Server-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64le", "7Server-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.s390x", "7Server-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.src", "7Server-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.x86_64", "7Server-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64", "7Server-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64le", "7Server-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.s390x", "7Server-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.x86_64", "7Server-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64", "7Server-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64le", "7Server-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.s390x", "7Server-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "dnsmasq: multiple queries forwarded for the same name makes forging replies easier for an off-path attacker" } ] }
rhsa-2021_0240
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for dnsmasq is now available for Red Hat Enterprise Linux 7.2 Advanced Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The dnsmasq packages contain Dnsmasq, a lightweight DNS (Domain Name Server) forwarder and DHCP (Dynamic Host Configuration Protocol) server.\n\nSecurity Fix(es):\n\n* dnsmasq: loose address/port check in reply_query() makes forging replies easier for an off-path attacker (CVE-2020-25684)\n\n* dnsmasq: loose query name check in reply_query() makes forging replies easier for an off-path attacker (CVE-2020-25685)\n\n* dnsmasq: multiple queries forwarded for the same name makes forging replies easier for an off-path attacker (CVE-2020-25686)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:0240", "url": "https://access.redhat.com/errata/RHSA-2021:0240" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-001", "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-001" }, { "category": "external", "summary": "1889686", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889686" }, { "category": "external", "summary": "1889688", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889688" }, { "category": "external", "summary": "1890125", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890125" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_0240.json" } ], "title": "Red Hat Security Advisory: dnsmasq security update", "tracking": { "current_release_date": "2024-11-15T07:29:04+00:00", "generator": { "date": "2024-11-15T07:29:04+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2021:0240", "initial_release_date": "2021-01-25T14:29:59+00:00", "revision_history": [ { "date": "2021-01-25T14:29:59+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-01-25T14:29:59+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-15T07:29:04+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Server AUS (v. 7.2)", "product": { "name": "Red Hat Enterprise Linux Server AUS (v. 7.2)", "product_id": "7Server-7.2.AUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_aus:7.2::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.2)", "product": { "name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.2)", "product_id": "7Server-optional-7.2.AUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_aus:7.2::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "dnsmasq-0:2.66-14.el7_2.3.src", "product": { "name": "dnsmasq-0:2.66-14.el7_2.3.src", "product_id": "dnsmasq-0:2.66-14.el7_2.3.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq@2.66-14.el7_2.3?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "dnsmasq-0:2.66-14.el7_2.3.x86_64", "product": { "name": "dnsmasq-0:2.66-14.el7_2.3.x86_64", "product_id": "dnsmasq-0:2.66-14.el7_2.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq@2.66-14.el7_2.3?arch=x86_64" } } }, { "category": "product_version", "name": "dnsmasq-debuginfo-0:2.66-14.el7_2.3.x86_64", "product": { "name": "dnsmasq-debuginfo-0:2.66-14.el7_2.3.x86_64", "product_id": "dnsmasq-debuginfo-0:2.66-14.el7_2.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-debuginfo@2.66-14.el7_2.3?arch=x86_64" } } }, { "category": "product_version", "name": "dnsmasq-utils-0:2.66-14.el7_2.3.x86_64", "product": { "name": "dnsmasq-utils-0:2.66-14.el7_2.3.x86_64", "product_id": "dnsmasq-utils-0:2.66-14.el7_2.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-utils@2.66-14.el7_2.3?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.66-14.el7_2.3.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)", "product_id": "7Server-7.2.AUS:dnsmasq-0:2.66-14.el7_2.3.src" }, "product_reference": "dnsmasq-0:2.66-14.el7_2.3.src", "relates_to_product_reference": "7Server-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.66-14.el7_2.3.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)", "product_id": "7Server-7.2.AUS:dnsmasq-0:2.66-14.el7_2.3.x86_64" }, "product_reference": "dnsmasq-0:2.66-14.el7_2.3.x86_64", "relates_to_product_reference": "7Server-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.66-14.el7_2.3.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)", "product_id": "7Server-7.2.AUS:dnsmasq-debuginfo-0:2.66-14.el7_2.3.x86_64" }, "product_reference": "dnsmasq-debuginfo-0:2.66-14.el7_2.3.x86_64", "relates_to_product_reference": "7Server-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.66-14.el7_2.3.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)", "product_id": "7Server-7.2.AUS:dnsmasq-utils-0:2.66-14.el7_2.3.x86_64" }, "product_reference": "dnsmasq-utils-0:2.66-14.el7_2.3.x86_64", "relates_to_product_reference": "7Server-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.66-14.el7_2.3.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)", "product_id": "7Server-optional-7.2.AUS:dnsmasq-0:2.66-14.el7_2.3.src" }, "product_reference": "dnsmasq-0:2.66-14.el7_2.3.src", "relates_to_product_reference": "7Server-optional-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.66-14.el7_2.3.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)", "product_id": "7Server-optional-7.2.AUS:dnsmasq-0:2.66-14.el7_2.3.x86_64" }, "product_reference": "dnsmasq-0:2.66-14.el7_2.3.x86_64", "relates_to_product_reference": "7Server-optional-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.66-14.el7_2.3.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)", "product_id": "7Server-optional-7.2.AUS:dnsmasq-debuginfo-0:2.66-14.el7_2.3.x86_64" }, "product_reference": "dnsmasq-debuginfo-0:2.66-14.el7_2.3.x86_64", "relates_to_product_reference": "7Server-optional-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.66-14.el7_2.3.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)", "product_id": "7Server-optional-7.2.AUS:dnsmasq-utils-0:2.66-14.el7_2.3.x86_64" }, "product_reference": "dnsmasq-utils-0:2.66-14.el7_2.3.x86_64", "relates_to_product_reference": "7Server-optional-7.2.AUS" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Moshe Kol", "Shlomi Oberman" ], "organization": "JSOF" } ], "cve": "CVE-2020-25684", "cwe": { "id": "CWE-358", "name": "Improperly Implemented Security Check for Standard" }, "discovery_date": "2020-09-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1889686" } ], "notes": [ { "category": "description", "text": "A flaw was found in dnsmasq. When getting a reply from a forwarded query, dnsmasq checks in the forward.c:reply_query() if the reply destination address/port is used by the pending forwarded queries. However, it does not use the address/port to retrieve the exact forwarded query, substantially reducing the number of attempts an attacker on the network would have to perform to forge a reply and get it accepted by dnsmasq. This issue contrasts with RFC5452, which specifies a query\u0027s attributes that all must be used to match a reply. This flaw allows an attacker to perform a DNS Cache Poisoning attack. If chained with CVE-2020-25685 or CVE-2020-25686, the attack complexity of a successful attack is reduced. The highest threat from this vulnerability is to data integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "dnsmasq: loose address/port check in reply_query() makes forging replies easier for an off-path attacker", "title": "Vulnerability summary" }, { "category": "other", "text": "Dnsmasq may be run by libvirt and/or NetworkManager. libvirt uses dnsmasq by default to provide DNS service to its guests. NetworkManager may be configured to use dnsmasq to provide DNS service to the system, if a line `dns=dnsmasq` is present in the `[main]` section of the configuration file /etc/NetworkManager/NetworkManager.conf.\n\nIn Red Hat OpenStack Platform (RHOSP) and Red Hat Virtualization (RHV), the dnsmasq package is provided by the underlying Red Hat Enterprise Linux (RHEL) product. RHOSP and RHV are therefore indirectly affected, so please ensure that the underlying RHEL dnsmasq package is updated.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.2.AUS:dnsmasq-0:2.66-14.el7_2.3.src", "7Server-7.2.AUS:dnsmasq-0:2.66-14.el7_2.3.x86_64", "7Server-7.2.AUS:dnsmasq-debuginfo-0:2.66-14.el7_2.3.x86_64", "7Server-7.2.AUS:dnsmasq-utils-0:2.66-14.el7_2.3.x86_64", "7Server-optional-7.2.AUS:dnsmasq-0:2.66-14.el7_2.3.src", "7Server-optional-7.2.AUS:dnsmasq-0:2.66-14.el7_2.3.x86_64", "7Server-optional-7.2.AUS:dnsmasq-debuginfo-0:2.66-14.el7_2.3.x86_64", "7Server-optional-7.2.AUS:dnsmasq-utils-0:2.66-14.el7_2.3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-25684" }, { "category": "external", "summary": "RHBZ#1889686", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889686" }, { "category": "external", "summary": "RHSB-2021-001", "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-001" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-25684", "url": "https://www.cve.org/CVERecord?id=CVE-2020-25684" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25684", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25684" }, { "category": "external", "summary": "https://www.jsof-tech.com/disclosures/dnspooq/", "url": "https://www.jsof-tech.com/disclosures/dnspooq/" } ], "release_date": "2021-01-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-01-25T14:29:59+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-7.2.AUS:dnsmasq-0:2.66-14.el7_2.3.src", "7Server-7.2.AUS:dnsmasq-0:2.66-14.el7_2.3.x86_64", "7Server-7.2.AUS:dnsmasq-debuginfo-0:2.66-14.el7_2.3.x86_64", "7Server-7.2.AUS:dnsmasq-utils-0:2.66-14.el7_2.3.x86_64", "7Server-optional-7.2.AUS:dnsmasq-0:2.66-14.el7_2.3.src", "7Server-optional-7.2.AUS:dnsmasq-0:2.66-14.el7_2.3.x86_64", "7Server-optional-7.2.AUS:dnsmasq-debuginfo-0:2.66-14.el7_2.3.x86_64", "7Server-optional-7.2.AUS:dnsmasq-utils-0:2.66-14.el7_2.3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0240" }, { "category": "workaround", "details": "The impact of this flaw can be reduced by disabling the dnsmasq cache by adding `--cache-size=0` when calling dnsmasq or by adding a line with `cache-size=0` to the dnsmasq configuration file (/etc/dnsmasq.conf by default).\n\nWhen using Red Hat Enterprise Linux 8.3 with libvirt through a virt:rhel module, use `virsh net-edit \u003cnetwork-name\u003e` and reference https://libvirt.org/formatnetwork.html#elementsNamespaces to add the suggested option `cache-size=0`. \n\nThere is no way to customize the dnsmasq configuration generated by libvirt, when using versions of Red Hat Enterprise Linux prior to version 8.3. If dnsmasq is being run through NetworkManager, create a new file in /etc/NetworkManager/dnsmasq.d/ and add `cache-size=0` to it.\n\nIn all cases, by disabling the cache, you may experience a performance loss in your environment due to all DNS queries being forwarded to the upstream servers. Please evaluate if the mitigation is appropriate for the system\u2019s environment before applying.", "product_ids": [ "7Server-7.2.AUS:dnsmasq-0:2.66-14.el7_2.3.src", "7Server-7.2.AUS:dnsmasq-0:2.66-14.el7_2.3.x86_64", "7Server-7.2.AUS:dnsmasq-debuginfo-0:2.66-14.el7_2.3.x86_64", "7Server-7.2.AUS:dnsmasq-utils-0:2.66-14.el7_2.3.x86_64", "7Server-optional-7.2.AUS:dnsmasq-0:2.66-14.el7_2.3.src", "7Server-optional-7.2.AUS:dnsmasq-0:2.66-14.el7_2.3.x86_64", "7Server-optional-7.2.AUS:dnsmasq-debuginfo-0:2.66-14.el7_2.3.x86_64", "7Server-optional-7.2.AUS:dnsmasq-utils-0:2.66-14.el7_2.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N", "version": "3.1" }, "products": [ "7Server-7.2.AUS:dnsmasq-0:2.66-14.el7_2.3.src", "7Server-7.2.AUS:dnsmasq-0:2.66-14.el7_2.3.x86_64", "7Server-7.2.AUS:dnsmasq-debuginfo-0:2.66-14.el7_2.3.x86_64", "7Server-7.2.AUS:dnsmasq-utils-0:2.66-14.el7_2.3.x86_64", "7Server-optional-7.2.AUS:dnsmasq-0:2.66-14.el7_2.3.src", "7Server-optional-7.2.AUS:dnsmasq-0:2.66-14.el7_2.3.x86_64", "7Server-optional-7.2.AUS:dnsmasq-debuginfo-0:2.66-14.el7_2.3.x86_64", "7Server-optional-7.2.AUS:dnsmasq-utils-0:2.66-14.el7_2.3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "dnsmasq: loose address/port check in reply_query() makes forging replies easier for an off-path attacker" }, { "acknowledgments": [ { "names": [ "Moshe Kol", "Shlomi Oberman" ], "organization": "JSOF" } ], "cve": "CVE-2020-25685", "cwe": { "id": "CWE-326", "name": "Inadequate Encryption Strength" }, "discovery_date": "2020-09-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1889688" } ], "notes": [ { "category": "description", "text": "A flaw was found in dnsmasq. When getting a reply from a forwarded query, dnsmasq checks in forward.c:reply_query(), which is the forwarded query that matches the reply, by only using a weak hash of the query name. Due to the weak hash (CRC32 when dnsmasq is compiled without DNSSEC, SHA-1 when it is) this flaw allows an off-path attacker to find several different domains all having the same hash, substantially reducing the number of attempts they would have to perform to forge a reply and get it accepted by dnsmasq. This is in contrast with RFC5452, which specifies that the query name is one of the attributes of a query that must be used to match a reply. This flaw could be abused to perform a DNS Cache Poisoning attack. If chained with CVE-2020-25684 the attack complexity of a successful attack is reduced. The highest threat from this vulnerability is to data integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "dnsmasq: loose query name check in reply_query() makes forging replies easier for an off-path attacker", "title": "Vulnerability summary" }, { "category": "other", "text": "Dnsmasq may be run by libvirt and/or NetworkManager. libvirt uses dnsmasq by default to provide DNS service to its guests. NetworkManager may be configured to use dnsmasq to provide DNS service to the system, if a line `dns=dnsmasq` is present in the `[main]` section of the configuration file /etc/NetworkManager/NetworkManager.conf.\n\nIn Red Hat OpenStack Platform (RHOSP) and Red Hat Virtualization (RHV), the dnsmasq package is provided by the underlying Red Hat Enterprise Linux (RHEL) product. RHOSP and RHV are therefore indirectly affected, so please ensure that the underlying RHEL dnsmasq package is updated.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.2.AUS:dnsmasq-0:2.66-14.el7_2.3.src", "7Server-7.2.AUS:dnsmasq-0:2.66-14.el7_2.3.x86_64", "7Server-7.2.AUS:dnsmasq-debuginfo-0:2.66-14.el7_2.3.x86_64", "7Server-7.2.AUS:dnsmasq-utils-0:2.66-14.el7_2.3.x86_64", "7Server-optional-7.2.AUS:dnsmasq-0:2.66-14.el7_2.3.src", "7Server-optional-7.2.AUS:dnsmasq-0:2.66-14.el7_2.3.x86_64", "7Server-optional-7.2.AUS:dnsmasq-debuginfo-0:2.66-14.el7_2.3.x86_64", "7Server-optional-7.2.AUS:dnsmasq-utils-0:2.66-14.el7_2.3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-25685" }, { "category": "external", "summary": "RHBZ#1889688", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889688" }, { "category": "external", "summary": "RHSB-2021-001", "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-001" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-25685", "url": "https://www.cve.org/CVERecord?id=CVE-2020-25685" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25685", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25685" }, { "category": "external", "summary": "https://www.jsof-tech.com/disclosures/dnspooq/", "url": "https://www.jsof-tech.com/disclosures/dnspooq/" } ], "release_date": "2021-01-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-01-25T14:29:59+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-7.2.AUS:dnsmasq-0:2.66-14.el7_2.3.src", "7Server-7.2.AUS:dnsmasq-0:2.66-14.el7_2.3.x86_64", "7Server-7.2.AUS:dnsmasq-debuginfo-0:2.66-14.el7_2.3.x86_64", "7Server-7.2.AUS:dnsmasq-utils-0:2.66-14.el7_2.3.x86_64", "7Server-optional-7.2.AUS:dnsmasq-0:2.66-14.el7_2.3.src", "7Server-optional-7.2.AUS:dnsmasq-0:2.66-14.el7_2.3.x86_64", "7Server-optional-7.2.AUS:dnsmasq-debuginfo-0:2.66-14.el7_2.3.x86_64", "7Server-optional-7.2.AUS:dnsmasq-utils-0:2.66-14.el7_2.3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0240" }, { "category": "workaround", "details": "The impact of this flaw can be reduced by disabling the dnsmasq cache by adding `--cache-size=0` when calling dnsmasq or by adding a line with `cache-size=0` to the dnsmasq configuration file (/etc/dnsmasq.conf by default). \n\nWhen using Red Hat Enterprise Linux 8.3 with libvirt through a virt:rhel module, use `virsh net-edit \u003cnetwork-name\u003e` and reference https://libvirt.org/formatnetwork.html#elementsNamespaces to add the suggested option `cache-size=0`. \n\nThere is no way to customize the dnsmasq configuration generated by libvirt, when using versions of Red Hat Enterprise Linux prior to version 8.3. If dnsmasq is being run through NetworkManager, create a new file in /etc/NetworkManager/dnsmasq.d/ and add `cache-size=0` to it.\n\nIn all cases, by disabling the cache, you may experience a performance loss in your environment due to all DNS queries being forwarded to the upstream servers. Please evaluate if the mitigation is appropriate for the system\u2019s environment before applying.", "product_ids": [ "7Server-7.2.AUS:dnsmasq-0:2.66-14.el7_2.3.src", "7Server-7.2.AUS:dnsmasq-0:2.66-14.el7_2.3.x86_64", "7Server-7.2.AUS:dnsmasq-debuginfo-0:2.66-14.el7_2.3.x86_64", "7Server-7.2.AUS:dnsmasq-utils-0:2.66-14.el7_2.3.x86_64", "7Server-optional-7.2.AUS:dnsmasq-0:2.66-14.el7_2.3.src", "7Server-optional-7.2.AUS:dnsmasq-0:2.66-14.el7_2.3.x86_64", "7Server-optional-7.2.AUS:dnsmasq-debuginfo-0:2.66-14.el7_2.3.x86_64", "7Server-optional-7.2.AUS:dnsmasq-utils-0:2.66-14.el7_2.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N", "version": "3.1" }, "products": [ "7Server-7.2.AUS:dnsmasq-0:2.66-14.el7_2.3.src", "7Server-7.2.AUS:dnsmasq-0:2.66-14.el7_2.3.x86_64", "7Server-7.2.AUS:dnsmasq-debuginfo-0:2.66-14.el7_2.3.x86_64", "7Server-7.2.AUS:dnsmasq-utils-0:2.66-14.el7_2.3.x86_64", "7Server-optional-7.2.AUS:dnsmasq-0:2.66-14.el7_2.3.src", "7Server-optional-7.2.AUS:dnsmasq-0:2.66-14.el7_2.3.x86_64", "7Server-optional-7.2.AUS:dnsmasq-debuginfo-0:2.66-14.el7_2.3.x86_64", "7Server-optional-7.2.AUS:dnsmasq-utils-0:2.66-14.el7_2.3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "dnsmasq: loose query name check in reply_query() makes forging replies easier for an off-path attacker" }, { "acknowledgments": [ { "names": [ "Moshe Kol", "Shlomi Oberman" ], "organization": "JSOF" } ], "cve": "CVE-2020-25686", "cwe": { "id": "CWE-290", "name": "Authentication Bypass by Spoofing" }, "discovery_date": "2020-09-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1890125" } ], "notes": [ { "category": "description", "text": "A flaw was found in dnsmasq. When receiving a query, dnsmasq does not check for an existing pending request for the same name and forwards a new request. By default, a maximum of 150 pending queries can be sent to upstream servers, so there can be at most 150 queries for the same name. This flaw allows an off-path attacker on the network to substantially reduce the number of attempts that it would have to perform to forge a reply and have it accepted by dnsmasq. This issue is mentioned in the \"Birthday Attacks\" section of RFC5452. If chained with CVE-2020-25684, the attack complexity of a successful attack is reduced. The highest threat from this vulnerability is to data integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "dnsmasq: multiple queries forwarded for the same name makes forging replies easier for an off-path attacker", "title": "Vulnerability summary" }, { "category": "other", "text": "Dnsmasq may be run by libvirt and/or NetworkManager. libvirt uses dnsmasq by default to provide DNS service to its guests. NetworkManager may be configured to use dnsmasq to provide DNS service to the system, if a line `dns=dnsmasq` is present in the `[main]` section of the configuration file /etc/NetworkManager/NetworkManager.conf.\n\nIn Red Hat OpenStack Platform (RHOSP) and Red Hat Virtualization (RHV), the dnsmasq package is provided by the underlying Red Hat Enterprise Linux (RHEL) product. RHOSP and RHV are therefore indirectly affected, so please ensure that the underlying RHEL dnsmasq package is updated.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.2.AUS:dnsmasq-0:2.66-14.el7_2.3.src", "7Server-7.2.AUS:dnsmasq-0:2.66-14.el7_2.3.x86_64", "7Server-7.2.AUS:dnsmasq-debuginfo-0:2.66-14.el7_2.3.x86_64", "7Server-7.2.AUS:dnsmasq-utils-0:2.66-14.el7_2.3.x86_64", "7Server-optional-7.2.AUS:dnsmasq-0:2.66-14.el7_2.3.src", "7Server-optional-7.2.AUS:dnsmasq-0:2.66-14.el7_2.3.x86_64", "7Server-optional-7.2.AUS:dnsmasq-debuginfo-0:2.66-14.el7_2.3.x86_64", "7Server-optional-7.2.AUS:dnsmasq-utils-0:2.66-14.el7_2.3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-25686" }, { "category": "external", "summary": "RHBZ#1890125", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890125" }, { "category": "external", "summary": "RHSB-2021-001", "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-001" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-25686", "url": "https://www.cve.org/CVERecord?id=CVE-2020-25686" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25686", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25686" }, { "category": "external", "summary": "https://www.jsof-tech.com/disclosures/dnspooq/", "url": "https://www.jsof-tech.com/disclosures/dnspooq/" } ], "release_date": "2021-01-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-01-25T14:29:59+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-7.2.AUS:dnsmasq-0:2.66-14.el7_2.3.src", "7Server-7.2.AUS:dnsmasq-0:2.66-14.el7_2.3.x86_64", "7Server-7.2.AUS:dnsmasq-debuginfo-0:2.66-14.el7_2.3.x86_64", "7Server-7.2.AUS:dnsmasq-utils-0:2.66-14.el7_2.3.x86_64", "7Server-optional-7.2.AUS:dnsmasq-0:2.66-14.el7_2.3.src", "7Server-optional-7.2.AUS:dnsmasq-0:2.66-14.el7_2.3.x86_64", "7Server-optional-7.2.AUS:dnsmasq-debuginfo-0:2.66-14.el7_2.3.x86_64", "7Server-optional-7.2.AUS:dnsmasq-utils-0:2.66-14.el7_2.3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0240" }, { "category": "workaround", "details": "The impact of this flaw can be reduced by disabling the dnsmasq cache by adding `--cache-size=0` when calling dnsmasq or by adding a line with `cache-size=0` to the dnsmasq configuration file (/etc/dnsmasq.conf by default). \n\nWhen using Red Hat Enterprise Linux 8.3 with libvirt through a virt:rhel module, use `virsh net-edit \u003cnetwork-name\u003e` and reference https://libvirt.org/formatnetwork.html#elementsNamespaces to add the suggested option `cache-size=0`. \n\nThere is no way to customize the dnsmasq configuration generated by libvirt, when using versions of Red Hat Enterprise Linux prior to version 8.3. If dnsmasq is being run through NetworkManager, create a new file in /etc/NetworkManager/dnsmasq.d/ and add `cache-size=0` to it.\n\nIn all cases, by disabling the cache, you may experience a performance loss in your environment due to all DNS queries being forwarded to the upstream servers. Please evaluate if the mitigation is appropriate for the system\u2019s environment before applying.", "product_ids": [ "7Server-7.2.AUS:dnsmasq-0:2.66-14.el7_2.3.src", "7Server-7.2.AUS:dnsmasq-0:2.66-14.el7_2.3.x86_64", "7Server-7.2.AUS:dnsmasq-debuginfo-0:2.66-14.el7_2.3.x86_64", "7Server-7.2.AUS:dnsmasq-utils-0:2.66-14.el7_2.3.x86_64", "7Server-optional-7.2.AUS:dnsmasq-0:2.66-14.el7_2.3.src", "7Server-optional-7.2.AUS:dnsmasq-0:2.66-14.el7_2.3.x86_64", "7Server-optional-7.2.AUS:dnsmasq-debuginfo-0:2.66-14.el7_2.3.x86_64", "7Server-optional-7.2.AUS:dnsmasq-utils-0:2.66-14.el7_2.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N", "version": "3.1" }, "products": [ "7Server-7.2.AUS:dnsmasq-0:2.66-14.el7_2.3.src", "7Server-7.2.AUS:dnsmasq-0:2.66-14.el7_2.3.x86_64", "7Server-7.2.AUS:dnsmasq-debuginfo-0:2.66-14.el7_2.3.x86_64", "7Server-7.2.AUS:dnsmasq-utils-0:2.66-14.el7_2.3.x86_64", "7Server-optional-7.2.AUS:dnsmasq-0:2.66-14.el7_2.3.src", "7Server-optional-7.2.AUS:dnsmasq-0:2.66-14.el7_2.3.x86_64", "7Server-optional-7.2.AUS:dnsmasq-debuginfo-0:2.66-14.el7_2.3.x86_64", "7Server-optional-7.2.AUS:dnsmasq-utils-0:2.66-14.el7_2.3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "dnsmasq: multiple queries forwarded for the same name makes forging replies easier for an off-path attacker" } ] }
rhsa-2021_0155
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for dnsmasq is now available for Red Hat Enterprise Linux 7.6 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The dnsmasq packages contain Dnsmasq, a lightweight DNS (Domain Name Server) forwarder and DHCP (Dynamic Host Configuration Protocol) server.\n\nSecurity Fix(es):\n\n* dnsmasq: loose address/port check in reply_query() makes forging replies easier for an off-path attacker (CVE-2020-25684)\n\n* dnsmasq: loose query name check in reply_query() makes forging replies easier for an off-path attacker (CVE-2020-25685)\n\n* dnsmasq: multiple queries forwarded for the same name makes forging replies easier for an off-path attacker (CVE-2020-25686)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:0155", "url": "https://access.redhat.com/errata/RHSA-2021:0155" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-001", "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-001" }, { "category": "external", "summary": "1889686", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889686" }, { "category": "external", "summary": "1889688", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889688" }, { "category": "external", "summary": "1890125", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890125" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_0155.json" } ], "title": "Red Hat Security Advisory: dnsmasq security update", "tracking": { "current_release_date": "2024-11-15T07:28:04+00:00", "generator": { "date": "2024-11-15T07:28:04+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2021:0155", "initial_release_date": "2021-01-19T17:41:47+00:00", "revision_history": [ { "date": "2021-01-19T17:41:47+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-01-19T17:41:47+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-15T07:28:04+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)", "product": { "name": "Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)", "product_id": "7ComputeNode-7.6.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:7.6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)", "product": { "name": "Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)", "product_id": "7ComputeNode-optional-7.6.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:7.6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server EUS (v. 7.6)", "product": { "name": "Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-7.6.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:7.6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional EUS (v. 7.6)", "product": { "name": "Red Hat Enterprise Linux Server Optional EUS (v. 7.6)", "product_id": "7Server-optional-7.6.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:7.6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product": { "name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.6-EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:7.6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.6-EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:7.6::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "dnsmasq-utils-0:2.76-7.el7_6.2.x86_64", "product": { "name": "dnsmasq-utils-0:2.76-7.el7_6.2.x86_64", "product_id": "dnsmasq-utils-0:2.76-7.el7_6.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-utils@2.76-7.el7_6.2?arch=x86_64" } } }, { "category": "product_version", "name": "dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64", "product": { "name": "dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64", "product_id": "dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-debuginfo@2.76-7.el7_6.2?arch=x86_64" } } }, { "category": "product_version", "name": "dnsmasq-0:2.76-7.el7_6.2.x86_64", "product": { "name": "dnsmasq-0:2.76-7.el7_6.2.x86_64", "product_id": "dnsmasq-0:2.76-7.el7_6.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq@2.76-7.el7_6.2?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le", "product": { "name": "dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le", "product_id": "dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-utils@2.76-7.el7_6.2?arch=ppc64le" } } }, { "category": "product_version", "name": "dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le", "product": { "name": "dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le", "product_id": "dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-debuginfo@2.76-7.el7_6.2?arch=ppc64le" } } }, { "category": "product_version", "name": "dnsmasq-0:2.76-7.el7_6.2.ppc64le", "product": { "name": "dnsmasq-0:2.76-7.el7_6.2.ppc64le", "product_id": "dnsmasq-0:2.76-7.el7_6.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq@2.76-7.el7_6.2?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "dnsmasq-utils-0:2.76-7.el7_6.2.ppc64", "product": { "name": "dnsmasq-utils-0:2.76-7.el7_6.2.ppc64", "product_id": "dnsmasq-utils-0:2.76-7.el7_6.2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-utils@2.76-7.el7_6.2?arch=ppc64" } } }, { "category": "product_version", "name": "dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64", "product": { "name": "dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64", "product_id": "dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-debuginfo@2.76-7.el7_6.2?arch=ppc64" } } }, { "category": "product_version", "name": "dnsmasq-0:2.76-7.el7_6.2.ppc64", "product": { "name": "dnsmasq-0:2.76-7.el7_6.2.ppc64", "product_id": "dnsmasq-0:2.76-7.el7_6.2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq@2.76-7.el7_6.2?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "dnsmasq-utils-0:2.76-7.el7_6.2.s390x", "product": { "name": "dnsmasq-utils-0:2.76-7.el7_6.2.s390x", "product_id": "dnsmasq-utils-0:2.76-7.el7_6.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-utils@2.76-7.el7_6.2?arch=s390x" } } }, { "category": "product_version", "name": "dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x", "product": { "name": "dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x", "product_id": "dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-debuginfo@2.76-7.el7_6.2?arch=s390x" } } }, { "category": "product_version", "name": "dnsmasq-0:2.76-7.el7_6.2.s390x", "product": { "name": "dnsmasq-0:2.76-7.el7_6.2.s390x", "product_id": "dnsmasq-0:2.76-7.el7_6.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq@2.76-7.el7_6.2?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "dnsmasq-0:2.76-7.el7_6.2.src", "product": { "name": "dnsmasq-0:2.76-7.el7_6.2.src", "product_id": "dnsmasq-0:2.76-7.el7_6.2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq@2.76-7.el7_6.2?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-7.el7_6.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)", "product_id": "7ComputeNode-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64" }, "product_reference": "dnsmasq-0:2.76-7.el7_6.2.ppc64", "relates_to_product_reference": "7ComputeNode-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-7.el7_6.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)", "product_id": "7ComputeNode-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64le" }, "product_reference": "dnsmasq-0:2.76-7.el7_6.2.ppc64le", "relates_to_product_reference": "7ComputeNode-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-7.el7_6.2.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)", "product_id": "7ComputeNode-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.s390x" }, "product_reference": "dnsmasq-0:2.76-7.el7_6.2.s390x", "relates_to_product_reference": "7ComputeNode-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-7.el7_6.2.src as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)", "product_id": "7ComputeNode-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.src" }, "product_reference": "dnsmasq-0:2.76-7.el7_6.2.src", "relates_to_product_reference": "7ComputeNode-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-7.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)", "product_id": "7ComputeNode-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.x86_64" }, "product_reference": "dnsmasq-0:2.76-7.el7_6.2.x86_64", "relates_to_product_reference": "7ComputeNode-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)", "product_id": "7ComputeNode-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64" }, "product_reference": "dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64", "relates_to_product_reference": "7ComputeNode-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)", "product_id": "7ComputeNode-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le" }, "product_reference": "dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le", "relates_to_product_reference": "7ComputeNode-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)", "product_id": "7ComputeNode-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x" }, "product_reference": "dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x", "relates_to_product_reference": "7ComputeNode-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)", "product_id": "7ComputeNode-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64" }, "product_reference": "dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64", "relates_to_product_reference": "7ComputeNode-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-7.el7_6.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)", "product_id": "7ComputeNode-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64" }, "product_reference": "dnsmasq-utils-0:2.76-7.el7_6.2.ppc64", "relates_to_product_reference": "7ComputeNode-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)", "product_id": "7ComputeNode-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le" }, "product_reference": "dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le", "relates_to_product_reference": "7ComputeNode-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-7.el7_6.2.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)", "product_id": "7ComputeNode-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.s390x" }, "product_reference": "dnsmasq-utils-0:2.76-7.el7_6.2.s390x", "relates_to_product_reference": "7ComputeNode-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-7.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)", "product_id": "7ComputeNode-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.x86_64" }, "product_reference": "dnsmasq-utils-0:2.76-7.el7_6.2.x86_64", "relates_to_product_reference": "7ComputeNode-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-7.el7_6.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)", "product_id": "7ComputeNode-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64" }, "product_reference": "dnsmasq-0:2.76-7.el7_6.2.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-7.el7_6.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)", "product_id": "7ComputeNode-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64le" }, "product_reference": "dnsmasq-0:2.76-7.el7_6.2.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-7.el7_6.2.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)", "product_id": "7ComputeNode-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.s390x" }, "product_reference": "dnsmasq-0:2.76-7.el7_6.2.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-7.el7_6.2.src as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)", "product_id": "7ComputeNode-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.src" }, "product_reference": "dnsmasq-0:2.76-7.el7_6.2.src", "relates_to_product_reference": "7ComputeNode-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-7.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)", "product_id": "7ComputeNode-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.x86_64" }, "product_reference": "dnsmasq-0:2.76-7.el7_6.2.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)", "product_id": "7ComputeNode-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64" }, "product_reference": "dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)", "product_id": "7ComputeNode-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le" }, "product_reference": "dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)", "product_id": "7ComputeNode-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x" }, "product_reference": "dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)", "product_id": "7ComputeNode-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64" }, "product_reference": "dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-7.el7_6.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)", "product_id": "7ComputeNode-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64" }, "product_reference": "dnsmasq-utils-0:2.76-7.el7_6.2.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)", "product_id": "7ComputeNode-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le" }, "product_reference": "dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-7.el7_6.2.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)", "product_id": "7ComputeNode-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.s390x" }, "product_reference": "dnsmasq-utils-0:2.76-7.el7_6.2.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-7.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)", "product_id": "7ComputeNode-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.x86_64" }, "product_reference": "dnsmasq-utils-0:2.76-7.el7_6.2.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-7.el7_6.2.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64" }, "product_reference": "dnsmasq-0:2.76-7.el7_6.2.ppc64", "relates_to_product_reference": "7Server-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-7.el7_6.2.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64le" }, "product_reference": "dnsmasq-0:2.76-7.el7_6.2.ppc64le", "relates_to_product_reference": "7Server-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-7.el7_6.2.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.s390x" }, "product_reference": "dnsmasq-0:2.76-7.el7_6.2.s390x", "relates_to_product_reference": "7Server-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-7.el7_6.2.src as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.src" }, "product_reference": "dnsmasq-0:2.76-7.el7_6.2.src", "relates_to_product_reference": "7Server-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-7.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.x86_64" }, "product_reference": "dnsmasq-0:2.76-7.el7_6.2.x86_64", "relates_to_product_reference": "7Server-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64" }, "product_reference": "dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64", "relates_to_product_reference": "7Server-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le" }, "product_reference": "dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le", "relates_to_product_reference": "7Server-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x" }, "product_reference": "dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x", "relates_to_product_reference": "7Server-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64" }, "product_reference": "dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64", "relates_to_product_reference": "7Server-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-7.el7_6.2.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64" }, "product_reference": "dnsmasq-utils-0:2.76-7.el7_6.2.ppc64", "relates_to_product_reference": "7Server-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le" }, "product_reference": "dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le", "relates_to_product_reference": "7Server-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-7.el7_6.2.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.s390x" }, "product_reference": "dnsmasq-utils-0:2.76-7.el7_6.2.s390x", "relates_to_product_reference": "7Server-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-7.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.x86_64" }, "product_reference": "dnsmasq-utils-0:2.76-7.el7_6.2.x86_64", "relates_to_product_reference": "7Server-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-7.el7_6.2.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64" }, "product_reference": "dnsmasq-0:2.76-7.el7_6.2.ppc64", "relates_to_product_reference": "7Server-Alt-7.6-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-7.el7_6.2.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64le" }, "product_reference": "dnsmasq-0:2.76-7.el7_6.2.ppc64le", "relates_to_product_reference": "7Server-Alt-7.6-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-7.el7_6.2.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.s390x" }, "product_reference": "dnsmasq-0:2.76-7.el7_6.2.s390x", "relates_to_product_reference": "7Server-Alt-7.6-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-7.el7_6.2.src as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.src" }, "product_reference": "dnsmasq-0:2.76-7.el7_6.2.src", "relates_to_product_reference": "7Server-Alt-7.6-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-7.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.x86_64" }, "product_reference": "dnsmasq-0:2.76-7.el7_6.2.x86_64", "relates_to_product_reference": "7Server-Alt-7.6-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64" }, "product_reference": "dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64", "relates_to_product_reference": "7Server-Alt-7.6-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le" }, "product_reference": "dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le", "relates_to_product_reference": "7Server-Alt-7.6-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x" }, "product_reference": "dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x", "relates_to_product_reference": "7Server-Alt-7.6-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64" }, "product_reference": "dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64", "relates_to_product_reference": "7Server-Alt-7.6-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-7.el7_6.2.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64" }, "product_reference": "dnsmasq-utils-0:2.76-7.el7_6.2.ppc64", "relates_to_product_reference": "7Server-Alt-7.6-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le" }, "product_reference": "dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le", "relates_to_product_reference": "7Server-Alt-7.6-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-7.el7_6.2.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.s390x" }, "product_reference": "dnsmasq-utils-0:2.76-7.el7_6.2.s390x", "relates_to_product_reference": "7Server-Alt-7.6-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-7.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.x86_64" }, "product_reference": "dnsmasq-utils-0:2.76-7.el7_6.2.x86_64", "relates_to_product_reference": "7Server-Alt-7.6-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-7.el7_6.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)", "product_id": "7Server-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64" }, "product_reference": "dnsmasq-0:2.76-7.el7_6.2.ppc64", "relates_to_product_reference": "7Server-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-7.el7_6.2.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)", "product_id": "7Server-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64le" }, "product_reference": "dnsmasq-0:2.76-7.el7_6.2.ppc64le", "relates_to_product_reference": "7Server-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-7.el7_6.2.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)", "product_id": "7Server-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.s390x" }, "product_reference": "dnsmasq-0:2.76-7.el7_6.2.s390x", "relates_to_product_reference": "7Server-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-7.el7_6.2.src as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)", "product_id": "7Server-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.src" }, "product_reference": "dnsmasq-0:2.76-7.el7_6.2.src", "relates_to_product_reference": "7Server-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-7.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)", "product_id": "7Server-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.x86_64" }, "product_reference": "dnsmasq-0:2.76-7.el7_6.2.x86_64", "relates_to_product_reference": "7Server-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)", "product_id": "7Server-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64" }, "product_reference": "dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64", "relates_to_product_reference": "7Server-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)", "product_id": "7Server-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le" }, "product_reference": "dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le", "relates_to_product_reference": "7Server-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)", "product_id": "7Server-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x" }, "product_reference": "dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x", "relates_to_product_reference": "7Server-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)", "product_id": "7Server-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64" }, "product_reference": "dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64", "relates_to_product_reference": "7Server-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-7.el7_6.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)", "product_id": "7Server-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64" }, "product_reference": "dnsmasq-utils-0:2.76-7.el7_6.2.ppc64", "relates_to_product_reference": "7Server-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)", "product_id": "7Server-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le" }, "product_reference": "dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le", "relates_to_product_reference": "7Server-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-7.el7_6.2.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)", "product_id": "7Server-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.s390x" }, "product_reference": "dnsmasq-utils-0:2.76-7.el7_6.2.s390x", "relates_to_product_reference": "7Server-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-7.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)", "product_id": "7Server-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.x86_64" }, "product_reference": "dnsmasq-utils-0:2.76-7.el7_6.2.x86_64", "relates_to_product_reference": "7Server-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-7.el7_6.2.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64" }, "product_reference": "dnsmasq-0:2.76-7.el7_6.2.ppc64", "relates_to_product_reference": "7Server-optional-Alt-7.6-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-7.el7_6.2.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64le" }, "product_reference": "dnsmasq-0:2.76-7.el7_6.2.ppc64le", "relates_to_product_reference": "7Server-optional-Alt-7.6-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-7.el7_6.2.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.s390x" }, "product_reference": "dnsmasq-0:2.76-7.el7_6.2.s390x", "relates_to_product_reference": "7Server-optional-Alt-7.6-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-7.el7_6.2.src as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.src" }, "product_reference": "dnsmasq-0:2.76-7.el7_6.2.src", "relates_to_product_reference": "7Server-optional-Alt-7.6-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-7.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.x86_64" }, "product_reference": "dnsmasq-0:2.76-7.el7_6.2.x86_64", "relates_to_product_reference": "7Server-optional-Alt-7.6-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64" }, "product_reference": "dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64", "relates_to_product_reference": "7Server-optional-Alt-7.6-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le" }, "product_reference": "dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le", "relates_to_product_reference": "7Server-optional-Alt-7.6-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x" }, "product_reference": "dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x", "relates_to_product_reference": "7Server-optional-Alt-7.6-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64" }, "product_reference": "dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64", "relates_to_product_reference": "7Server-optional-Alt-7.6-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-7.el7_6.2.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64" }, "product_reference": "dnsmasq-utils-0:2.76-7.el7_6.2.ppc64", "relates_to_product_reference": "7Server-optional-Alt-7.6-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le" }, "product_reference": "dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le", "relates_to_product_reference": "7Server-optional-Alt-7.6-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-7.el7_6.2.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.s390x" }, "product_reference": "dnsmasq-utils-0:2.76-7.el7_6.2.s390x", "relates_to_product_reference": "7Server-optional-Alt-7.6-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-7.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.x86_64" }, "product_reference": "dnsmasq-utils-0:2.76-7.el7_6.2.x86_64", "relates_to_product_reference": "7Server-optional-Alt-7.6-EUS" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Moshe Kol", "Shlomi Oberman" ], "organization": "JSOF" } ], "cve": "CVE-2020-25684", "cwe": { "id": "CWE-358", "name": "Improperly Implemented Security Check for Standard" }, "discovery_date": "2020-09-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1889686" } ], "notes": [ { "category": "description", "text": "A flaw was found in dnsmasq. When getting a reply from a forwarded query, dnsmasq checks in the forward.c:reply_query() if the reply destination address/port is used by the pending forwarded queries. However, it does not use the address/port to retrieve the exact forwarded query, substantially reducing the number of attempts an attacker on the network would have to perform to forge a reply and get it accepted by dnsmasq. This issue contrasts with RFC5452, which specifies a query\u0027s attributes that all must be used to match a reply. This flaw allows an attacker to perform a DNS Cache Poisoning attack. If chained with CVE-2020-25685 or CVE-2020-25686, the attack complexity of a successful attack is reduced. The highest threat from this vulnerability is to data integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "dnsmasq: loose address/port check in reply_query() makes forging replies easier for an off-path attacker", "title": "Vulnerability summary" }, { "category": "other", "text": "Dnsmasq may be run by libvirt and/or NetworkManager. libvirt uses dnsmasq by default to provide DNS service to its guests. NetworkManager may be configured to use dnsmasq to provide DNS service to the system, if a line `dns=dnsmasq` is present in the `[main]` section of the configuration file /etc/NetworkManager/NetworkManager.conf.\n\nIn Red Hat OpenStack Platform (RHOSP) and Red Hat Virtualization (RHV), the dnsmasq package is provided by the underlying Red Hat Enterprise Linux (RHEL) product. RHOSP and RHV are therefore indirectly affected, so please ensure that the underlying RHEL dnsmasq package is updated.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7ComputeNode-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64", "7ComputeNode-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64le", "7ComputeNode-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.s390x", "7ComputeNode-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.src", "7ComputeNode-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.x86_64", "7ComputeNode-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64", "7ComputeNode-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le", "7ComputeNode-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x", "7ComputeNode-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64", "7ComputeNode-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64", "7ComputeNode-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le", "7ComputeNode-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.s390x", "7ComputeNode-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.x86_64", "7ComputeNode-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64", "7ComputeNode-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64le", "7ComputeNode-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.s390x", "7ComputeNode-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.src", "7ComputeNode-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.x86_64", "7ComputeNode-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64", "7ComputeNode-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le", "7ComputeNode-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x", "7ComputeNode-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64", "7ComputeNode-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64", "7ComputeNode-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le", "7ComputeNode-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.s390x", "7ComputeNode-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.x86_64", "7Server-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64", "7Server-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64le", "7Server-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.s390x", "7Server-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.src", "7Server-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.x86_64", "7Server-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64", "7Server-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le", "7Server-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x", "7Server-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64", "7Server-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64", "7Server-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le", "7Server-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.s390x", "7Server-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.x86_64", "7Server-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64", "7Server-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64le", "7Server-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.s390x", "7Server-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.src", "7Server-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.x86_64", "7Server-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64", "7Server-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le", "7Server-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x", "7Server-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64", "7Server-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64", "7Server-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le", "7Server-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.s390x", "7Server-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.x86_64", "7Server-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64", "7Server-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64le", "7Server-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.s390x", "7Server-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.src", "7Server-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.x86_64", "7Server-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64", "7Server-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le", "7Server-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x", "7Server-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64", "7Server-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64", "7Server-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le", "7Server-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.s390x", "7Server-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.x86_64", "7Server-optional-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64", "7Server-optional-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64le", "7Server-optional-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.s390x", "7Server-optional-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.src", "7Server-optional-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.x86_64", "7Server-optional-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64", "7Server-optional-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le", "7Server-optional-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x", "7Server-optional-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64", "7Server-optional-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64", "7Server-optional-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le", "7Server-optional-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.s390x", "7Server-optional-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-25684" }, { "category": "external", "summary": "RHBZ#1889686", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889686" }, { "category": "external", "summary": "RHSB-2021-001", "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-001" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-25684", "url": "https://www.cve.org/CVERecord?id=CVE-2020-25684" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25684", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25684" }, { "category": "external", "summary": "https://www.jsof-tech.com/disclosures/dnspooq/", "url": "https://www.jsof-tech.com/disclosures/dnspooq/" } ], "release_date": "2021-01-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-01-19T17:41:47+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7ComputeNode-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64", "7ComputeNode-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64le", "7ComputeNode-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.s390x", "7ComputeNode-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.src", "7ComputeNode-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.x86_64", "7ComputeNode-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64", "7ComputeNode-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le", "7ComputeNode-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x", "7ComputeNode-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64", "7ComputeNode-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64", "7ComputeNode-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le", "7ComputeNode-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.s390x", "7ComputeNode-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.x86_64", "7ComputeNode-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64", "7ComputeNode-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64le", "7ComputeNode-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.s390x", "7ComputeNode-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.src", "7ComputeNode-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.x86_64", "7ComputeNode-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64", "7ComputeNode-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le", "7ComputeNode-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x", "7ComputeNode-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64", "7ComputeNode-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64", "7ComputeNode-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le", "7ComputeNode-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.s390x", "7ComputeNode-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.x86_64", "7Server-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64", "7Server-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64le", "7Server-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.s390x", "7Server-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.src", "7Server-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.x86_64", "7Server-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64", "7Server-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le", "7Server-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x", "7Server-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64", "7Server-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64", "7Server-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le", "7Server-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.s390x", "7Server-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.x86_64", "7Server-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64", "7Server-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64le", "7Server-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.s390x", "7Server-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.src", "7Server-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.x86_64", "7Server-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64", "7Server-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le", "7Server-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x", "7Server-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64", "7Server-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64", "7Server-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le", "7Server-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.s390x", "7Server-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.x86_64", "7Server-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64", "7Server-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64le", "7Server-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.s390x", "7Server-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.src", "7Server-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.x86_64", "7Server-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64", "7Server-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le", "7Server-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x", "7Server-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64", "7Server-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64", "7Server-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le", "7Server-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.s390x", "7Server-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.x86_64", "7Server-optional-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64", "7Server-optional-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64le", "7Server-optional-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.s390x", "7Server-optional-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.src", "7Server-optional-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.x86_64", "7Server-optional-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64", "7Server-optional-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le", "7Server-optional-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x", "7Server-optional-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64", "7Server-optional-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64", "7Server-optional-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le", "7Server-optional-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.s390x", "7Server-optional-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0155" }, { "category": "workaround", "details": "The impact of this flaw can be reduced by disabling the dnsmasq cache by adding `--cache-size=0` when calling dnsmasq or by adding a line with `cache-size=0` to the dnsmasq configuration file (/etc/dnsmasq.conf by default).\n\nWhen using Red Hat Enterprise Linux 8.3 with libvirt through a virt:rhel module, use `virsh net-edit \u003cnetwork-name\u003e` and reference https://libvirt.org/formatnetwork.html#elementsNamespaces to add the suggested option `cache-size=0`. \n\nThere is no way to customize the dnsmasq configuration generated by libvirt, when using versions of Red Hat Enterprise Linux prior to version 8.3. If dnsmasq is being run through NetworkManager, create a new file in /etc/NetworkManager/dnsmasq.d/ and add `cache-size=0` to it.\n\nIn all cases, by disabling the cache, you may experience a performance loss in your environment due to all DNS queries being forwarded to the upstream servers. Please evaluate if the mitigation is appropriate for the system\u2019s environment before applying.", "product_ids": [ "7ComputeNode-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64", "7ComputeNode-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64le", "7ComputeNode-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.s390x", "7ComputeNode-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.src", "7ComputeNode-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.x86_64", "7ComputeNode-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64", "7ComputeNode-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le", "7ComputeNode-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x", "7ComputeNode-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64", "7ComputeNode-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64", "7ComputeNode-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le", "7ComputeNode-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.s390x", "7ComputeNode-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.x86_64", "7ComputeNode-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64", "7ComputeNode-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64le", "7ComputeNode-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.s390x", "7ComputeNode-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.src", "7ComputeNode-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.x86_64", "7ComputeNode-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64", "7ComputeNode-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le", "7ComputeNode-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x", "7ComputeNode-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64", "7ComputeNode-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64", "7ComputeNode-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le", "7ComputeNode-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.s390x", "7ComputeNode-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.x86_64", "7Server-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64", "7Server-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64le", "7Server-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.s390x", "7Server-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.src", "7Server-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.x86_64", "7Server-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64", "7Server-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le", "7Server-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x", "7Server-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64", "7Server-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64", "7Server-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le", "7Server-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.s390x", "7Server-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.x86_64", "7Server-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64", "7Server-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64le", "7Server-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.s390x", "7Server-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.src", "7Server-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.x86_64", "7Server-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64", "7Server-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le", "7Server-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x", "7Server-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64", "7Server-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64", "7Server-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le", "7Server-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.s390x", "7Server-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.x86_64", "7Server-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64", "7Server-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64le", "7Server-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.s390x", "7Server-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.src", "7Server-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.x86_64", "7Server-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64", "7Server-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le", "7Server-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x", "7Server-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64", "7Server-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64", "7Server-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le", "7Server-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.s390x", "7Server-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.x86_64", "7Server-optional-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64", "7Server-optional-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64le", "7Server-optional-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.s390x", "7Server-optional-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.src", "7Server-optional-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.x86_64", "7Server-optional-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64", "7Server-optional-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le", "7Server-optional-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x", "7Server-optional-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64", "7Server-optional-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64", "7Server-optional-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le", "7Server-optional-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.s390x", "7Server-optional-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N", "version": "3.1" }, "products": [ "7ComputeNode-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64", "7ComputeNode-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64le", "7ComputeNode-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.s390x", "7ComputeNode-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.src", "7ComputeNode-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.x86_64", "7ComputeNode-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64", "7ComputeNode-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le", "7ComputeNode-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x", "7ComputeNode-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64", "7ComputeNode-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64", "7ComputeNode-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le", "7ComputeNode-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.s390x", "7ComputeNode-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.x86_64", "7ComputeNode-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64", "7ComputeNode-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64le", "7ComputeNode-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.s390x", "7ComputeNode-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.src", "7ComputeNode-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.x86_64", "7ComputeNode-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64", "7ComputeNode-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le", "7ComputeNode-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x", "7ComputeNode-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64", "7ComputeNode-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64", "7ComputeNode-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le", "7ComputeNode-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.s390x", "7ComputeNode-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.x86_64", "7Server-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64", "7Server-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64le", "7Server-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.s390x", "7Server-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.src", "7Server-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.x86_64", "7Server-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64", "7Server-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le", "7Server-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x", "7Server-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64", "7Server-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64", "7Server-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le", "7Server-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.s390x", "7Server-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.x86_64", "7Server-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64", "7Server-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64le", "7Server-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.s390x", "7Server-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.src", "7Server-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.x86_64", "7Server-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64", "7Server-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le", "7Server-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x", "7Server-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64", "7Server-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64", "7Server-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le", "7Server-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.s390x", "7Server-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.x86_64", "7Server-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64", "7Server-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64le", "7Server-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.s390x", "7Server-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.src", "7Server-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.x86_64", "7Server-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64", "7Server-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le", "7Server-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x", "7Server-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64", "7Server-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64", "7Server-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le", "7Server-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.s390x", "7Server-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.x86_64", "7Server-optional-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64", "7Server-optional-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64le", "7Server-optional-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.s390x", "7Server-optional-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.src", "7Server-optional-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.x86_64", "7Server-optional-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64", "7Server-optional-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le", "7Server-optional-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x", "7Server-optional-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64", "7Server-optional-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64", "7Server-optional-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le", "7Server-optional-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.s390x", "7Server-optional-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "dnsmasq: loose address/port check in reply_query() makes forging replies easier for an off-path attacker" }, { "acknowledgments": [ { "names": [ "Moshe Kol", "Shlomi Oberman" ], "organization": "JSOF" } ], "cve": "CVE-2020-25685", "cwe": { "id": "CWE-326", "name": "Inadequate Encryption Strength" }, "discovery_date": "2020-09-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1889688" } ], "notes": [ { "category": "description", "text": "A flaw was found in dnsmasq. When getting a reply from a forwarded query, dnsmasq checks in forward.c:reply_query(), which is the forwarded query that matches the reply, by only using a weak hash of the query name. Due to the weak hash (CRC32 when dnsmasq is compiled without DNSSEC, SHA-1 when it is) this flaw allows an off-path attacker to find several different domains all having the same hash, substantially reducing the number of attempts they would have to perform to forge a reply and get it accepted by dnsmasq. This is in contrast with RFC5452, which specifies that the query name is one of the attributes of a query that must be used to match a reply. This flaw could be abused to perform a DNS Cache Poisoning attack. If chained with CVE-2020-25684 the attack complexity of a successful attack is reduced. The highest threat from this vulnerability is to data integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "dnsmasq: loose query name check in reply_query() makes forging replies easier for an off-path attacker", "title": "Vulnerability summary" }, { "category": "other", "text": "Dnsmasq may be run by libvirt and/or NetworkManager. libvirt uses dnsmasq by default to provide DNS service to its guests. NetworkManager may be configured to use dnsmasq to provide DNS service to the system, if a line `dns=dnsmasq` is present in the `[main]` section of the configuration file /etc/NetworkManager/NetworkManager.conf.\n\nIn Red Hat OpenStack Platform (RHOSP) and Red Hat Virtualization (RHV), the dnsmasq package is provided by the underlying Red Hat Enterprise Linux (RHEL) product. RHOSP and RHV are therefore indirectly affected, so please ensure that the underlying RHEL dnsmasq package is updated.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7ComputeNode-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64", "7ComputeNode-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64le", "7ComputeNode-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.s390x", "7ComputeNode-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.src", "7ComputeNode-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.x86_64", "7ComputeNode-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64", "7ComputeNode-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le", "7ComputeNode-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x", "7ComputeNode-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64", "7ComputeNode-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64", "7ComputeNode-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le", "7ComputeNode-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.s390x", "7ComputeNode-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.x86_64", "7ComputeNode-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64", "7ComputeNode-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64le", "7ComputeNode-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.s390x", "7ComputeNode-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.src", "7ComputeNode-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.x86_64", "7ComputeNode-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64", "7ComputeNode-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le", "7ComputeNode-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x", "7ComputeNode-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64", "7ComputeNode-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64", "7ComputeNode-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le", "7ComputeNode-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.s390x", "7ComputeNode-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.x86_64", "7Server-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64", "7Server-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64le", "7Server-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.s390x", "7Server-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.src", "7Server-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.x86_64", "7Server-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64", "7Server-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le", "7Server-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x", "7Server-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64", "7Server-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64", "7Server-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le", "7Server-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.s390x", "7Server-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.x86_64", "7Server-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64", "7Server-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64le", "7Server-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.s390x", "7Server-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.src", "7Server-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.x86_64", "7Server-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64", "7Server-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le", "7Server-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x", "7Server-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64", "7Server-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64", "7Server-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le", "7Server-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.s390x", "7Server-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.x86_64", "7Server-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64", "7Server-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64le", "7Server-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.s390x", "7Server-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.src", "7Server-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.x86_64", "7Server-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64", "7Server-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le", "7Server-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x", "7Server-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64", "7Server-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64", "7Server-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le", "7Server-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.s390x", "7Server-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.x86_64", "7Server-optional-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64", "7Server-optional-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64le", "7Server-optional-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.s390x", "7Server-optional-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.src", "7Server-optional-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.x86_64", "7Server-optional-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64", "7Server-optional-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le", "7Server-optional-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x", "7Server-optional-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64", "7Server-optional-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64", "7Server-optional-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le", "7Server-optional-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.s390x", "7Server-optional-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-25685" }, { "category": "external", "summary": "RHBZ#1889688", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889688" }, { "category": "external", "summary": "RHSB-2021-001", "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-001" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-25685", "url": "https://www.cve.org/CVERecord?id=CVE-2020-25685" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25685", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25685" }, { "category": "external", "summary": "https://www.jsof-tech.com/disclosures/dnspooq/", "url": "https://www.jsof-tech.com/disclosures/dnspooq/" } ], "release_date": "2021-01-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-01-19T17:41:47+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7ComputeNode-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64", "7ComputeNode-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64le", "7ComputeNode-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.s390x", "7ComputeNode-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.src", "7ComputeNode-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.x86_64", "7ComputeNode-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64", "7ComputeNode-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le", "7ComputeNode-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x", "7ComputeNode-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64", "7ComputeNode-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64", "7ComputeNode-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le", "7ComputeNode-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.s390x", "7ComputeNode-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.x86_64", "7ComputeNode-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64", "7ComputeNode-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64le", "7ComputeNode-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.s390x", "7ComputeNode-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.src", "7ComputeNode-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.x86_64", "7ComputeNode-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64", "7ComputeNode-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le", "7ComputeNode-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x", "7ComputeNode-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64", "7ComputeNode-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64", "7ComputeNode-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le", "7ComputeNode-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.s390x", "7ComputeNode-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.x86_64", "7Server-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64", "7Server-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64le", "7Server-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.s390x", "7Server-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.src", "7Server-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.x86_64", "7Server-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64", "7Server-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le", "7Server-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x", "7Server-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64", "7Server-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64", "7Server-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le", "7Server-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.s390x", "7Server-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.x86_64", "7Server-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64", "7Server-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64le", "7Server-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.s390x", "7Server-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.src", "7Server-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.x86_64", "7Server-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64", "7Server-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le", "7Server-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x", "7Server-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64", "7Server-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64", "7Server-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le", "7Server-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.s390x", "7Server-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.x86_64", "7Server-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64", "7Server-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64le", "7Server-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.s390x", "7Server-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.src", "7Server-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.x86_64", "7Server-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64", "7Server-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le", "7Server-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x", "7Server-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64", "7Server-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64", "7Server-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le", "7Server-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.s390x", "7Server-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.x86_64", "7Server-optional-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64", "7Server-optional-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64le", "7Server-optional-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.s390x", "7Server-optional-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.src", "7Server-optional-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.x86_64", "7Server-optional-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64", "7Server-optional-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le", "7Server-optional-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x", "7Server-optional-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64", "7Server-optional-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64", "7Server-optional-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le", "7Server-optional-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.s390x", "7Server-optional-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0155" }, { "category": "workaround", "details": "The impact of this flaw can be reduced by disabling the dnsmasq cache by adding `--cache-size=0` when calling dnsmasq or by adding a line with `cache-size=0` to the dnsmasq configuration file (/etc/dnsmasq.conf by default). \n\nWhen using Red Hat Enterprise Linux 8.3 with libvirt through a virt:rhel module, use `virsh net-edit \u003cnetwork-name\u003e` and reference https://libvirt.org/formatnetwork.html#elementsNamespaces to add the suggested option `cache-size=0`. \n\nThere is no way to customize the dnsmasq configuration generated by libvirt, when using versions of Red Hat Enterprise Linux prior to version 8.3. If dnsmasq is being run through NetworkManager, create a new file in /etc/NetworkManager/dnsmasq.d/ and add `cache-size=0` to it.\n\nIn all cases, by disabling the cache, you may experience a performance loss in your environment due to all DNS queries being forwarded to the upstream servers. Please evaluate if the mitigation is appropriate for the system\u2019s environment before applying.", "product_ids": [ "7ComputeNode-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64", "7ComputeNode-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64le", "7ComputeNode-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.s390x", "7ComputeNode-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.src", "7ComputeNode-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.x86_64", "7ComputeNode-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64", "7ComputeNode-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le", "7ComputeNode-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x", "7ComputeNode-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64", "7ComputeNode-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64", "7ComputeNode-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le", "7ComputeNode-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.s390x", "7ComputeNode-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.x86_64", "7ComputeNode-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64", "7ComputeNode-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64le", "7ComputeNode-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.s390x", "7ComputeNode-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.src", "7ComputeNode-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.x86_64", "7ComputeNode-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64", "7ComputeNode-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le", "7ComputeNode-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x", "7ComputeNode-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64", "7ComputeNode-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64", "7ComputeNode-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le", "7ComputeNode-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.s390x", "7ComputeNode-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.x86_64", "7Server-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64", "7Server-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64le", "7Server-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.s390x", "7Server-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.src", "7Server-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.x86_64", "7Server-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64", "7Server-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le", "7Server-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x", "7Server-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64", "7Server-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64", "7Server-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le", "7Server-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.s390x", "7Server-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.x86_64", "7Server-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64", "7Server-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64le", "7Server-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.s390x", "7Server-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.src", "7Server-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.x86_64", "7Server-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64", "7Server-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le", "7Server-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x", "7Server-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64", "7Server-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64", "7Server-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le", "7Server-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.s390x", "7Server-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.x86_64", "7Server-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64", "7Server-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64le", "7Server-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.s390x", "7Server-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.src", "7Server-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.x86_64", "7Server-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64", "7Server-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le", "7Server-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x", "7Server-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64", "7Server-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64", "7Server-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le", "7Server-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.s390x", "7Server-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.x86_64", "7Server-optional-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64", "7Server-optional-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64le", "7Server-optional-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.s390x", "7Server-optional-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.src", "7Server-optional-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.x86_64", "7Server-optional-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64", "7Server-optional-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le", "7Server-optional-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x", "7Server-optional-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64", "7Server-optional-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64", "7Server-optional-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le", "7Server-optional-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.s390x", "7Server-optional-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N", "version": "3.1" }, "products": [ "7ComputeNode-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64", "7ComputeNode-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64le", "7ComputeNode-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.s390x", "7ComputeNode-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.src", "7ComputeNode-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.x86_64", "7ComputeNode-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64", "7ComputeNode-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le", "7ComputeNode-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x", "7ComputeNode-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64", "7ComputeNode-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64", "7ComputeNode-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le", "7ComputeNode-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.s390x", "7ComputeNode-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.x86_64", "7ComputeNode-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64", "7ComputeNode-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64le", "7ComputeNode-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.s390x", "7ComputeNode-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.src", "7ComputeNode-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.x86_64", "7ComputeNode-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64", "7ComputeNode-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le", "7ComputeNode-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x", "7ComputeNode-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64", "7ComputeNode-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64", "7ComputeNode-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le", "7ComputeNode-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.s390x", "7ComputeNode-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.x86_64", "7Server-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64", "7Server-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64le", "7Server-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.s390x", "7Server-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.src", "7Server-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.x86_64", "7Server-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64", "7Server-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le", "7Server-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x", "7Server-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64", "7Server-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64", "7Server-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le", "7Server-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.s390x", "7Server-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.x86_64", "7Server-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64", "7Server-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64le", "7Server-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.s390x", "7Server-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.src", "7Server-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.x86_64", "7Server-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64", "7Server-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le", "7Server-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x", "7Server-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64", "7Server-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64", "7Server-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le", "7Server-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.s390x", "7Server-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.x86_64", "7Server-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64", "7Server-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64le", "7Server-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.s390x", "7Server-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.src", "7Server-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.x86_64", "7Server-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64", "7Server-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le", "7Server-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x", "7Server-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64", "7Server-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64", "7Server-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le", "7Server-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.s390x", "7Server-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.x86_64", "7Server-optional-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64", "7Server-optional-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64le", "7Server-optional-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.s390x", "7Server-optional-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.src", "7Server-optional-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.x86_64", "7Server-optional-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64", "7Server-optional-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le", "7Server-optional-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x", "7Server-optional-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64", "7Server-optional-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64", "7Server-optional-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le", "7Server-optional-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.s390x", "7Server-optional-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "dnsmasq: loose query name check in reply_query() makes forging replies easier for an off-path attacker" }, { "acknowledgments": [ { "names": [ "Moshe Kol", "Shlomi Oberman" ], "organization": "JSOF" } ], "cve": "CVE-2020-25686", "cwe": { "id": "CWE-290", "name": "Authentication Bypass by Spoofing" }, "discovery_date": "2020-09-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1890125" } ], "notes": [ { "category": "description", "text": "A flaw was found in dnsmasq. When receiving a query, dnsmasq does not check for an existing pending request for the same name and forwards a new request. By default, a maximum of 150 pending queries can be sent to upstream servers, so there can be at most 150 queries for the same name. This flaw allows an off-path attacker on the network to substantially reduce the number of attempts that it would have to perform to forge a reply and have it accepted by dnsmasq. This issue is mentioned in the \"Birthday Attacks\" section of RFC5452. If chained with CVE-2020-25684, the attack complexity of a successful attack is reduced. The highest threat from this vulnerability is to data integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "dnsmasq: multiple queries forwarded for the same name makes forging replies easier for an off-path attacker", "title": "Vulnerability summary" }, { "category": "other", "text": "Dnsmasq may be run by libvirt and/or NetworkManager. libvirt uses dnsmasq by default to provide DNS service to its guests. NetworkManager may be configured to use dnsmasq to provide DNS service to the system, if a line `dns=dnsmasq` is present in the `[main]` section of the configuration file /etc/NetworkManager/NetworkManager.conf.\n\nIn Red Hat OpenStack Platform (RHOSP) and Red Hat Virtualization (RHV), the dnsmasq package is provided by the underlying Red Hat Enterprise Linux (RHEL) product. RHOSP and RHV are therefore indirectly affected, so please ensure that the underlying RHEL dnsmasq package is updated.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7ComputeNode-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64", "7ComputeNode-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64le", "7ComputeNode-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.s390x", "7ComputeNode-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.src", "7ComputeNode-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.x86_64", "7ComputeNode-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64", "7ComputeNode-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le", "7ComputeNode-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x", "7ComputeNode-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64", "7ComputeNode-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64", "7ComputeNode-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le", "7ComputeNode-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.s390x", "7ComputeNode-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.x86_64", "7ComputeNode-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64", "7ComputeNode-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64le", "7ComputeNode-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.s390x", "7ComputeNode-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.src", "7ComputeNode-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.x86_64", "7ComputeNode-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64", "7ComputeNode-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le", "7ComputeNode-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x", "7ComputeNode-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64", "7ComputeNode-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64", "7ComputeNode-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le", "7ComputeNode-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.s390x", "7ComputeNode-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.x86_64", "7Server-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64", "7Server-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64le", "7Server-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.s390x", "7Server-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.src", "7Server-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.x86_64", "7Server-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64", "7Server-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le", "7Server-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x", "7Server-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64", "7Server-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64", "7Server-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le", "7Server-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.s390x", "7Server-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.x86_64", "7Server-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64", "7Server-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64le", "7Server-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.s390x", "7Server-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.src", "7Server-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.x86_64", "7Server-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64", "7Server-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le", "7Server-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x", "7Server-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64", "7Server-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64", "7Server-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le", "7Server-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.s390x", "7Server-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.x86_64", "7Server-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64", "7Server-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64le", "7Server-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.s390x", "7Server-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.src", "7Server-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.x86_64", "7Server-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64", "7Server-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le", "7Server-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x", "7Server-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64", "7Server-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64", "7Server-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le", "7Server-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.s390x", "7Server-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.x86_64", "7Server-optional-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64", "7Server-optional-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64le", "7Server-optional-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.s390x", "7Server-optional-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.src", "7Server-optional-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.x86_64", "7Server-optional-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64", "7Server-optional-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le", "7Server-optional-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x", "7Server-optional-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64", "7Server-optional-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64", "7Server-optional-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le", "7Server-optional-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.s390x", "7Server-optional-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-25686" }, { "category": "external", "summary": "RHBZ#1890125", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890125" }, { "category": "external", "summary": "RHSB-2021-001", "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-001" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-25686", "url": "https://www.cve.org/CVERecord?id=CVE-2020-25686" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25686", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25686" }, { "category": "external", "summary": "https://www.jsof-tech.com/disclosures/dnspooq/", "url": "https://www.jsof-tech.com/disclosures/dnspooq/" } ], "release_date": "2021-01-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-01-19T17:41:47+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7ComputeNode-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64", "7ComputeNode-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64le", "7ComputeNode-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.s390x", "7ComputeNode-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.src", "7ComputeNode-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.x86_64", "7ComputeNode-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64", "7ComputeNode-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le", "7ComputeNode-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x", "7ComputeNode-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64", "7ComputeNode-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64", "7ComputeNode-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le", "7ComputeNode-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.s390x", "7ComputeNode-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.x86_64", "7ComputeNode-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64", "7ComputeNode-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64le", "7ComputeNode-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.s390x", "7ComputeNode-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.src", "7ComputeNode-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.x86_64", "7ComputeNode-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64", "7ComputeNode-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le", "7ComputeNode-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x", "7ComputeNode-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64", "7ComputeNode-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64", "7ComputeNode-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le", "7ComputeNode-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.s390x", "7ComputeNode-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.x86_64", "7Server-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64", "7Server-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64le", "7Server-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.s390x", "7Server-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.src", "7Server-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.x86_64", "7Server-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64", "7Server-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le", "7Server-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x", "7Server-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64", "7Server-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64", "7Server-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le", "7Server-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.s390x", "7Server-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.x86_64", "7Server-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64", "7Server-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64le", "7Server-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.s390x", "7Server-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.src", "7Server-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.x86_64", "7Server-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64", "7Server-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le", "7Server-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x", "7Server-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64", "7Server-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64", "7Server-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le", "7Server-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.s390x", "7Server-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.x86_64", "7Server-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64", "7Server-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64le", "7Server-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.s390x", "7Server-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.src", "7Server-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.x86_64", "7Server-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64", "7Server-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le", "7Server-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x", "7Server-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64", "7Server-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64", "7Server-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le", "7Server-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.s390x", "7Server-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.x86_64", "7Server-optional-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64", "7Server-optional-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64le", "7Server-optional-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.s390x", "7Server-optional-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.src", "7Server-optional-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.x86_64", "7Server-optional-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64", "7Server-optional-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le", "7Server-optional-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x", "7Server-optional-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64", "7Server-optional-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64", "7Server-optional-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le", "7Server-optional-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.s390x", "7Server-optional-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0155" }, { "category": "workaround", "details": "The impact of this flaw can be reduced by disabling the dnsmasq cache by adding `--cache-size=0` when calling dnsmasq or by adding a line with `cache-size=0` to the dnsmasq configuration file (/etc/dnsmasq.conf by default). \n\nWhen using Red Hat Enterprise Linux 8.3 with libvirt through a virt:rhel module, use `virsh net-edit \u003cnetwork-name\u003e` and reference https://libvirt.org/formatnetwork.html#elementsNamespaces to add the suggested option `cache-size=0`. \n\nThere is no way to customize the dnsmasq configuration generated by libvirt, when using versions of Red Hat Enterprise Linux prior to version 8.3. If dnsmasq is being run through NetworkManager, create a new file in /etc/NetworkManager/dnsmasq.d/ and add `cache-size=0` to it.\n\nIn all cases, by disabling the cache, you may experience a performance loss in your environment due to all DNS queries being forwarded to the upstream servers. Please evaluate if the mitigation is appropriate for the system\u2019s environment before applying.", "product_ids": [ "7ComputeNode-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64", "7ComputeNode-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64le", "7ComputeNode-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.s390x", "7ComputeNode-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.src", "7ComputeNode-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.x86_64", "7ComputeNode-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64", "7ComputeNode-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le", "7ComputeNode-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x", "7ComputeNode-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64", "7ComputeNode-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64", "7ComputeNode-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le", "7ComputeNode-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.s390x", "7ComputeNode-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.x86_64", "7ComputeNode-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64", "7ComputeNode-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64le", "7ComputeNode-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.s390x", "7ComputeNode-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.src", "7ComputeNode-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.x86_64", "7ComputeNode-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64", "7ComputeNode-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le", "7ComputeNode-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x", "7ComputeNode-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64", "7ComputeNode-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64", "7ComputeNode-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le", "7ComputeNode-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.s390x", "7ComputeNode-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.x86_64", "7Server-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64", "7Server-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64le", "7Server-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.s390x", "7Server-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.src", "7Server-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.x86_64", "7Server-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64", "7Server-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le", "7Server-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x", "7Server-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64", "7Server-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64", "7Server-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le", "7Server-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.s390x", "7Server-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.x86_64", "7Server-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64", "7Server-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64le", "7Server-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.s390x", "7Server-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.src", "7Server-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.x86_64", "7Server-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64", "7Server-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le", "7Server-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x", "7Server-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64", "7Server-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64", "7Server-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le", "7Server-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.s390x", "7Server-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.x86_64", "7Server-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64", "7Server-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64le", "7Server-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.s390x", "7Server-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.src", "7Server-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.x86_64", "7Server-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64", "7Server-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le", "7Server-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x", "7Server-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64", "7Server-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64", "7Server-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le", "7Server-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.s390x", "7Server-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.x86_64", "7Server-optional-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64", "7Server-optional-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64le", "7Server-optional-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.s390x", "7Server-optional-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.src", "7Server-optional-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.x86_64", "7Server-optional-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64", "7Server-optional-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le", "7Server-optional-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x", "7Server-optional-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64", "7Server-optional-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64", "7Server-optional-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le", "7Server-optional-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.s390x", "7Server-optional-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N", "version": "3.1" }, "products": [ "7ComputeNode-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64", "7ComputeNode-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64le", "7ComputeNode-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.s390x", "7ComputeNode-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.src", "7ComputeNode-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.x86_64", "7ComputeNode-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64", "7ComputeNode-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le", "7ComputeNode-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x", "7ComputeNode-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64", "7ComputeNode-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64", "7ComputeNode-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le", "7ComputeNode-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.s390x", "7ComputeNode-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.x86_64", "7ComputeNode-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64", "7ComputeNode-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64le", "7ComputeNode-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.s390x", "7ComputeNode-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.src", "7ComputeNode-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.x86_64", "7ComputeNode-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64", "7ComputeNode-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le", "7ComputeNode-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x", "7ComputeNode-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64", "7ComputeNode-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64", "7ComputeNode-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le", "7ComputeNode-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.s390x", "7ComputeNode-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.x86_64", "7Server-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64", "7Server-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64le", "7Server-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.s390x", "7Server-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.src", "7Server-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.x86_64", "7Server-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64", "7Server-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le", "7Server-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x", "7Server-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64", "7Server-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64", "7Server-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le", "7Server-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.s390x", "7Server-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.x86_64", "7Server-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64", "7Server-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64le", "7Server-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.s390x", "7Server-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.src", "7Server-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.x86_64", "7Server-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64", "7Server-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le", "7Server-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x", "7Server-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64", "7Server-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64", "7Server-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le", "7Server-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.s390x", "7Server-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.x86_64", "7Server-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64", "7Server-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64le", "7Server-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.s390x", "7Server-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.src", "7Server-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.x86_64", "7Server-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64", "7Server-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le", "7Server-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x", "7Server-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64", "7Server-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64", "7Server-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le", "7Server-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.s390x", "7Server-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.x86_64", "7Server-optional-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64", "7Server-optional-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64le", "7Server-optional-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.s390x", "7Server-optional-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.src", "7Server-optional-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.x86_64", "7Server-optional-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64", "7Server-optional-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le", "7Server-optional-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x", "7Server-optional-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64", "7Server-optional-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64", "7Server-optional-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le", "7Server-optional-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.s390x", "7Server-optional-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "dnsmasq: multiple queries forwarded for the same name makes forging replies easier for an off-path attacker" } ] }
rhsa-2021_0150
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for dnsmasq is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The dnsmasq packages contain Dnsmasq, a lightweight DNS (Domain Name Server) forwarder and DHCP (Dynamic Host Configuration Protocol) server.\n\nSecurity Fix(es):\n\n* dnsmasq: heap-based buffer overflow in sort_rrset() when DNSSEC is enabled (CVE-2020-25681)\n\n* dnsmasq: buffer overflow in extract_name() due to missing length check when DNSSEC is enabled (CVE-2020-25682)\n\n* dnsmasq: heap-based buffer overflow with large memcpy in get_rdata() when DNSSEC is enabled (CVE-2020-25683)\n\n* dnsmasq: loose address/port check in reply_query() makes forging replies easier for an off-path attacker (CVE-2020-25684)\n\n* dnsmasq: loose query name check in reply_query() makes forging replies easier for an off-path attacker (CVE-2020-25685)\n\n* dnsmasq: multiple queries forwarded for the same name makes forging replies easier for an off-path attacker (CVE-2020-25686)\n\n* dnsmasq: heap-based buffer overflow with large memcpy in sort_rrset() when DNSSEC is enabled (CVE-2020-25687)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:0150", "url": "https://access.redhat.com/errata/RHSA-2021:0150" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-001", "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-001" }, { "category": "external", "summary": "1881875", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1881875" }, { "category": "external", "summary": "1882014", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1882014" }, { "category": "external", "summary": "1882018", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1882018" }, { "category": "external", "summary": "1889686", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889686" }, { "category": "external", "summary": "1889688", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889688" }, { "category": "external", "summary": "1890125", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890125" }, { "category": "external", "summary": "1891568", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1891568" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_0150.json" } ], "title": "Red Hat Security Advisory: dnsmasq security update", "tracking": { "current_release_date": "2024-11-05T23:12:31+00:00", "generator": { "date": "2024-11-05T23:12:31+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2021:0150", "initial_release_date": "2021-01-19T15:06:28+00:00", "revision_history": [ { "date": "2021-01-19T15:06:28+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-01-19T15:06:28+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-05T23:12:31+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "dnsmasq-0:2.79-13.el8_3.1.src", "product": { "name": "dnsmasq-0:2.79-13.el8_3.1.src", "product_id": "dnsmasq-0:2.79-13.el8_3.1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq@2.79-13.el8_3.1?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "dnsmasq-0:2.79-13.el8_3.1.aarch64", "product": { "name": "dnsmasq-0:2.79-13.el8_3.1.aarch64", "product_id": "dnsmasq-0:2.79-13.el8_3.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq@2.79-13.el8_3.1?arch=aarch64" } } }, { "category": "product_version", "name": "dnsmasq-utils-0:2.79-13.el8_3.1.aarch64", "product": { "name": "dnsmasq-utils-0:2.79-13.el8_3.1.aarch64", "product_id": "dnsmasq-utils-0:2.79-13.el8_3.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-utils@2.79-13.el8_3.1?arch=aarch64" } } }, { "category": "product_version", "name": "dnsmasq-debugsource-0:2.79-13.el8_3.1.aarch64", "product": { "name": "dnsmasq-debugsource-0:2.79-13.el8_3.1.aarch64", "product_id": "dnsmasq-debugsource-0:2.79-13.el8_3.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-debugsource@2.79-13.el8_3.1?arch=aarch64" } } }, { "category": "product_version", "name": "dnsmasq-debuginfo-0:2.79-13.el8_3.1.aarch64", "product": { "name": "dnsmasq-debuginfo-0:2.79-13.el8_3.1.aarch64", "product_id": "dnsmasq-debuginfo-0:2.79-13.el8_3.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-debuginfo@2.79-13.el8_3.1?arch=aarch64" } } }, { "category": "product_version", "name": "dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.aarch64", "product": { "name": "dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.aarch64", "product_id": "dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-utils-debuginfo@2.79-13.el8_3.1?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "dnsmasq-0:2.79-13.el8_3.1.ppc64le", "product": { "name": "dnsmasq-0:2.79-13.el8_3.1.ppc64le", "product_id": "dnsmasq-0:2.79-13.el8_3.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq@2.79-13.el8_3.1?arch=ppc64le" } } }, { "category": "product_version", "name": "dnsmasq-utils-0:2.79-13.el8_3.1.ppc64le", "product": { "name": "dnsmasq-utils-0:2.79-13.el8_3.1.ppc64le", "product_id": "dnsmasq-utils-0:2.79-13.el8_3.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-utils@2.79-13.el8_3.1?arch=ppc64le" } } }, { "category": "product_version", "name": "dnsmasq-debugsource-0:2.79-13.el8_3.1.ppc64le", "product": { "name": "dnsmasq-debugsource-0:2.79-13.el8_3.1.ppc64le", "product_id": "dnsmasq-debugsource-0:2.79-13.el8_3.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-debugsource@2.79-13.el8_3.1?arch=ppc64le" } } }, { "category": "product_version", "name": "dnsmasq-debuginfo-0:2.79-13.el8_3.1.ppc64le", "product": { "name": "dnsmasq-debuginfo-0:2.79-13.el8_3.1.ppc64le", "product_id": "dnsmasq-debuginfo-0:2.79-13.el8_3.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-debuginfo@2.79-13.el8_3.1?arch=ppc64le" } } }, { "category": "product_version", "name": "dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.ppc64le", "product": { "name": "dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.ppc64le", "product_id": "dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-utils-debuginfo@2.79-13.el8_3.1?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "dnsmasq-0:2.79-13.el8_3.1.x86_64", "product": { "name": "dnsmasq-0:2.79-13.el8_3.1.x86_64", "product_id": "dnsmasq-0:2.79-13.el8_3.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq@2.79-13.el8_3.1?arch=x86_64" } } }, { "category": "product_version", "name": "dnsmasq-utils-0:2.79-13.el8_3.1.x86_64", "product": { "name": "dnsmasq-utils-0:2.79-13.el8_3.1.x86_64", "product_id": "dnsmasq-utils-0:2.79-13.el8_3.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-utils@2.79-13.el8_3.1?arch=x86_64" } } }, { "category": "product_version", "name": "dnsmasq-debugsource-0:2.79-13.el8_3.1.x86_64", "product": { "name": "dnsmasq-debugsource-0:2.79-13.el8_3.1.x86_64", "product_id": "dnsmasq-debugsource-0:2.79-13.el8_3.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-debugsource@2.79-13.el8_3.1?arch=x86_64" } } }, { "category": "product_version", "name": "dnsmasq-debuginfo-0:2.79-13.el8_3.1.x86_64", "product": { "name": "dnsmasq-debuginfo-0:2.79-13.el8_3.1.x86_64", "product_id": "dnsmasq-debuginfo-0:2.79-13.el8_3.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-debuginfo@2.79-13.el8_3.1?arch=x86_64" } } }, { "category": "product_version", "name": "dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.x86_64", "product": { "name": "dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.x86_64", "product_id": "dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-utils-debuginfo@2.79-13.el8_3.1?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "dnsmasq-0:2.79-13.el8_3.1.s390x", "product": { "name": "dnsmasq-0:2.79-13.el8_3.1.s390x", "product_id": "dnsmasq-0:2.79-13.el8_3.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq@2.79-13.el8_3.1?arch=s390x" } } }, { "category": "product_version", "name": "dnsmasq-utils-0:2.79-13.el8_3.1.s390x", "product": { "name": "dnsmasq-utils-0:2.79-13.el8_3.1.s390x", "product_id": "dnsmasq-utils-0:2.79-13.el8_3.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-utils@2.79-13.el8_3.1?arch=s390x" } } }, { "category": "product_version", "name": "dnsmasq-debugsource-0:2.79-13.el8_3.1.s390x", "product": { "name": "dnsmasq-debugsource-0:2.79-13.el8_3.1.s390x", "product_id": "dnsmasq-debugsource-0:2.79-13.el8_3.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-debugsource@2.79-13.el8_3.1?arch=s390x" } } }, { "category": "product_version", "name": "dnsmasq-debuginfo-0:2.79-13.el8_3.1.s390x", "product": { "name": "dnsmasq-debuginfo-0:2.79-13.el8_3.1.s390x", "product_id": "dnsmasq-debuginfo-0:2.79-13.el8_3.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-debuginfo@2.79-13.el8_3.1?arch=s390x" } } }, { "category": "product_version", "name": "dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.s390x", "product": { "name": "dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.s390x", "product_id": "dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-utils-debuginfo@2.79-13.el8_3.1?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.79-13.el8_3.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.aarch64" }, "product_reference": "dnsmasq-0:2.79-13.el8_3.1.aarch64", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.79-13.el8_3.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.ppc64le" }, "product_reference": "dnsmasq-0:2.79-13.el8_3.1.ppc64le", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.79-13.el8_3.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.s390x" }, "product_reference": "dnsmasq-0:2.79-13.el8_3.1.s390x", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.79-13.el8_3.1.src as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.src" }, "product_reference": "dnsmasq-0:2.79-13.el8_3.1.src", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.79-13.el8_3.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.x86_64" }, "product_reference": "dnsmasq-0:2.79-13.el8_3.1.x86_64", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.79-13.el8_3.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.aarch64" }, "product_reference": "dnsmasq-debuginfo-0:2.79-13.el8_3.1.aarch64", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.79-13.el8_3.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.ppc64le" }, "product_reference": "dnsmasq-debuginfo-0:2.79-13.el8_3.1.ppc64le", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.79-13.el8_3.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.s390x" }, "product_reference": "dnsmasq-debuginfo-0:2.79-13.el8_3.1.s390x", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.79-13.el8_3.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.x86_64" }, "product_reference": "dnsmasq-debuginfo-0:2.79-13.el8_3.1.x86_64", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debugsource-0:2.79-13.el8_3.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.aarch64" }, "product_reference": "dnsmasq-debugsource-0:2.79-13.el8_3.1.aarch64", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debugsource-0:2.79-13.el8_3.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.ppc64le" }, "product_reference": "dnsmasq-debugsource-0:2.79-13.el8_3.1.ppc64le", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debugsource-0:2.79-13.el8_3.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.s390x" }, "product_reference": "dnsmasq-debugsource-0:2.79-13.el8_3.1.s390x", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debugsource-0:2.79-13.el8_3.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.x86_64" }, "product_reference": "dnsmasq-debugsource-0:2.79-13.el8_3.1.x86_64", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.79-13.el8_3.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.aarch64" }, "product_reference": "dnsmasq-utils-0:2.79-13.el8_3.1.aarch64", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.79-13.el8_3.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.ppc64le" }, "product_reference": "dnsmasq-utils-0:2.79-13.el8_3.1.ppc64le", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.79-13.el8_3.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.s390x" }, "product_reference": "dnsmasq-utils-0:2.79-13.el8_3.1.s390x", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.79-13.el8_3.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.x86_64" }, "product_reference": "dnsmasq-utils-0:2.79-13.el8_3.1.x86_64", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.aarch64" }, "product_reference": "dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.aarch64", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.ppc64le" }, "product_reference": "dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.ppc64le", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.s390x" }, "product_reference": "dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.s390x", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.x86_64" }, "product_reference": "dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.x86_64", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Moshe Kol", "Shlomi Oberman" ], "organization": "JSOF" } ], "cve": "CVE-2020-25681", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2020-09-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1881875" } ], "notes": [ { "category": "description", "text": "A flaw was found in dnsmasq. A heap-based buffer overflow was discovered in the way RRSets are sorted before validating with DNSSEC data. An attacker on the network, who can forge DNS replies such as that they are accepted as valid, could use this flaw to cause a buffer overflow with arbitrary data in a heap memory segment, possibly executing code on the machine. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "dnsmasq: heap-based buffer overflow in sort_rrset() when DNSSEC is enabled", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the versions of dnsmasq as shipped with Red Hat Enterprise Linux 5, 6, and 7 as they are not compiled with DNSSEC support.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.src", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-25681" }, { "category": "external", "summary": "RHBZ#1881875", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1881875" }, { "category": "external", "summary": "RHSB-2021-001", "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-001" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-25681", "url": "https://www.cve.org/CVERecord?id=CVE-2020-25681" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25681", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25681" }, { "category": "external", "summary": "https://www.jsof-tech.com/disclosures/dnspooq/", "url": "https://www.jsof-tech.com/disclosures/dnspooq/" } ], "release_date": "2021-01-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-01-19T15:06:28+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.src", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0150" }, { "category": "workaround", "details": "The only known way to mitigate this flaw is to disable DNSSEC altogether, by removing the `--dnssec` command line option or the `dnssec` option from dnsmasq configuration file.", "product_ids": [ "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.src", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.src", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "dnsmasq: heap-based buffer overflow in sort_rrset() when DNSSEC is enabled" }, { "acknowledgments": [ { "names": [ "Moshe Kol", "Shlomi Oberman" ], "organization": "JSOF" } ], "cve": "CVE-2020-25682", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2020-09-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1882014" } ], "notes": [ { "category": "description", "text": "A flaw was found in dnsmasq. A buffer overflow vulnerability was discovered in the way dnsmasq extract names from DNS packets before validating them with DNSSEC data. An attacker on the network, who can create valid DNS replies, could use this flaw to cause an overflow with arbitrary data in a heap-allocated memory, possibly executing code on the machine. The flaw is in the rfc1035.c:extract_name() function, which writes data to the memory pointed by name assuming MAXDNAME*2 bytes are available in the buffer. However, in some code execution paths, it is possible extract_name() gets passed an offset from the base buffer, thus reducing, in practice, the number of available bytes that can be written in the buffer. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "dnsmasq: buffer overflow in extract_name() due to missing length check when DNSSEC is enabled", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the versions of dnsmasq as shipped with Red Hat Enterprise Linux 5, 6, and 7 as they are not compiled with DNSSEC support.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.src", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-25682" }, { "category": "external", "summary": "RHBZ#1882014", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1882014" }, { "category": "external", "summary": "RHSB-2021-001", "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-001" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-25682", "url": "https://www.cve.org/CVERecord?id=CVE-2020-25682" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25682", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25682" }, { "category": "external", "summary": "https://www.jsof-tech.com/disclosures/dnspooq/", "url": "https://www.jsof-tech.com/disclosures/dnspooq/" } ], "release_date": "2021-01-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-01-19T15:06:28+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.src", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0150" }, { "category": "workaround", "details": "The only known way to mitigate this flaw is to disable DNSSEC altogether, by removing the `--dnssec` command line option or the `dnssec` option from dnsmasq configuration file.", "product_ids": [ "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.src", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.src", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "dnsmasq: buffer overflow in extract_name() due to missing length check when DNSSEC is enabled" }, { "acknowledgments": [ { "names": [ "Moshe Kol", "Shlomi Oberman" ], "organization": "JSOF" } ], "cve": "CVE-2020-25683", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2020-09-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1882018" } ], "notes": [ { "category": "description", "text": "A flaw was found in dnsmasq. A heap-based buffer overflow was discovered in dnsmasq when DNSSEC is enabled and before it validates the received DNS entries. A remote attacker, who can create valid DNS replies, could use this flaw to cause an overflow in a heap-allocated memory. This flaw is caused by the lack of length checks in rfc1035.c:extract_name(), which could be abused to make the code execute memcpy() with a negative size in get_rdata() and cause a crash in dnsmasq, resulting in a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "dnsmasq: heap-based buffer overflow with large memcpy in get_rdata() when DNSSEC is enabled", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the versions of dnsmasq as shipped with Red Hat Enterprise Linux 5, 6, and 7 as they are not compiled with DNSSEC support.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.src", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-25683" }, { "category": "external", "summary": "RHBZ#1882018", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1882018" }, { "category": "external", "summary": "RHSB-2021-001", "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-001" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-25683", "url": "https://www.cve.org/CVERecord?id=CVE-2020-25683" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25683", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25683" }, { "category": "external", "summary": "https://www.jsof-tech.com/disclosures/dnspooq/", "url": "https://www.jsof-tech.com/disclosures/dnspooq/" } ], "release_date": "2021-01-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-01-19T15:06:28+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.src", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0150" }, { "category": "workaround", "details": "The only known way to mitigate this flaw is to disable DNSSEC altogether, by removing the `--dnssec` command line option or the `dnssec` option from dnsmasq configuration file.", "product_ids": [ "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.src", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.src", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "dnsmasq: heap-based buffer overflow with large memcpy in get_rdata() when DNSSEC is enabled" }, { "acknowledgments": [ { "names": [ "Moshe Kol", "Shlomi Oberman" ], "organization": "JSOF" } ], "cve": "CVE-2020-25684", "cwe": { "id": "CWE-358", "name": "Improperly Implemented Security Check for Standard" }, "discovery_date": "2020-09-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1889686" } ], "notes": [ { "category": "description", "text": "A flaw was found in dnsmasq. When getting a reply from a forwarded query, dnsmasq checks in the forward.c:reply_query() if the reply destination address/port is used by the pending forwarded queries. However, it does not use the address/port to retrieve the exact forwarded query, substantially reducing the number of attempts an attacker on the network would have to perform to forge a reply and get it accepted by dnsmasq. This issue contrasts with RFC5452, which specifies a query\u0027s attributes that all must be used to match a reply. This flaw allows an attacker to perform a DNS Cache Poisoning attack. If chained with CVE-2020-25685 or CVE-2020-25686, the attack complexity of a successful attack is reduced. The highest threat from this vulnerability is to data integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "dnsmasq: loose address/port check in reply_query() makes forging replies easier for an off-path attacker", "title": "Vulnerability summary" }, { "category": "other", "text": "Dnsmasq may be run by libvirt and/or NetworkManager. libvirt uses dnsmasq by default to provide DNS service to its guests. NetworkManager may be configured to use dnsmasq to provide DNS service to the system, if a line `dns=dnsmasq` is present in the `[main]` section of the configuration file /etc/NetworkManager/NetworkManager.conf.\n\nIn Red Hat OpenStack Platform (RHOSP) and Red Hat Virtualization (RHV), the dnsmasq package is provided by the underlying Red Hat Enterprise Linux (RHEL) product. RHOSP and RHV are therefore indirectly affected, so please ensure that the underlying RHEL dnsmasq package is updated.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.src", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-25684" }, { "category": "external", "summary": "RHBZ#1889686", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889686" }, { "category": "external", "summary": "RHSB-2021-001", "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-001" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-25684", "url": "https://www.cve.org/CVERecord?id=CVE-2020-25684" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25684", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25684" }, { "category": "external", "summary": "https://www.jsof-tech.com/disclosures/dnspooq/", "url": "https://www.jsof-tech.com/disclosures/dnspooq/" } ], "release_date": "2021-01-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-01-19T15:06:28+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.src", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0150" }, { "category": "workaround", "details": "The impact of this flaw can be reduced by disabling the dnsmasq cache by adding `--cache-size=0` when calling dnsmasq or by adding a line with `cache-size=0` to the dnsmasq configuration file (/etc/dnsmasq.conf by default).\n\nWhen using Red Hat Enterprise Linux 8.3 with libvirt through a virt:rhel module, use `virsh net-edit \u003cnetwork-name\u003e` and reference https://libvirt.org/formatnetwork.html#elementsNamespaces to add the suggested option `cache-size=0`. \n\nThere is no way to customize the dnsmasq configuration generated by libvirt, when using versions of Red Hat Enterprise Linux prior to version 8.3. If dnsmasq is being run through NetworkManager, create a new file in /etc/NetworkManager/dnsmasq.d/ and add `cache-size=0` to it.\n\nIn all cases, by disabling the cache, you may experience a performance loss in your environment due to all DNS queries being forwarded to the upstream servers. Please evaluate if the mitigation is appropriate for the system\u2019s environment before applying.", "product_ids": [ "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.src", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N", "version": "3.1" }, "products": [ "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.src", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "dnsmasq: loose address/port check in reply_query() makes forging replies easier for an off-path attacker" }, { "acknowledgments": [ { "names": [ "Moshe Kol", "Shlomi Oberman" ], "organization": "JSOF" } ], "cve": "CVE-2020-25685", "cwe": { "id": "CWE-326", "name": "Inadequate Encryption Strength" }, "discovery_date": "2020-09-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1889688" } ], "notes": [ { "category": "description", "text": "A flaw was found in dnsmasq. When getting a reply from a forwarded query, dnsmasq checks in forward.c:reply_query(), which is the forwarded query that matches the reply, by only using a weak hash of the query name. Due to the weak hash (CRC32 when dnsmasq is compiled without DNSSEC, SHA-1 when it is) this flaw allows an off-path attacker to find several different domains all having the same hash, substantially reducing the number of attempts they would have to perform to forge a reply and get it accepted by dnsmasq. This is in contrast with RFC5452, which specifies that the query name is one of the attributes of a query that must be used to match a reply. This flaw could be abused to perform a DNS Cache Poisoning attack. If chained with CVE-2020-25684 the attack complexity of a successful attack is reduced. The highest threat from this vulnerability is to data integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "dnsmasq: loose query name check in reply_query() makes forging replies easier for an off-path attacker", "title": "Vulnerability summary" }, { "category": "other", "text": "Dnsmasq may be run by libvirt and/or NetworkManager. libvirt uses dnsmasq by default to provide DNS service to its guests. NetworkManager may be configured to use dnsmasq to provide DNS service to the system, if a line `dns=dnsmasq` is present in the `[main]` section of the configuration file /etc/NetworkManager/NetworkManager.conf.\n\nIn Red Hat OpenStack Platform (RHOSP) and Red Hat Virtualization (RHV), the dnsmasq package is provided by the underlying Red Hat Enterprise Linux (RHEL) product. RHOSP and RHV are therefore indirectly affected, so please ensure that the underlying RHEL dnsmasq package is updated.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.src", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-25685" }, { "category": "external", "summary": "RHBZ#1889688", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889688" }, { "category": "external", "summary": "RHSB-2021-001", "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-001" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-25685", "url": "https://www.cve.org/CVERecord?id=CVE-2020-25685" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25685", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25685" }, { "category": "external", "summary": "https://www.jsof-tech.com/disclosures/dnspooq/", "url": "https://www.jsof-tech.com/disclosures/dnspooq/" } ], "release_date": "2021-01-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-01-19T15:06:28+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.src", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0150" }, { "category": "workaround", "details": "The impact of this flaw can be reduced by disabling the dnsmasq cache by adding `--cache-size=0` when calling dnsmasq or by adding a line with `cache-size=0` to the dnsmasq configuration file (/etc/dnsmasq.conf by default). \n\nWhen using Red Hat Enterprise Linux 8.3 with libvirt through a virt:rhel module, use `virsh net-edit \u003cnetwork-name\u003e` and reference https://libvirt.org/formatnetwork.html#elementsNamespaces to add the suggested option `cache-size=0`. \n\nThere is no way to customize the dnsmasq configuration generated by libvirt, when using versions of Red Hat Enterprise Linux prior to version 8.3. If dnsmasq is being run through NetworkManager, create a new file in /etc/NetworkManager/dnsmasq.d/ and add `cache-size=0` to it.\n\nIn all cases, by disabling the cache, you may experience a performance loss in your environment due to all DNS queries being forwarded to the upstream servers. Please evaluate if the mitigation is appropriate for the system\u2019s environment before applying.", "product_ids": [ "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.src", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N", "version": "3.1" }, "products": [ "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.src", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "dnsmasq: loose query name check in reply_query() makes forging replies easier for an off-path attacker" }, { "acknowledgments": [ { "names": [ "Moshe Kol", "Shlomi Oberman" ], "organization": "JSOF" } ], "cve": "CVE-2020-25686", "cwe": { "id": "CWE-290", "name": "Authentication Bypass by Spoofing" }, "discovery_date": "2020-09-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1890125" } ], "notes": [ { "category": "description", "text": "A flaw was found in dnsmasq. When receiving a query, dnsmasq does not check for an existing pending request for the same name and forwards a new request. By default, a maximum of 150 pending queries can be sent to upstream servers, so there can be at most 150 queries for the same name. This flaw allows an off-path attacker on the network to substantially reduce the number of attempts that it would have to perform to forge a reply and have it accepted by dnsmasq. This issue is mentioned in the \"Birthday Attacks\" section of RFC5452. If chained with CVE-2020-25684, the attack complexity of a successful attack is reduced. The highest threat from this vulnerability is to data integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "dnsmasq: multiple queries forwarded for the same name makes forging replies easier for an off-path attacker", "title": "Vulnerability summary" }, { "category": "other", "text": "Dnsmasq may be run by libvirt and/or NetworkManager. libvirt uses dnsmasq by default to provide DNS service to its guests. NetworkManager may be configured to use dnsmasq to provide DNS service to the system, if a line `dns=dnsmasq` is present in the `[main]` section of the configuration file /etc/NetworkManager/NetworkManager.conf.\n\nIn Red Hat OpenStack Platform (RHOSP) and Red Hat Virtualization (RHV), the dnsmasq package is provided by the underlying Red Hat Enterprise Linux (RHEL) product. RHOSP and RHV are therefore indirectly affected, so please ensure that the underlying RHEL dnsmasq package is updated.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.src", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-25686" }, { "category": "external", "summary": "RHBZ#1890125", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890125" }, { "category": "external", "summary": "RHSB-2021-001", "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-001" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-25686", "url": "https://www.cve.org/CVERecord?id=CVE-2020-25686" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25686", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25686" }, { "category": "external", "summary": "https://www.jsof-tech.com/disclosures/dnspooq/", "url": "https://www.jsof-tech.com/disclosures/dnspooq/" } ], "release_date": "2021-01-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-01-19T15:06:28+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.src", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0150" }, { "category": "workaround", "details": "The impact of this flaw can be reduced by disabling the dnsmasq cache by adding `--cache-size=0` when calling dnsmasq or by adding a line with `cache-size=0` to the dnsmasq configuration file (/etc/dnsmasq.conf by default). \n\nWhen using Red Hat Enterprise Linux 8.3 with libvirt through a virt:rhel module, use `virsh net-edit \u003cnetwork-name\u003e` and reference https://libvirt.org/formatnetwork.html#elementsNamespaces to add the suggested option `cache-size=0`. \n\nThere is no way to customize the dnsmasq configuration generated by libvirt, when using versions of Red Hat Enterprise Linux prior to version 8.3. If dnsmasq is being run through NetworkManager, create a new file in /etc/NetworkManager/dnsmasq.d/ and add `cache-size=0` to it.\n\nIn all cases, by disabling the cache, you may experience a performance loss in your environment due to all DNS queries being forwarded to the upstream servers. Please evaluate if the mitigation is appropriate for the system\u2019s environment before applying.", "product_ids": [ "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.src", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N", "version": "3.1" }, "products": [ "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.src", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "dnsmasq: multiple queries forwarded for the same name makes forging replies easier for an off-path attacker" }, { "acknowledgments": [ { "names": [ "Moshe Kol", "Shlomi Oberman" ], "organization": "JSOF" } ], "cve": "CVE-2020-25687", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2020-09-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1891568" } ], "notes": [ { "category": "description", "text": "A flaw was found in dnsmasq. A heap-based buffer overflow was discovered in dnsmasq when DNSSEC is enabled and before it validates the received DNS entries. This flaw allows a remote attacker, who can create valid DNS replies, to cause an overflow in a heap-allocated memory. This flaw is caused by the lack of length checks in rfc1035.c:extract_name(), which could be abused to make the code execute memcpy() with a negative size in sort_rrset() and cause a crash in dnsmasq, resulting in a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "dnsmasq: heap-based buffer overflow with large memcpy in sort_rrset() when DNSSEC is enabled", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the versions of dnsmasq as shipped with Red Hat Enterprise Linux 5, 6, and 7 as they are not compiled with DNSSEC support.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.src", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-25687" }, { "category": "external", "summary": "RHBZ#1891568", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1891568" }, { "category": "external", "summary": "RHSB-2021-001", "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-001" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-25687", "url": "https://www.cve.org/CVERecord?id=CVE-2020-25687" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25687", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25687" }, { "category": "external", "summary": "https://www.jsof-tech.com/disclosures/dnspooq/", "url": "https://www.jsof-tech.com/disclosures/dnspooq/" } ], "release_date": "2021-01-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-01-19T15:06:28+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.src", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0150" }, { "category": "workaround", "details": "The only known way to mitigate this flaw is to disable DNSSEC altogether, by removing the `--dnssec` command line option or the `dnssec` option from dnsmasq configuration file.", "product_ids": [ "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.src", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.src", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "dnsmasq: heap-based buffer overflow with large memcpy in sort_rrset() when DNSSEC is enabled" } ] }
ghsa-xqvc-9mc9-4fgx
Vulnerability from github
A flaw was found in dnsmasq before version 2.83. When getting a reply from a forwarded query, dnsmasq checks in the forward.c:reply_query() if the reply destination address/port is used by the pending forwarded queries. However, it does not use the address/port to retrieve the exact forwarded query, substantially reducing the number of attempts an attacker on the network would have to perform to forge a reply and get it accepted by dnsmasq. This issue contrasts with RFC5452, which specifies a query's attributes that all must be used to match a reply. This flaw allows an attacker to perform a DNS Cache Poisoning attack. If chained with CVE-2020-25685 or CVE-2020-25686, the attack complexity of a successful attack is reduced. The highest threat from this vulnerability is to data integrity.
{ "affected": [], "aliases": [ "CVE-2020-25684" ], "database_specific": { "cwe_ids": [ "CWE-358" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2021-01-20T16:15:00Z", "severity": "MODERATE" }, "details": "A flaw was found in dnsmasq before version 2.83. When getting a reply from a forwarded query, dnsmasq checks in the forward.c:reply_query() if the reply destination address/port is used by the pending forwarded queries. However, it does not use the address/port to retrieve the exact forwarded query, substantially reducing the number of attempts an attacker on the network would have to perform to forge a reply and get it accepted by dnsmasq. This issue contrasts with RFC5452, which specifies a query\u0027s attributes that all must be used to match a reply. This flaw allows an attacker to perform a DNS Cache Poisoning attack. If chained with CVE-2020-25685 or CVE-2020-25686, the attack complexity of a successful attack is reduced. The highest threat from this vulnerability is to data integrity.", "id": "GHSA-xqvc-9mc9-4fgx", "modified": "2024-04-04T03:04:14Z", "published": "2022-05-24T17:39:33Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25684" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889686" }, { "type": "WEB", "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00027.html" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QGB7HL3OWHTLEPSMLDGOMXQKG3KM2QME" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WYW3IR6APUSKOYKL5FT3ACTIHWHGQY32" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGB7HL3OWHTLEPSMLDGOMXQKG3KM2QME" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WYW3IR6APUSKOYKL5FT3ACTIHWHGQY32" }, { "type": "WEB", "url": "https://security.gentoo.org/glsa/202101-17" }, { "type": "WEB", "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/12135-security-advisory-61" }, { "type": "WEB", "url": "https://www.debian.org/security/2021/dsa-4844" }, { "type": "WEB", "url": "https://www.jsof-tech.com/disclosures/dnspooq" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "type": "CVSS_V3" } ] }
var-202101-0220
Vulnerability from variot
A flaw was found in dnsmasq before version 2.83. When getting a reply from a forwarded query, dnsmasq checks in the forward.c:reply_query() if the reply destination address/port is used by the pending forwarded queries. However, it does not use the address/port to retrieve the exact forwarded query, substantially reducing the number of attempts an attacker on the network would have to perform to forge a reply and get it accepted by dnsmasq. This issue contrasts with RFC5452, which specifies a query's attributes that all must be used to match a reply. This flaw allows an attacker to perform a DNS Cache Poisoning attack. If chained with CVE-2020-25685 or CVE-2020-25686, the attack complexity of a successful attack is reduced. The highest threat from this vulnerability is to data integrity. Dnsmasq is vulnerable to a set of memory corruption issues handling DNSSEC data and a second set of issues validating DNS responses. These vulnerabilities could allow an attacker to corrupt memory on a vulnerable system and perform cache poisoning attacks against a vulnerable environment.CVE-2020-25681 Not Affected CVE-2020-25682 Not Affected CVE-2020-25683 Not Affected CVE-2020-25684 Affected CVE-2020-25685 Affected CVE-2020-25686 Affected CVE-2020-25687 Not AffectedCVE-2020-25681 Not Affected CVE-2020-25682 Not Affected CVE-2020-25683 Not Affected CVE-2020-25684 Affected CVE-2020-25685 Affected CVE-2020-25686 Affected CVE-2020-25687 Not Affected. dnsmasq There is a security check vulnerability in.Information may be tampered with. Dnsmasq is a lightweight DNS forwarding and DHCP and TFTP server written in C language. 8) - aarch64, ppc64le, s390x, x86_64
-
7) - aarch64, ppc64le, s390x
-
7.7) - ppc64, ppc64le, s390x, x86_64
-
========================================================================== Ubuntu Security Notice USN-4698-1 January 19, 2021
dnsmasq vulnerabilities
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 20.10
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS
Summary:
Several security issues were fixed in Dnsmasq.
Software Description: - dnsmasq: Small caching DNS proxy and DHCP/TFTP server
Details:
Moshe Kol and Shlomi Oberman discovered that Dnsmasq incorrectly handled memory when sorting RRsets. A remote attacker could use this issue to cause Dnsmasq to hang, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2020-25681, CVE-2020-25687)
Moshe Kol and Shlomi Oberman discovered that Dnsmasq incorrectly handled extracting certain names. A remote attacker could use this issue to cause Dnsmasq to hang, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2020-25682, CVE-2020-25683)
Moshe Kol and Shlomi Oberman discovered that Dnsmasq incorrectly implemented address/port checks. (CVE-2020-25684)
Moshe Kol and Shlomi Oberman discovered that Dnsmasq incorrectly implemented query resource name checks. (CVE-2020-25685)
Moshe Kol and Shlomi Oberman discovered that Dnsmasq incorrectly handled multiple query requests for the same resource name. (CVE-2020-25686)
It was discovered that Dnsmasq incorrectly handled memory during DHCP response creation. A remote attacker could possibly use this issue to cause Dnsmasq to consume resources, leading to a denial of service. This issue only affected Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, and Ubuntu 20.04 LTS. (CVE-2019-14834)
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 20.10: dnsmasq 2.82-1ubuntu1.1 dnsmasq-base 2.82-1ubuntu1.1 dnsmasq-utils 2.82-1ubuntu1.1
Ubuntu 20.04 LTS: dnsmasq 2.80-1.1ubuntu1.2 dnsmasq-base 2.80-1.1ubuntu1.2 dnsmasq-utils 2.80-1.1ubuntu1.2
Ubuntu 18.04 LTS: dnsmasq 2.79-1ubuntu0.2 dnsmasq-base 2.79-1ubuntu0.2 dnsmasq-utils 2.79-1ubuntu0.2
Ubuntu 16.04 LTS: dnsmasq 2.75-1ubuntu0.16.04.7 dnsmasq-base 2.75-1ubuntu0.16.04.7 dnsmasq-utils 2.75-1ubuntu0.16.04.7
After a standard system update you need to reboot your computer to make all the necessary changes. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256
====================================================================
Red Hat Security Advisory
Synopsis: Moderate: dnsmasq security update Advisory ID: RHSA-2021:0156-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2021:0156 Issue date: 2021-01-19 CVE Names: CVE-2020-25684 CVE-2020-25685 CVE-2020-25686 ==================================================================== 1. Summary:
An update for dnsmasq is now available for Red Hat Enterprise Linux 7.4 Advanced Update Support, Red Hat Enterprise Linux 7.4 Telco Extended Update Support, and Red Hat Enterprise Linux 7.4 Update Services for SAP Solutions.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
- Relevant releases/architectures:
Red Hat Enterprise Linux Server AUS (v. 7.4) - x86_64 Red Hat Enterprise Linux Server E4S (v. 7.4) - ppc64le, x86_64 Red Hat Enterprise Linux Server Optional AUS (v. 7.4) - x86_64 Red Hat Enterprise Linux Server Optional E4S (v. 7.4) - ppc64le, x86_64 Red Hat Enterprise Linux Server Optional TUS (v. 7.4) - x86_64 Red Hat Enterprise Linux Server TUS (v. 7.4) - x86_64
Security Fix(es):
-
dnsmasq: loose address/port check in reply_query() makes forging replies easier for an off-path attacker (CVE-2020-25684)
-
dnsmasq: loose query name check in reply_query() makes forging replies easier for an off-path attacker (CVE-2020-25685)
-
dnsmasq: multiple queries forwarded for the same name makes forging replies easier for an off-path attacker (CVE-2020-25686)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
- Solution:
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
- Bugs fixed (https://bugzilla.redhat.com/):
1889686 - CVE-2020-25684 dnsmasq: loose address/port check in reply_query() makes forging replies easier for an off-path attacker 1889688 - CVE-2020-25685 dnsmasq: loose query name check in reply_query() makes forging replies easier for an off-path attacker 1890125 - CVE-2020-25686 dnsmasq: multiple queries forwarded for the same name makes forging replies easier for an off-path attacker
- Package List:
Red Hat Enterprise Linux Server AUS (v. 7.4):
Source: dnsmasq-2.76-2.el7_4.3.src.rpm
x86_64: dnsmasq-2.76-2.el7_4.3.x86_64.rpm dnsmasq-debuginfo-2.76-2.el7_4.3.x86_64.rpm
Red Hat Enterprise Linux Server E4S (v. 7.4):
Source: dnsmasq-2.76-2.el7_4.3.src.rpm
ppc64le: dnsmasq-2.76-2.el7_4.3.ppc64le.rpm dnsmasq-debuginfo-2.76-2.el7_4.3.ppc64le.rpm
x86_64: dnsmasq-2.76-2.el7_4.3.x86_64.rpm dnsmasq-debuginfo-2.76-2.el7_4.3.x86_64.rpm
Red Hat Enterprise Linux Server TUS (v. 7.4):
Source: dnsmasq-2.76-2.el7_4.3.src.rpm
x86_64: dnsmasq-2.76-2.el7_4.3.x86_64.rpm dnsmasq-debuginfo-2.76-2.el7_4.3.x86_64.rpm
Red Hat Enterprise Linux Server Optional AUS (v. 7.4):
x86_64: dnsmasq-debuginfo-2.76-2.el7_4.3.x86_64.rpm dnsmasq-utils-2.76-2.el7_4.3.x86_64.rpm
Red Hat Enterprise Linux Server Optional E4S (v. 7.4):
ppc64le: dnsmasq-debuginfo-2.76-2.el7_4.3.ppc64le.rpm dnsmasq-utils-2.76-2.el7_4.3.ppc64le.rpm
x86_64: dnsmasq-debuginfo-2.76-2.el7_4.3.x86_64.rpm dnsmasq-utils-2.76-2.el7_4.3.x86_64.rpm
Red Hat Enterprise Linux Server Optional TUS (v. 7.4):
x86_64: dnsmasq-debuginfo-2.76-2.el7_4.3.x86_64.rpm dnsmasq-utils-2.76-2.el7_4.3.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/
- References:
https://access.redhat.com/security/cve/CVE-2020-25684 https://access.redhat.com/security/cve/CVE-2020-25685 https://access.redhat.com/security/cve/CVE-2020-25686 https://access.redhat.com/security/updates/classification/#moderate https://access.redhat.com/security/vulnerabilities/RHSB-2021-001
- Contact:
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/
Copyright 2021 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1
iQIVAwUBYAbg5dzjgjWX9erEAQjfmA//U9huQUHWE5px5MpvL3/7ZlTnU3Q23tSz lOkHHhl4hwFmETAaVUv/Zoc1N7OfxHzC6C4ot2+rPFj+oMcZQeXUrfhKZkG5kWMn Qy/yIN9myOJ9jjM+2NmF+nQPAiIVi2fU/LkDIEYGXihDZB67/bvu2ErbX2dEOGaH ikX4JNYAVw8vnCZgRy2bbXq47Nff8oeys9sTcDWIq61Svg2mHYYtIoF4Xmz5N5u5 Gb+75FFSxlBoNQFbDyydm19UpGTGZ1dP5Giquvuv8hN0lXGDZN39TANk8FruwnB+ ibyRgzf1R3IwDKbMdkICVOtxfR6cMUXOk5fB6bygyL8Ki6o03N1/HPnQTOQ3XPDO Ya0eswXvMpG8DdhIPi6xlVhorxDj4QKaVKC82rnbb27KJP+UPC8KXfp8lEZSD0zX 56f2O2t42rjzrulnijDdeHtW6oI1MytA/hVLLM0Sdt6PYS19jflucnwP2UuZn0aR RRWjdK6Tx0OYxpPQBYVKygzm+0ke7Ee5BoGn+sYU5SZSH6ro0AlfIRVQn6XmTGUj Gotg6jc4a6HXjhrA72lkxvW9pzFVXpfiQ/VFhBblP39dcCXXyRfTSzgbutDAz7eu 5R8SwUBVIJ0e/Pp32WAMapLfKc+Pj9VG/INfwYYxtpWooy2cHk+3HZIy8gXylhCA lyNYjR6LrCc=sh0K -----END PGP SIGNATURE-----
-- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce .
For the stable distribution (buster), these problems have been fixed in version 2.80-1+deb10u1.
We recommend that you upgrade your dnsmasq packages.
For the detailed security status of dnsmasq please refer to its security tracker page at: https://security-tracker.debian.org/tracker/dnsmasq
Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE-----
iQEzBAEBCgAdFiEEAqSkbVtrXP4xJMh3EL6Jg/PVnWQFAmAZVA4ACgkQEL6Jg/PV nWQYKAgAgVwonRAgXSliaFh0n44OPOz9wf4KibG7otcnAx4V4XqFAeXsHd/hIX/K IC313F3I+8WzvjKBhvt2KnGG9SnoTnq4roBIa1nz//vNX0hyfDm5xPlxQOExzC+c YS8kGt++SvC2wgOsrZEjyk0ecKqDJmZSwW31zXG9/2kTzCbKjuDp+i4TTADqabPC AgbmEGVKBR2Fk7K9Prct27oWoj7LHMaH+Ttb8uQGnG7OgJs9KyRI+2qIu+VaRCGf yfRj+XayPYHV1Amf5dLIKcLMMp/FnkNFoO2YIAZkWVPjXD2uPKUykJJ1GRl8R+0q qtNhPTNNuD6WnYzC8yP0KIQ2tsbg9Q== =j5Ka -----END PGP SIGNATURE-----
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202101-0220", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "eos", "scope": "gte", "trust": 1.0, "vendor": "arista", "version": "4.22" }, { "model": "dnsmasq", "scope": "lt", "trust": 1.0, "vendor": "thekelleys", "version": "2.83" }, { "model": "linux", "scope": "eq", "trust": 1.0, "vendor": "debian", "version": "10.0" }, { "model": "linux", "scope": "eq", "trust": 1.0, "vendor": "debian", "version": "9.0" }, { "model": "eos", "scope": "gte", "trust": 1.0, "vendor": "arista", "version": "4.23" }, { "model": "eos", "scope": "lt", "trust": 1.0, "vendor": "arista", "version": "4.21.14m" }, { "model": "fedora", "scope": "eq", "trust": 1.0, "vendor": "fedoraproject", "version": "32" }, { "model": "eos", "scope": "lt", "trust": 1.0, "vendor": "arista", "version": "4.23.7m" }, { "model": "eos", "scope": "gte", "trust": 1.0, "vendor": "arista", "version": "4.25" }, { "model": "fedora", "scope": "eq", "trust": 1.0, "vendor": "fedoraproject", "version": "33" }, { "model": "eos", "scope": "lt", "trust": 1.0, "vendor": "arista", "version": "4.25.2f" }, { "model": "eos", "scope": "gte", "trust": 1.0, "vendor": "arista", "version": "4.21" }, { "model": "eos", "scope": "lt", "trust": 1.0, "vendor": "arista", "version": "4.24.5m" }, { "model": "eos", "scope": "lt", "trust": 1.0, "vendor": "arista", "version": "4.22.9m" }, { "model": "eos", "scope": "gte", "trust": 1.0, "vendor": "arista", "version": "4.24" }, { "model": "gnu/linux", "scope": null, "trust": 0.8, "vendor": "debian", "version": null }, { "model": "dnsmasq", "scope": null, "trust": 0.8, "vendor": "thekelleys", "version": null }, { "model": "fedora", "scope": null, "trust": 0.8, "vendor": "fedora", "version": null }, { "model": "dnsmasq", "scope": "eq", "trust": 0.6, "vendor": "dnsmasq", "version": "2.83" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-16431" }, { "db": "JVNDB", "id": "JVNDB-2020-015547" }, { "db": "NVD", "id": "CVE-2020-25684" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:thekelleys:dnsmasq:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.83", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:arista:eos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "4.21.14m", "versionStartIncluding": "4.21", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:arista:eos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "4.22.9m", "versionStartIncluding": "4.22", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:arista:eos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "4.23.7m", "versionStartIncluding": "4.23", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:arista:eos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "4.24.5m", "versionStartIncluding": "4.24", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:arista:eos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "4.25.2f", "versionStartIncluding": "4.25", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2020-25684" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "This document was written by Vijay Sarvepalli.Statement Date:\u00a0\u00a0 January 04, 2021", "sources": [ { "db": "CERT/CC", "id": "VU#434904" } ], "trust": 0.8 }, "cve": "CVE-2020-25684", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "impactScore": 2.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 4.3, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2020-25684", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "CNVD-2021-16431", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "HIGH", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "exploitabilityScore": 2.2, "impactScore": 1.4, "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, { "attackComplexity": "High", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 3.7, "baseSeverity": "Low", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2020-25684", "impactScore": null, "integrityImpact": "Low", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2020-25684", "trust": 1.8, "value": "LOW" }, { "author": "CNVD", "id": "CNVD-2021-16431", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202101-1611", "trust": 0.6, "value": "LOW" }, { "author": "VULMON", "id": "CVE-2020-25684", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-16431" }, { "db": "VULMON", "id": "CVE-2020-25684" }, { "db": "JVNDB", "id": "JVNDB-2020-015547" }, { "db": "CNNVD", "id": "CNNVD-202101-1611" }, { "db": "NVD", "id": "CVE-2020-25684" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A flaw was found in dnsmasq before version 2.83. When getting a reply from a forwarded query, dnsmasq checks in the forward.c:reply_query() if the reply destination address/port is used by the pending forwarded queries. However, it does not use the address/port to retrieve the exact forwarded query, substantially reducing the number of attempts an attacker on the network would have to perform to forge a reply and get it accepted by dnsmasq. This issue contrasts with RFC5452, which specifies a query\u0027s attributes that all must be used to match a reply. This flaw allows an attacker to perform a DNS Cache Poisoning attack. If chained with CVE-2020-25685 or CVE-2020-25686, the attack complexity of a successful attack is reduced. The highest threat from this vulnerability is to data integrity. Dnsmasq is vulnerable to a set of memory corruption issues handling DNSSEC data and a second set of issues validating DNS responses. These vulnerabilities could allow an attacker to corrupt memory on a vulnerable system and perform cache poisoning attacks against a vulnerable environment.CVE-2020-25681 Not Affected\nCVE-2020-25682 Not Affected\nCVE-2020-25683 Not Affected\nCVE-2020-25684 Affected\nCVE-2020-25685 Affected\nCVE-2020-25686 Affected\nCVE-2020-25687 Not AffectedCVE-2020-25681 Not Affected\nCVE-2020-25682 Not Affected\nCVE-2020-25683 Not Affected\nCVE-2020-25684 Affected\nCVE-2020-25685 Affected\nCVE-2020-25686 Affected\nCVE-2020-25687 Not Affected. dnsmasq There is a security check vulnerability in.Information may be tampered with. Dnsmasq is a lightweight DNS forwarding and DHCP and TFTP server written in C language. 8) - aarch64, ppc64le, s390x, x86_64\n\n3. 7) - aarch64, ppc64le, s390x\n\n3. 7.7) - ppc64, ppc64le, s390x, x86_64\n\n3. ==========================================================================\nUbuntu Security Notice USN-4698-1\nJanuary 19, 2021\n\ndnsmasq vulnerabilities\n==========================================================================\n\nA security issue affects these releases of Ubuntu and its derivatives:\n\n- Ubuntu 20.10\n- Ubuntu 20.04 LTS\n- Ubuntu 18.04 LTS\n- Ubuntu 16.04 LTS\n\nSummary:\n\nSeveral security issues were fixed in Dnsmasq. \n\nSoftware Description:\n- dnsmasq: Small caching DNS proxy and DHCP/TFTP server\n\nDetails:\n\nMoshe Kol and Shlomi Oberman discovered that Dnsmasq incorrectly handled\nmemory when sorting RRsets. A remote attacker could use this issue to cause\nDnsmasq to hang, resulting in a denial of service, or possibly execute\narbitrary code. (CVE-2020-25681, CVE-2020-25687)\n\nMoshe Kol and Shlomi Oberman discovered that Dnsmasq incorrectly handled\nextracting certain names. A remote attacker could use this issue to cause\nDnsmasq to hang, resulting in a denial of service, or possibly execute\narbitrary code. (CVE-2020-25682, CVE-2020-25683)\n\nMoshe Kol and Shlomi Oberman discovered that Dnsmasq incorrectly\nimplemented address/port checks. (CVE-2020-25684)\n\nMoshe Kol and Shlomi Oberman discovered that Dnsmasq incorrectly\nimplemented query resource name checks. (CVE-2020-25685)\n\nMoshe Kol and Shlomi Oberman discovered that Dnsmasq incorrectly handled\nmultiple query requests for the same resource name. (CVE-2020-25686)\n\nIt was discovered that Dnsmasq incorrectly handled memory during DHCP\nresponse creation. A remote attacker could possibly use this issue to\ncause Dnsmasq to consume resources, leading to a denial of service. This\nissue only affected Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, and Ubuntu 20.04\nLTS. (CVE-2019-14834)\n\nUpdate instructions:\n\nThe problem can be corrected by updating your system to the following\npackage versions:\n\nUbuntu 20.10:\n dnsmasq 2.82-1ubuntu1.1\n dnsmasq-base 2.82-1ubuntu1.1\n dnsmasq-utils 2.82-1ubuntu1.1\n\nUbuntu 20.04 LTS:\n dnsmasq 2.80-1.1ubuntu1.2\n dnsmasq-base 2.80-1.1ubuntu1.2\n dnsmasq-utils 2.80-1.1ubuntu1.2\n\nUbuntu 18.04 LTS:\n dnsmasq 2.79-1ubuntu0.2\n dnsmasq-base 2.79-1ubuntu0.2\n dnsmasq-utils 2.79-1ubuntu0.2\n\nUbuntu 16.04 LTS:\n dnsmasq 2.75-1ubuntu0.16.04.7\n dnsmasq-base 2.75-1ubuntu0.16.04.7\n dnsmasq-utils 2.75-1ubuntu0.16.04.7\n\nAfter a standard system update you need to reboot your computer to make\nall the necessary changes. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA256\n\n==================================================================== \nRed Hat Security Advisory\n\nSynopsis: Moderate: dnsmasq security update\nAdvisory ID: RHSA-2021:0156-01\nProduct: Red Hat Enterprise Linux\nAdvisory URL: https://access.redhat.com/errata/RHSA-2021:0156\nIssue date: 2021-01-19\nCVE Names: CVE-2020-25684 CVE-2020-25685 CVE-2020-25686\n====================================================================\n1. Summary:\n\nAn update for dnsmasq is now available for Red Hat Enterprise Linux 7.4\nAdvanced Update Support, Red Hat Enterprise Linux 7.4 Telco Extended Update\nSupport, and Red Hat Enterprise Linux 7.4 Update Services for SAP\nSolutions. \n\nRed Hat Product Security has rated this update as having a security impact\nof Moderate. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available for each vulnerability from\nthe CVE link(s) in the References section. \n\n2. Relevant releases/architectures:\n\nRed Hat Enterprise Linux Server AUS (v. 7.4) - x86_64\nRed Hat Enterprise Linux Server E4S (v. 7.4) - ppc64le, x86_64\nRed Hat Enterprise Linux Server Optional AUS (v. 7.4) - x86_64\nRed Hat Enterprise Linux Server Optional E4S (v. 7.4) - ppc64le, x86_64\nRed Hat Enterprise Linux Server Optional TUS (v. 7.4) - x86_64\nRed Hat Enterprise Linux Server TUS (v. 7.4) - x86_64\n\n3. \n\nSecurity Fix(es):\n\n* dnsmasq: loose address/port check in reply_query() makes forging replies\neasier for an off-path attacker (CVE-2020-25684)\n\n* dnsmasq: loose query name check in reply_query() makes forging replies\neasier for an off-path attacker (CVE-2020-25685)\n\n* dnsmasq: multiple queries forwarded for the same name makes forging\nreplies easier for an off-path attacker (CVE-2020-25686)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE\npage(s) listed in the References section. \n\n4. Solution:\n\nFor details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\n5. Bugs fixed (https://bugzilla.redhat.com/):\n\n1889686 - CVE-2020-25684 dnsmasq: loose address/port check in reply_query() makes forging replies easier for an off-path attacker\n1889688 - CVE-2020-25685 dnsmasq: loose query name check in reply_query() makes forging replies easier for an off-path attacker\n1890125 - CVE-2020-25686 dnsmasq: multiple queries forwarded for the same name makes forging replies easier for an off-path attacker\n\n6. Package List:\n\nRed Hat Enterprise Linux Server AUS (v. 7.4):\n\nSource:\ndnsmasq-2.76-2.el7_4.3.src.rpm\n\nx86_64:\ndnsmasq-2.76-2.el7_4.3.x86_64.rpm\ndnsmasq-debuginfo-2.76-2.el7_4.3.x86_64.rpm\n\nRed Hat Enterprise Linux Server E4S (v. 7.4):\n\nSource:\ndnsmasq-2.76-2.el7_4.3.src.rpm\n\nppc64le:\ndnsmasq-2.76-2.el7_4.3.ppc64le.rpm\ndnsmasq-debuginfo-2.76-2.el7_4.3.ppc64le.rpm\n\nx86_64:\ndnsmasq-2.76-2.el7_4.3.x86_64.rpm\ndnsmasq-debuginfo-2.76-2.el7_4.3.x86_64.rpm\n\nRed Hat Enterprise Linux Server TUS (v. 7.4):\n\nSource:\ndnsmasq-2.76-2.el7_4.3.src.rpm\n\nx86_64:\ndnsmasq-2.76-2.el7_4.3.x86_64.rpm\ndnsmasq-debuginfo-2.76-2.el7_4.3.x86_64.rpm\n\nRed Hat Enterprise Linux Server Optional AUS (v. 7.4):\n\nx86_64:\ndnsmasq-debuginfo-2.76-2.el7_4.3.x86_64.rpm\ndnsmasq-utils-2.76-2.el7_4.3.x86_64.rpm\n\nRed Hat Enterprise Linux Server Optional E4S (v. 7.4):\n\nppc64le:\ndnsmasq-debuginfo-2.76-2.el7_4.3.ppc64le.rpm\ndnsmasq-utils-2.76-2.el7_4.3.ppc64le.rpm\n\nx86_64:\ndnsmasq-debuginfo-2.76-2.el7_4.3.x86_64.rpm\ndnsmasq-utils-2.76-2.el7_4.3.x86_64.rpm\n\nRed Hat Enterprise Linux Server Optional TUS (v. 7.4):\n\nx86_64:\ndnsmasq-debuginfo-2.76-2.el7_4.3.x86_64.rpm\ndnsmasq-utils-2.76-2.el7_4.3.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security. Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/\n\n7. References:\n\nhttps://access.redhat.com/security/cve/CVE-2020-25684\nhttps://access.redhat.com/security/cve/CVE-2020-25685\nhttps://access.redhat.com/security/cve/CVE-2020-25686\nhttps://access.redhat.com/security/updates/classification/#moderate\nhttps://access.redhat.com/security/vulnerabilities/RHSB-2021-001\n\n8. Contact:\n\nThe Red Hat security contact is \u003csecalert@redhat.com\u003e. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2021 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1\n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\nlyNYjR6LrCc=sh0K\n-----END PGP SIGNATURE-----\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://www.redhat.com/mailman/listinfo/rhsa-announce\n. \n\nFor the stable distribution (buster), these problems have been fixed in\nversion 2.80-1+deb10u1. \n\nWe recommend that you upgrade your dnsmasq packages. \n\nFor the detailed security status of dnsmasq please refer to\nits security tracker page at:\nhttps://security-tracker.debian.org/tracker/dnsmasq\n\nFurther information about Debian Security Advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: https://www.debian.org/security/\n\nMailing list: debian-security-announce@lists.debian.org\n-----BEGIN PGP SIGNATURE-----\n\niQEzBAEBCgAdFiEEAqSkbVtrXP4xJMh3EL6Jg/PVnWQFAmAZVA4ACgkQEL6Jg/PV\nnWQYKAgAgVwonRAgXSliaFh0n44OPOz9wf4KibG7otcnAx4V4XqFAeXsHd/hIX/K\nIC313F3I+8WzvjKBhvt2KnGG9SnoTnq4roBIa1nz//vNX0hyfDm5xPlxQOExzC+c\nYS8kGt++SvC2wgOsrZEjyk0ecKqDJmZSwW31zXG9/2kTzCbKjuDp+i4TTADqabPC\nAgbmEGVKBR2Fk7K9Prct27oWoj7LHMaH+Ttb8uQGnG7OgJs9KyRI+2qIu+VaRCGf\nyfRj+XayPYHV1Amf5dLIKcLMMp/FnkNFoO2YIAZkWVPjXD2uPKUykJJ1GRl8R+0q\nqtNhPTNNuD6WnYzC8yP0KIQ2tsbg9Q==\n=j5Ka\n-----END PGP SIGNATURE-----\n", "sources": [ { "db": "NVD", "id": "CVE-2020-25684" }, { "db": "CERT/CC", "id": "VU#434904" }, { "db": "JVNDB", "id": "JVNDB-2020-015547" }, { "db": "CNVD", "id": "CNVD-2021-16431" }, { "db": "VULMON", "id": "CVE-2020-25684" }, { "db": "PACKETSTORM", "id": "161012" }, { "db": "PACKETSTORM", "id": "161020" }, { "db": "PACKETSTORM", "id": "161019" }, { "db": "PACKETSTORM", "id": "161010" }, { "db": "PACKETSTORM", "id": "161015" }, { "db": "PACKETSTORM", "id": "161101" }, { "db": "PACKETSTORM", "id": "169002" } ], "trust": 3.6 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2020-25684", "trust": 4.6 }, { "db": "AUSCERT", "id": "ESB-2021.0231", "trust": 1.2 }, { "db": "CERT/CC", "id": "VU#434904", "trust": 0.8 }, { "db": "JVN", "id": "JVNVU90340376", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2020-015547", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2021-16431", "trust": 0.6 }, { "db": "PACKETSTORM", "id": "161281", "trust": 0.6 }, { "db": "PACKETSTORM", "id": "161535", "trust": 0.6 }, { "db": "PACKETSTORM", "id": "161085", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2021.0987", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2021.0420", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2021.0692", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2021.0864", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2021.0283", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2021.1088", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2021.0699", "trust": 0.6 }, { "db": "CS-HELP", "id": "SB2021122911", "trust": 0.6 }, { "db": "CS-HELP", "id": "SB2021070106", "trust": 0.6 }, { "db": "ICS CERT", "id": "ICSA-21-019-01", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202101-1611", "trust": 0.6 }, { "db": "VULMON", "id": "CVE-2020-25684", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "161012", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "161020", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "161019", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "161010", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "161015", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "161101", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "169002", "trust": 0.1 } ], "sources": [ { "db": "CERT/CC", "id": "VU#434904" }, { "db": "CNVD", "id": "CNVD-2021-16431" }, { "db": "VULMON", "id": "CVE-2020-25684" }, { "db": "JVNDB", "id": "JVNDB-2020-015547" }, { "db": "PACKETSTORM", "id": "161012" }, { "db": "PACKETSTORM", "id": "161020" }, { "db": "PACKETSTORM", "id": "161019" }, { "db": "PACKETSTORM", "id": "161010" }, { "db": "PACKETSTORM", "id": "161015" }, { "db": "PACKETSTORM", "id": "161101" }, { "db": "PACKETSTORM", "id": "169002" }, { "db": "CNNVD", "id": "CNNVD-202101-1611" }, { "db": "NVD", "id": "CVE-2020-25684" } ] }, "id": "VAR-202101-0220", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2021-16431" } ], "trust": 0.84812031 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-16431" } ] }, "last_update_date": "2024-07-23T20:21:44.763000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Top\u00a0Page", "trust": 0.8, "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00027.html" }, { "title": "Patch for Dnsmasq security feature issue vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/251931" }, { "title": "Dnsmasq Fixing measures for security feature vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=139960" }, { "title": "Red Hat: Moderate: dnsmasq security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=rhsa-20210156 - security advisory" }, { "title": "Red Hat: Moderate: dnsmasq security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=rhsa-20210240 - security advisory" }, { "title": "Red Hat: Moderate: dnsmasq security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=rhsa-20210245 - security advisory" }, { "title": "Red Hat: Moderate: dnsmasq security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=rhsa-20210153 - security advisory" }, { "title": "Red Hat: Moderate: dnsmasq security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=rhsa-20210154 - security advisory" }, { "title": "Red Hat: Moderate: dnsmasq security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=rhsa-20210155 - security advisory" }, { "title": "Red Hat: Important: Red Hat Virtualization Host security bug fix and enhancement update [ovirt-4.4.4]", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=rhsa-20210401 - security advisory" }, { "title": "Red Hat: Important: RHV-H security, bug fix, enhancement update (redhat-virtualization-host) 4.3.13", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=rhsa-20210395 - security advisory" }, { "title": "Red Hat: Important: dnsmasq security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=rhsa-20210151 - security advisory" }, { "title": "Red Hat: Important: dnsmasq security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=rhsa-20210150 - security advisory" }, { "title": "Red Hat: Important: dnsmasq security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=rhsa-20210152 - security advisory" }, { "title": "Arch Linux Issues: ", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=arch_linux_issues\u0026qid=cve-2020-25684 log" }, { "title": "Amazon Linux 2: ALAS2-2021-1587", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux2\u0026qid=alas2-2021-1587" }, { "title": "Debian Security Advisories: DSA-4844-1 dnsmasq -- security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories\u0026qid=6bdd82a7af8c0333eca753b3b7b02111" }, { "title": "Red Hat: Important: OpenShift Container Platform 4.4.33 bug fix and security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=rhsa-20210281 - security advisory" }, { "title": "Cisco: Multiple Vulnerabilities in dnsmasq DNS Forwarder Affecting Cisco Products: January 2021", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=cisco_security_advisories_and_alerts_ciscoproducts\u0026qid=cisco-sa-dnsmasq-dns-2021-c5mrdf3g" }, { "title": "dnspooq", "trust": 0.1, "url": "https://github.com/knqyf263/dnspooq " }, { "title": "multironic\nRequirements:\nInstall libvirt and prepare nodes\nhave to check why we need this\nTODO download ironic images later\nPull images\nTag images\nPush images\nrun httpd\nCheck that two vbmcs are running for the two nodes\nPlay with vbmc and ipmitools\nRun management cluster\nFirewall\nLaunch ironic\nrun capm3\nFirewall\nRef", "trust": 0.1, "url": "https://github.com/mboukhalfa/multironic " }, { "title": "Criminal IP NSE Script", "trust": 0.1, "url": "https://github.com/criminalip/cip-nse-script " }, { "title": "Intro: What\u0027s pique or repique\n\n\nOverview", "trust": 0.1, "url": "https://github.com/az-x/pique " }, { "title": "https://github.com/klcheung99/CSCM28CW2", "trust": 0.1, "url": "https://github.com/klcheung99/cscm28cw2 " }, { "title": "Kaosagnt\u0027s Ansible Everyday Utils", "trust": 0.1, "url": "https://github.com/kaosagnt/ansible-everyday " }, { "title": "F5\u306e\u8106\u5f31\u6027\u60c5\u5831", "trust": 0.1, "url": "https://github.com/dntyo/f5_vulnerability " }, { "title": "Vulnerability", "trust": 0.1, "url": "https://github.com/tzwlhack/vulnerability " }, { "title": "TOP\nTable of Contents\nDonation", "trust": 0.1, "url": "https://github.com/jerry123s/all-poc " }, { "title": "SecBooks\nSecBooks\u76ee\u5f55", "trust": 0.1, "url": "https://github.com/sexybeast233/secbooks " }, { "title": "Table of Contents", "trust": 0.1, "url": "https://github.com/cvedb/top " }, { "title": "Table of Contents", "trust": 0.1, "url": "https://github.com/cvedb/awesome-cve-repo " }, { "title": "TOP\nTable of Contents\nDonation", "trust": 0.1, "url": "https://github.com/hktalent/top " }, { "title": "TOP\nTable of Contents\nDonation", "trust": 0.1, "url": "https://github.com/cyberanand1337x/bug-bounty-2022 " }, { "title": "TOP\nTable of Contents\nDonation", "trust": 0.1, "url": "https://github.com/weeka10/-hktalent-top " }, { "title": "PoC in GitHub", "trust": 0.1, "url": "https://github.com/developer3000s/poc-in-github " }, { "title": "The Register", "trust": 0.1, "url": "https://www.theregister.co.uk/2021/01/20/dns_cache_poisoning/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-16431" }, { "db": "VULMON", "id": "CVE-2020-25684" }, { "db": "JVNDB", "id": "JVNDB-2020-015547" }, { "db": "CNNVD", "id": "CNNVD-202101-1611" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 }, { "problemtype": "Improperly implemented security checks (CWE-358) [ Other ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-015547" }, { "db": "NVD", "id": "CVE-2020-25684" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889686" }, { "trust": 2.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-25684" }, { "trust": 1.7, "url": "https://www.jsof-tech.com/disclosures/dnspooq/" }, { "trust": 1.7, "url": "https://security.gentoo.org/glsa/202101-17" }, { "trust": 1.7, "url": "https://www.debian.org/security/2021/dsa-4844" }, { "trust": 1.7, "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00027.html" }, { "trust": 1.7, "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/12135-security-advisory-61" }, { "trust": 1.2, "url": "https://www.auscert.org.au/bulletins/esb-2021.0231/" }, { "trust": 1.1, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/wyw3ir6apuskoykl5ft3actihwhgqy32/" }, { "trust": 1.1, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/qgb7hl3owhtlepsmldgomxqkg3km2qme/" }, { "trust": 0.8, "url": "cve-2020-25681 " }, { "trust": 0.8, "url": "cve-2020-25682 " }, { "trust": 0.8, "url": "cve-2020-25683 " }, { "trust": 0.8, "url": "cve-2020-25684 " }, { "trust": 0.8, "url": "cve-2020-25685 " }, { "trust": 0.8, "url": "cve-2020-25686 " }, { "trust": 0.8, "url": "cve-2020-25687 " }, { "trust": 0.8, "url": "https://jvn.jp/vu/jvnvu90340376/" }, { "trust": 0.7, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-25686" }, { "trust": 0.7, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-25685" }, { "trust": 0.6, "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/qgb7hl3owhtlepsmldgomxqkg3km2qme/" }, { "trust": 0.6, "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/wyw3ir6apuskoykl5ft3actihwhgqy32/" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/161281/red-hat-security-advisory-2021-0401-01.html" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/161535/ubuntu-security-notice-usn-4698-2.html" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/161085/gentoo-linux-security-advisory-202101-17.html" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.0699" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.0864" }, { "trust": 0.6, "url": "https://www.huawei.com/cn/psirt/security-notices/huawei-sn-20210120-01-dnspooq-cn" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.0987" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.0283/" }, { "trust": 0.6, "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-019-01" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.0692" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.1088" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.0420" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2021070106" }, { "trust": 0.6, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-dnsmasq-dns-2021-c5mrdf3g" }, { "trust": 0.6, "url": "https://www.ibm.com/blogs/psirt/security-bulletin-ibm-security-privileged-identity-manager-is-affected-by-security-vulnerabilities-cve-2020-25684-cve-2020-25685-cve-2020-25686/" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2021122911" }, { "trust": 0.5, "url": "https://access.redhat.com/security/cve/cve-2020-25685" }, { "trust": 0.5, "url": "https://access.redhat.com/security/cve/cve-2020-25684" }, { "trust": 0.5, "url": "https://access.redhat.com/security/cve/cve-2020-25686" }, { "trust": 0.5, "url": "https://access.redhat.com/articles/11258" }, { "trust": 0.5, "url": "https://access.redhat.com/security/team/contact/" }, { "trust": 0.5, "url": "https://www.redhat.com/mailman/listinfo/rhsa-announce" }, { "trust": 0.5, "url": "https://bugzilla.redhat.com/):" }, { "trust": 0.5, "url": "https://access.redhat.com/security/vulnerabilities/rhsb-2021-001" }, { "trust": 0.5, "url": "https://access.redhat.com/security/team/key/" }, { "trust": 0.4, "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "trust": 0.2, "url": "https://access.redhat.com/errata/rhsa-2021:0156" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-25682" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-25687" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-25683" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-25681" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://github.com/knqyf263/dnspooq" }, { "trust": 0.1, "url": "https://security.archlinux.org/cve-2020-25684" }, { "trust": 0.1, "url": "https://access.redhat.com/security/updates/classification/#important" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-25682" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-25687" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2021:0150" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-25681" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-25683" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2021:0155" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2021:0154" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/dnsmasq/2.75-1ubuntu0.16.04.7" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-14834" }, { "trust": 0.1, "url": "https://usn.ubuntu.com/4698-1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/dnsmasq/2.79-1ubuntu0.2" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/dnsmasq/2.82-1ubuntu1.1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/dnsmasq/2.80-1.1ubuntu1.2" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2021:0245" }, { "trust": 0.1, "url": "https://www.debian.org/security/faq" }, { "trust": 0.1, "url": "https://security-tracker.debian.org/tracker/dnsmasq" }, { "trust": 0.1, "url": "https://www.debian.org/security/" } ], "sources": [ { "db": "CERT/CC", "id": "VU#434904" }, { "db": "CNVD", "id": "CNVD-2021-16431" }, { "db": "VULMON", "id": "CVE-2020-25684" }, { "db": "JVNDB", "id": "JVNDB-2020-015547" }, { "db": "PACKETSTORM", "id": "161012" }, { "db": "PACKETSTORM", "id": "161020" }, { "db": "PACKETSTORM", "id": "161019" }, { "db": "PACKETSTORM", "id": "161010" }, { "db": "PACKETSTORM", "id": "161015" }, { "db": "PACKETSTORM", "id": "161101" }, { "db": "PACKETSTORM", "id": "169002" }, { "db": "CNNVD", "id": "CNNVD-202101-1611" }, { "db": "NVD", "id": "CVE-2020-25684" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CERT/CC", "id": "VU#434904" }, { "db": "CNVD", "id": "CNVD-2021-16431" }, { "db": "VULMON", "id": "CVE-2020-25684" }, { "db": "JVNDB", "id": "JVNDB-2020-015547" }, { "db": "PACKETSTORM", "id": "161012" }, { "db": "PACKETSTORM", "id": "161020" }, { "db": "PACKETSTORM", "id": "161019" }, { "db": "PACKETSTORM", "id": "161010" }, { "db": "PACKETSTORM", "id": "161015" }, { "db": "PACKETSTORM", "id": "161101" }, { "db": "PACKETSTORM", "id": "169002" }, { "db": "CNNVD", "id": "CNNVD-202101-1611" }, { "db": "NVD", "id": "CVE-2020-25684" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-01-19T00:00:00", "db": "CERT/CC", "id": "VU#434904" }, { "date": "2021-03-11T00:00:00", "db": "CNVD", "id": "CNVD-2021-16431" }, { "date": "2021-01-20T00:00:00", "db": "VULMON", "id": "CVE-2020-25684" }, { "date": "2021-10-04T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-015547" }, { "date": "2021-01-19T14:45:12", "db": "PACKETSTORM", "id": "161012" }, { "date": "2021-01-19T14:46:21", "db": "PACKETSTORM", "id": "161020" }, { "date": "2021-01-19T14:46:12", "db": "PACKETSTORM", "id": "161019" }, { "date": "2021-01-19T14:43:50", "db": "PACKETSTORM", "id": "161010" }, { "date": "2021-01-19T14:45:36", "db": "PACKETSTORM", "id": "161015" }, { "date": "2021-01-25T17:28:57", "db": "PACKETSTORM", "id": "161101" }, { "date": "2021-02-28T20:12:00", "db": "PACKETSTORM", "id": "169002" }, { "date": "2021-01-20T00:00:00", "db": "CNNVD", "id": "CNNVD-202101-1611" }, { "date": "2021-01-20T16:15:14.163000", "db": "NVD", "id": "CVE-2020-25684" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-10-06T00:00:00", "db": "CERT/CC", "id": "VU#434904" }, { "date": "2021-03-11T00:00:00", "db": "CNVD", "id": "CNVD-2021-16431" }, { "date": "2023-11-07T00:00:00", "db": "VULMON", "id": "CVE-2020-25684" }, { "date": "2021-10-04T08:30:00", "db": "JVNDB", "id": "JVNDB-2020-015547" }, { "date": "2022-03-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202101-1611" }, { "date": "2023-11-07T03:20:22.107000", "db": "NVD", "id": "CVE-2020-25684" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "PACKETSTORM", "id": "161010" }, { "db": "CNNVD", "id": "CNNVD-202101-1611" } ], "trust": 0.7 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Dnsmasq is vulnerable to memory corruption and cache poisoning", "sources": [ { "db": "CERT/CC", "id": "VU#434904" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202101-1611" } ], "trust": 0.6 } }
cisco-sa-dnsmasq-dns-2021-c5mrdf3g
Vulnerability from csaf_cisco
Notes
{ "document": { "acknowledgments": [ { "summary": "Cisco would like to thank Moshe Kol and Shlomi Oberman of JSOF for reporting these vulnerabilities, which were investigated and disclosed under the coordination of CERT/CC." } ], "category": "csaf_security_advisory", "csaf_version": "2.0", "notes": [ { "category": "summary", "text": "A set of previously unknown vulnerabilities in the DNS forwarder implementation of dnsmasq were disclosed on January 19, 2021. The vulnerabilities are collectively known as DNSpooq.\r\n\r\nExploitation of these vulnerabilities could result in remote code execution or denial of service (DoS), or may allow an attacker to more easily forge DNS answers that can poison DNS caches, depending on the specific vulnerability.\r\n\r\nMultiple Cisco products are affected by these vulnerabilities.\r\n\r\nCisco will release software updates that address these vulnerabilities. Any workarounds for a specific Cisco product or service will be documented in the relevant Cisco bugs, which are identified in the Vulnerable Products [\"#vp\"] section of this advisory.\r\n\r\nNote: At the time of publication, no Cisco products were found to be affected by the remote code execution and DoS vulnerabilities, which are identified by the following Common Vulnerabilities and Exposures (CVE) IDs:\r\n\r\n\r\nCVE-2020-25681\r\nCVE-2020-25682\r\nCVE-2020-25683\r\nCVE-2020-25687\r\n\r\nThis advisory is available at the following link:\r\nhttps://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dnsmasq-dns-2021-c5mrdf3g [\"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dnsmasq-dns-2021-c5mrdf3g\"]", "title": "Summary" }, { "category": "general", "text": "Cisco investigated its product line to determine which products may be affected by these vulnerabilities.\r\n\r\nThe Vulnerable Products [\"#vp\"] section includes Cisco bug IDs for each affected product or service. The bugs are accessible through the Cisco Bug Search Tool [\"https://bst.cloudapps.cisco.com/bugsearch/bug/BUGID\"] and contain additional platform-specific information, including workarounds (if available) and fixed software releases.\r\n\r\nAny product or service not listed in Vulnerable Products [\"#vp\"] section of this advisory is to be considered not vulnerable.", "title": "Affected Products" }, { "category": "general", "text": "For information about which Cisco software releases are vulnerable, see the Fixed Software [\"#fs\"] section of this advisory.\r\n\r\nAt the time of this investigation, no Cisco products have been found to be affected by the remote code execution and DoS vulnerabilities.\r\n\r\nMultiple Cisco products have been found to be susceptible to DNS cache poisoning attacks. The following table lists Cisco products that have been found to be susceptible to DNS cache poisoning attacks.\r\n\r\nIf a future release date is indicated for software, the date provided represents an estimate based on all information known to Cisco as of the Last Updated date at the top of the advisory. Availability dates are subject to change based on a number of factors, including satisfactory testing results and delivery of other priority features and fixes. If no version or date is listed for an affected component (indicated by a blank field and/or an advisory designation of Interim), Cisco is continuing to evaluate the fix and will update the advisory as additional information becomes available. After the advisory is marked Final, customers should refer to the associated Cisco bug(s) for further details.\r\n Product Cisco Bug ID Fixed Release Availability Network Management and Provisioning Cisco Aironet 1560 Series Access Points CSCvv83754 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83754\"] Wireless LAN Controller:\r\n8.10.151.0\r\n8.5.171.0\r\n\r\nCatalyst 9800 Wireless Controller:\r\n16.12.5\r\n17.3.3\r\n17.5.1 (Mar 2021) Cisco Aironet 1810 Series OfficeExtend Access Points CSCvv83754 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83754\"] Wireless LAN Controller:\r\n8.10.151.0\r\n8.5.171.0\r\n\r\nCatalyst 9800 Wireless Controller:\r\n16.12.5\r\n17.3.3\r\n17.5.1 (Mar 2021) Cisco Aironet 1810w Series Access Points CSCvv83754 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83754\"] Wireless LAN Controller:\r\n8.10.151.0\r\n8.5.171.0\r\n\r\nCatalyst 9800 Wireless Controller:\r\n16.12.5\r\n17.3.3\r\n17.5.1 (Mar 2021) Cisco Aironet 1815 Series Access Points CSCvv83754 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83754\"] Wireless LAN Controller:\r\n8.10.151.0\r\n8.5.171.0\r\n\r\nCatalyst 9800 Wireless Controller:\r\n16.12.5\r\n17.3.3\r\n17.5.1 (Mar 2021) Cisco Aironet 1830 Series Access Points CSCvv83754 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83754\"] Wireless LAN Controller:\r\n8.10.151.0\r\n8.5.171.0\r\n\r\nCatalyst 9800 Wireless Controller:\r\n16.12.5\r\n17.3.3\r\n17.5.1 (Mar 2021) Cisco Aironet 1850 Series Access Points CSCvv83754 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83754\"] Wireless LAN Controller:\r\n8.10.151.0\r\n8.5.171.0\r\n\r\nCatalyst 9800 Wireless Controller:\r\n16.12.5\r\n17.3.3\r\n17.5.1 (Mar 2021) Cisco Aironet 2800 Series Access Points CSCvv83754 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83754\"] Wireless LAN Controller:\r\n8.10.151.0\r\n8.5.171.0\r\n\r\nCatalyst 9800 Wireless Controller:\r\n16.12.5\r\n17.3.3\r\n17.5.1 (Mar 2021) Cisco Aironet 3800 Series Access Points CSCvv83754 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83754\"] Wireless LAN Controller:\r\n8.10.151.0\r\n8.5.171.0\r\n\r\nCatalyst 9800 Wireless Controller:\r\n16.12.5\r\n17.3.3\r\n17.5.1 (Mar 2021) Cisco Aironet 4800 Access Points CSCvv83754 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83754\"] Wireless LAN Controller:\r\n8.10.151.0\r\n8.5.171.0\r\n\r\nCatalyst 9800 Wireless Controller:\r\n16.12.5\r\n17.3.3\r\n17.5.1 (Mar 2021) Cisco Business 100 Series Access Points CSCvv83754 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83754\"] 10.4.1.0 (Mar 2021) Cisco Business 200 Series Access Points CSCvv83754 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83754\"] 10.4.1.0 (Mar 2021) Cisco Catalyst 9100 Access Points CSCvv83754 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83754\"] Wireless LAN Controller:\r\n8.10.151.0\r\n\r\nCatalyst 9800 Wireless Controller:\r\n16.12.5\r\n17.3.3\r\n17.5.1 (Mar 2021) Cisco Catalyst IW6300 Access Points CSCvv83754 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83754\"] Wireless LAN Controller:\r\n8.10.151.0\r\n\r\nCatalyst 9800 Wireless Controller:\r\n16.12.5\r\n17.3.3\r\n17.5.1 (Mar 2021) Cisco ESW6300 Series Access Points CSCvv83754 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83754\"] Wireless LAN Controller:\r\n8.10.151.0\r\n\r\nCatalyst 9800 Wireless Controller:\r\n16.12.5\r\n17.3.3\r\n17.5.1 (Mar 2021) Cisco Policy Suite CSCvv83241 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83241\"] 21.1.0 Routing and Switching - Enterprise and Service Provider Cisco 1000 Series Connected Grid Routers (CGR1000 compute module) CSCvv84554 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv84554\"] 15.9(3)M4 (Jul 2021) Cisco IR800 Integrated Services Router (Guest OS) CSCvv84553 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv84553\"] 15.9(3)M4 (Jul 2021) Cisco Wireless Gateway for LoRaWAN CSCvw00914 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvw00914\"] 2.1.0.3 (Mar 2021) Meraki Products Cisco Meraki MR (all models) N/A Release no. TBD (Aug 2021) Cisco Meraki MS (all models) N/A Release no. TBD (Aug 2021) Cisco Meraki MV (all models) N/A Release no. TBD (Aug 2021) Cisco Meraki MX (all models) N/A Release no. TBD (Aug 2021) Cisco Meraki Z-Series (all models) N/A Release no. TBD (Aug 2021) Routing and Switching - Small Business Cisco RV042 Dual WAN VPN Router CSCvv83789 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83789\"] None planned Cisco RV042G Dual Gigabit WAN VPN Router CSCvv83789 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83789\"] None planned Cisco RV160x VPN Router CSCvv83787 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83787\"] 1.0.02.x (Mar 2021) Cisco RV260x VPN Router CSCvv83788 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83788\"] 1.0.02.x (Mar 2021) Cisco RV340W Dual WAN Gigabit Wireless-AC VPN Router CSCvv83239 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83239\"] 1.0.04.x (Mar 2021) Cisco Small Business RV Series RV110W Wireless-N VPN Firewall CSCvv83235 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83235\"] None planned Cisco Small Business RV Series RV215W Wireless-N VPN Router CSCvv83237 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83237\"] None planned Cisco Small Business RV Series RV320 Dual Gigabit WAN VPN Router CSCvv83238 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83238\"] None planned Cisco Small Business RV Series RV325 Dual WAN VPN Router CSCvv83816 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83816\"] None planned Cisco Small Business RV130 Series VPN Routers CSCvv83791 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83791\"] None planned Cisco Small Business RV130 VPN Router CSCvv83236 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83236\"] None planned Unified Computing Cisco Enterprise NFV Infrastructure Software (NFVIS) CSCvw00975 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvw00975\"] 4.5 (Mar 2021) Voice and Unified Communications Devices Cisco IP Conference Phone 7832 CSCvv83246 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83246\"] 14.0 (Mar 2021) Cisco IP Conference Phone 8832 CSCvv83250 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83250\"] 14.0 (Mar 2021) Cisco IP Phone 6800 Series with Multiplatform Firmware CSCvv83248 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83248\"] 11.3.4 (Jun 2021) Cisco IP Phone 6821 with Multiplatform Firmware CSCvw00982 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvw00982\"] 11.3.4 (Jun 2021) Cisco IP Phone 7800 Series with Multiplatform Firmware CSCvv83243 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83243\"] 11.3.4 (Jun 2021) Cisco IP Phone 7800 Series CSCvv83249 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83249\"] 14.0 (Mar 2021) Cisco IP Phone 8800 Series with Multiplatform Firmware CSCvv83242 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83242\"] 11.3.4 (Jun 2021) Cisco IP Phone 8800 Series CSCvv83242 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83242\"] 14.0 (Mar 2021) Cisco IP Phone 8865 CSCvv83245 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83245\"] 14.0 (Mar 2021) Cisco SPA112 2-Port Phone Adapter CSCvv83234 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83234\"] None planned Cisco SPA122 Analog Telephone Adapter (ATA) with Router CSCvv83234 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83234\"] None planned Cisco SPA232D Multi-Line DECT Analog Telephone Adapter (ATA) CSCvv83234 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83234\"] None planned Cisco Unified IP Phone 9951 CSCvv83247 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83247\"]\r\nNone planned Cisco Unified IP Phone 9971 CSCvv83247 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83247\"]\r\nNone planned Cisco Wireless IP Phone 8821 CSCvw00918 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvw00918\"] 11.0(6)SR1 (Apr 2021) Video, Streaming, TelePresence, and Transcoding Devices Cisco Expressway Series CSCvv83227 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83227\"] X12.7.1 Cisco TelePresence Video Communication Server (VCS) CSCvv83227 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83227\"] X12.7.1 Cisco Cloud Hosted Services Cisco IP Phone 6800 Series CSCvw01205 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvw01205\"] 11.3.4 (Jun 2021) Cisco Spark Calling CSCvw00907 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvw00907\"] X12.7.1 (Feb 2021) Cisco Webex Teams (formerly Cisco Spark) CSCvv83214 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83214\"] None planned Cisco Webex Room Phone CSCvv87082 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv87082\"] 1.2(0)SR1 (Aug 2021)", "title": "Vulnerable Products" }, { "category": "general", "text": "Only products listed in the Vulnerable Products [\"#vp\"] section of this advisory are known to be affected by these vulnerabilities.\r\n\r\nCisco products that do not offer DNS server capabilities are not affected by these vulnerabilities. Cisco has also confirmed that Cisco IOS XE Software is not affected by any of these vulnerabilities.\r\n\r\nAt the time of publication, no Cisco products were found to be affected by the vulnerabilities identified by the following Common Vulnerabilities and Exposures (CVE) IDs:\r\n\r\nCVE-2020-25681\r\nCVE-2020-25682\r\nCVE-2020-25683\r\nCVE-2020-25687", "title": "Products Confirmed Not Vulnerable" }, { "category": "general", "text": "Remote Code Execution and Denial of Service Vulnerabilities\r\n\r\nMultiple vulnerabilities in the DNSSEC implementation of dnsmasq could allow an unauthenticated, remote attacker to execute arbitrary code or cause a denial of service (DoS) condition on an affected device.\r\n\r\nThe vulnerabilities are due to improper memory management when the affected software processes DNS packets with DNSSEC data. An attacker could exploit these vulnerabilities by sending malicious DNS packets to be processed by the affected device.\r\n\r\nWhen these packets are processed, an exploitable overflow condition may occur. A successful exploit could allow the attacker to execute arbitrary code with the privileges of the underlying dnsmasq software or cause DoS condition on the affected device.\r\n\r\nThese vulnerabilities affect dnsmasq installations that match all of the following criteria:\r\n\r\nInclude a vulnerable release of dnsmasq\r\nCapable of acting as a DNS server\r\nCapable of validating DNSSEC data\r\n\r\nThese vulnerabilities have been assigned the following CVE IDs:\r\n\r\n\r\nCVE-2020-25681\r\nCVE-2020-25682\r\nCVE-2020-25683\r\nCVE-2020-25687\r\n\r\nAt the time of this investigation, no Cisco products have been found to be affected by these vulnerabilities.\r\n\r\nDNS Cache Poisoning Attacks\r\n\r\nMultiple weaknesses in the DNS server functionality of dnsmasq could allow an unauthenticated, remote attacker to more easily forge DNS answers that can poison DNS caches.\r\n\r\nEach weakness results in dnsmasq accepting DNS answers based on checks that are performed on an amount of entropy that is lower than what is mandated by RFC 5452. The combination of these weaknesses would allow an attacker to mount a successful DNS cache poisoning attack with low traffic requirements.\r\n\r\nThese weaknesses affect dnsmasq installations that match all of the following criteria:\r\n\r\nInclude a vulnerable release of dnsmasq\r\nCapable of acting as a DNS server\r\nCapable of caching DNS responses\r\n\r\nThese weaknesses have been assigned the following CVE IDs:\r\n\r\nCVE-2020-25684\r\nCVE-2020-25685\r\nCVE-2020-25686\r\n\r\nMultiple Cisco products have been found to be susceptible to DNS cache poisoning attacks.", "title": "Details" }, { "category": "general", "text": "Any workarounds for a specific Cisco product or service will be documented in the relevant Cisco bugs, which are identified in the Vulnerable Products [\"#vp\"] section of this advisory.", "title": "Workarounds" }, { "category": "general", "text": "For information about fixed software releases [\"https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#fixes\"], consult the Cisco bugs identified in the Vulnerable Products [\"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dnsmasq-dns-2021-c5mrdf3g#vp\"] section of this advisory.\r\n\r\nWhen considering software upgrades [\"https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#fixes\"], customers are advised to regularly consult the advisories for Cisco products, which are available from the Cisco Security Advisories page [\"https://www.cisco.com/go/psirt\"], to determine exposure and a complete upgrade solution.\r\n\r\nIn all cases, customers should ensure that the devices to be upgraded contain sufficient memory and confirm that current hardware and software configurations will continue to be supported properly by the new release. If the information is not clear, customers are advised to contact the Cisco Technical Assistance Center (TAC) or their contracted maintenance providers.", "title": "Fixed Software" }, { "category": "general", "text": "To learn about Cisco security vulnerability disclosure policies and publications, see the Security Vulnerability Policy [\"https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html\"]. This document also contains instructions for obtaining fixed software and receiving security vulnerability information from Cisco.", "title": "Vulnerability Policy" }, { "category": "general", "text": "The Cisco Product Security Incident Response Team (PSIRT) is aware that proof-of-concept exploit code is available for the vulnerabilities that are described in this advisory.\r\n\r\nCisco PSIRT is not aware of any malicious use of the vulnerabilities that are described in this advisory.", "title": "Exploitation and Public Announcements" }, { "category": "general", "text": "Cisco would like to thank Moshe Kol and Shlomi Oberman of JSOF for reporting these vulnerabilities, which were investigated and disclosed under the coordination of CERT/CC.", "title": "Source" }, { "category": "legal_disclaimer", "text": "THIS DOCUMENT IS PROVIDED ON AN \"AS IS\" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.\r\n\r\nA standalone copy or paraphrase of the text of this document that omits the distribution URL is an uncontrolled copy and may lack important information or contain factual errors. The information in this document is intended for end users of Cisco products.", "title": "Legal Disclaimer" } ], "publisher": { "category": "vendor", "contact_details": "Emergency Support:\r\n+1 877 228 7302 (toll-free within North America)\r\n+1 408 525 6532 (International direct-dial)\r\nNon-emergency Support:\r\nEmail: psirt@cisco.com\r\nSupport requests that are received via e-mail are typically acknowledged within 48 hours.", "issuing_authority": "Cisco product security incident response is the responsibility of the Cisco Product Security Incident Response Team (PSIRT). The Cisco PSIRT is a dedicated, global team that manages the receipt, investigation, and public reporting of security vulnerability information that is related to Cisco products and networks. The on-call Cisco PSIRT works 24x7 with Cisco customers, independent security researchers, consultants, industry organizations, and other vendors to identify possible security issues with Cisco products and networks.\r\nMore information can be found in Cisco Security Vulnerability Policy available at https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html", "name": "Cisco", "namespace": "https://wwww.cisco.com" }, "references": [ { "category": "self", "summary": "Multiple Vulnerabilities in dnsmasq DNS Forwarder Affecting Cisco Products: January 2021", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dnsmasq-dns-2021-c5mrdf3g" }, { "category": "external", "summary": "Cisco Security Vulnerability Policy", "url": "https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html" }, { "category": "external", "summary": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dnsmasq-dns-2021-c5mrdf3g", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dnsmasq-dns-2021-c5mrdf3g" }, { "category": "external", "summary": "Cisco\u0026nbsp;Bug Search Tool", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/BUGID" }, { "category": "external", "summary": "CSCvv83754", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83754" }, { "category": "external", "summary": "CSCvv83754", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83754" }, { "category": "external", "summary": "CSCvv83754", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83754" }, { "category": "external", "summary": "CSCvv83754", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83754" }, { "category": "external", "summary": "CSCvv83754", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83754" }, { "category": "external", "summary": "CSCvv83754", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83754" }, { "category": "external", "summary": "CSCvv83754", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83754" }, { "category": "external", "summary": "CSCvv83754", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83754" }, { "category": "external", "summary": "CSCvv83754", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83754" }, { "category": "external", "summary": "CSCvv83754", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83754" }, { "category": "external", "summary": "CSCvv83754", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83754" }, { "category": "external", "summary": "CSCvv83754", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83754" }, { "category": "external", "summary": "CSCvv83754", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83754" }, { "category": "external", "summary": "CSCvv83754", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83754" }, { "category": "external", "summary": "CSCvv83241", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83241" }, { "category": "external", "summary": "CSCvv84554", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv84554" }, { "category": "external", "summary": "CSCvv84553", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv84553" }, { "category": "external", "summary": "CSCvw00914", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvw00914" }, { "category": "external", "summary": "CSCvv83789", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83789" }, { "category": "external", "summary": "CSCvv83789", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83789" }, { "category": "external", "summary": "CSCvv83787", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83787" }, { "category": "external", "summary": "CSCvv83788", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83788" }, { "category": "external", "summary": "CSCvv83239", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83239" }, { "category": "external", "summary": "CSCvv83235", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83235" }, { "category": "external", "summary": "CSCvv83237", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83237" }, { "category": "external", "summary": "CSCvv83238", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83238" }, { "category": "external", "summary": "CSCvv83816", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83816" }, { "category": "external", "summary": "CSCvv83791", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83791" }, { "category": "external", "summary": "CSCvv83236", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83236" }, { "category": "external", "summary": "CSCvw00975", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvw00975" }, { "category": "external", "summary": "CSCvv83246", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83246" }, { "category": "external", "summary": "CSCvv83250", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83250" }, { "category": "external", "summary": "CSCvv83248", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83248" }, { "category": "external", "summary": "CSCvw00982", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvw00982" }, { "category": "external", "summary": "CSCvv83243", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83243" }, { "category": "external", "summary": "CSCvv83249", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83249" }, { "category": "external", "summary": "CSCvv83242", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83242" }, { "category": "external", "summary": "CSCvv83242", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83242" }, { "category": "external", "summary": "CSCvv83245", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83245" }, { "category": "external", "summary": "CSCvv83234", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83234" }, { "category": "external", "summary": "CSCvv83234", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83234" }, { "category": "external", "summary": "CSCvv83234", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83234" }, { "category": "external", "summary": "CSCvv83247", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83247" }, { "category": "external", "summary": "CSCvv83247", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83247" }, { "category": "external", "summary": "CSCvw00918", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvw00918" }, { "category": "external", "summary": "CSCvv83227", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83227" }, { "category": "external", "summary": "CSCvv83227", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83227" }, { "category": "external", "summary": "CSCvw01205", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvw01205" }, { "category": "external", "summary": "CSCvw00907", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvw00907" }, { "category": "external", "summary": "CSCvv83214", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83214" }, { "category": "external", "summary": "CSCvv87082", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv87082" }, { "category": "external", "summary": "fixed software releases", "url": "https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#fixes" }, { "category": "external", "summary": "Vulnerable Products", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dnsmasq-dns-2021-c5mrdf3g#vp" }, { "category": "external", "summary": "considering software upgrades", "url": "https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#fixes" }, { "category": "external", "summary": "Cisco\u0026nbsp;Security Advisories page", "url": "https://www.cisco.com/go/psirt" }, { "category": "external", "summary": "Security Vulnerability Policy", "url": "https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html" } ], "title": "Multiple Vulnerabilities in dnsmasq DNS Forwarder Affecting Cisco Products: January 2021", "tracking": { "current_release_date": "2021-08-30T17:24:42+00:00", "generator": { "date": "2022-10-22T03:10:44+00:00", "engine": { "name": "TVCE" } }, "id": "cisco-sa-dnsmasq-dns-2021-c5mrdf3g", "initial_release_date": "2021-01-19T12:15:00+00:00", "revision_history": [ { "date": "2021-01-19T12:05:02+00:00", "number": "1.0.0", "summary": "Initial public release." }, { "date": "2021-02-02T17:34:33+00:00", "number": "1.1.0", "summary": "Updated fixed release availability information for Cisco Meraki devices, Cisco Access Points, Cisco IR800 Integrated Services Router, and Cisco 1000 Series Connected Grid Routers." }, { "date": "2021-03-09T12:32:04+00:00", "number": "1.2.0", "summary": "Updated fixed release availability information." }, { "date": "2021-04-26T12:02:10+00:00", "number": "1.3.0", "summary": "Updated list of products confirmed not vulnerable. Removed list of products under investigation." }, { "date": "2021-08-30T17:24:42+00:00", "number": "1.4.0", "summary": "Updated Webex Room Phone fixed release." } ], "status": "final", "version": "1.4.0" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_family", "name": "Cisco NX-OS Software", "product": { "name": "Cisco NX-OS Software ", "product_id": "CSAFPID-80720" } }, { "category": "product_family", "name": "Cisco Identity Services Engine Software", "product": { "name": "Cisco Identity Services Engine Software ", "product_id": "CSAFPID-111903" } }, { "category": "product_family", "name": "Cisco TelePresence Video Communication Server (VCS) Expressway", "product": { "name": "Cisco TelePresence Video Communication Server (VCS) Expressway ", "product_id": "CSAFPID-209614" } }, { "category": "product_family", "name": "Cisco Session Initiation Protocol (SIP) Software", "product": { "name": "Cisco Session Initiation Protocol (SIP) Software ", "product_id": "CSAFPID-277608" } } ], "category": "vendor", "name": "Cisco" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-25683", "ids": [ { "system_name": "Cisco Bug ID", "text": "CSCvx66581" }, { "system_name": "Cisco Bug ID", "text": "CSCvx66584" }, { "system_name": "Cisco Bug ID", "text": "CSCvx17339" }, { "system_name": "Cisco Bug ID", "text": "CSCvx20637" }, { "system_name": "Cisco Bug ID", "text": "CSCvv83232" }, { "system_name": "Cisco Bug ID", "text": "CSCvw00918" } ], "notes": [ { "category": "other", "text": "Complete.", "title": "Affected Product Comprehensiveness" } ], "product_status": { "known_affected": [ "CSAFPID-80720", "CSAFPID-209614", "CSAFPID-111903", "CSAFPID-277608" ] }, "release_date": "2021-01-19T12:15:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "Cisco has released software updates that address this vulnerability.", "product_ids": [ "CSAFPID-80720", "CSAFPID-277608", "CSAFPID-209614", "CSAFPID-111903" ], "url": "https://software.cisco.com" } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-80720", "CSAFPID-209614", "CSAFPID-111903", "CSAFPID-277608" ] } ], "title": "vuln-CVE-2020-25683" }, { "cve": "CVE-2020-25687", "ids": [ { "system_name": "Cisco Bug ID", "text": "CSCvv83232" }, { "system_name": "Cisco Bug ID", "text": "CSCvx17339" }, { "system_name": "Cisco Bug ID", "text": "CSCvx20637" }, { "system_name": "Cisco Bug ID", "text": "CSCvx66581" }, { "system_name": "Cisco Bug ID", "text": "CSCvx66584" }, { "system_name": "Cisco Bug ID", "text": "CSCvw00918" } ], "notes": [ { "category": "other", "text": "Complete.", "title": "Affected Product Comprehensiveness" } ], "product_status": { "known_affected": [ "CSAFPID-111903", "CSAFPID-209614", "CSAFPID-80720", "CSAFPID-277608" ] }, "release_date": "2021-01-19T12:15:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "Cisco has released software updates that address this vulnerability.", "product_ids": [ "CSAFPID-80720", "CSAFPID-277608", "CSAFPID-209614", "CSAFPID-111903" ], "url": "https://software.cisco.com" } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-111903", "CSAFPID-209614", "CSAFPID-80720", "CSAFPID-277608" ] } ], "title": "vuln-CVE-2020-25687" }, { "cve": "CVE-2020-25681", "ids": [ { "system_name": "Cisco Bug ID", "text": "CSCvx20637" }, { "system_name": "Cisco Bug ID", "text": "CSCvx66581" }, { "system_name": "Cisco Bug ID", "text": "CSCvx66584" }, { "system_name": "Cisco Bug ID", "text": "CSCvw00918" }, { "system_name": "Cisco Bug ID", "text": "CSCvv83232" } ], "notes": [ { "category": "other", "text": "Complete.", "title": "Affected Product Comprehensiveness" } ], "product_status": { "known_affected": [ "CSAFPID-209614", "CSAFPID-80720", "CSAFPID-277608", "CSAFPID-111903" ] }, "release_date": "2021-01-19T12:15:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "Cisco has released software updates that address this vulnerability.", "product_ids": [ "CSAFPID-80720", "CSAFPID-277608", "CSAFPID-209614", "CSAFPID-111903" ], "url": "https://software.cisco.com" } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-209614", "CSAFPID-80720", "CSAFPID-277608", "CSAFPID-111903" ] } ], "title": "vuln-CVE-2020-25681" }, { "cve": "CVE-2020-25682", "ids": [ { "system_name": "Cisco Bug ID", "text": "CSCvx20637" }, { "system_name": "Cisco Bug ID", "text": "CSCvw00918" }, { "system_name": "Cisco Bug ID", "text": "CSCvv83232" }, { "system_name": "Cisco Bug ID", "text": "CSCvx66581" }, { "system_name": "Cisco Bug ID", "text": "CSCvx66584" } ], "notes": [ { "category": "other", "text": "Complete.", "title": "Affected Product Comprehensiveness" } ], "product_status": { "known_affected": [ "CSAFPID-209614", "CSAFPID-277608", "CSAFPID-111903", "CSAFPID-80720" ] }, "release_date": "2021-01-19T12:15:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "Cisco has released software updates that address this vulnerability.", "product_ids": [ "CSAFPID-80720", "CSAFPID-277608", "CSAFPID-209614", "CSAFPID-111903" ], "url": "https://software.cisco.com" } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-209614", "CSAFPID-277608", "CSAFPID-111903", "CSAFPID-80720" ] } ], "title": "vuln-CVE-2020-25682" }, { "cve": "CVE-2020-25686", "ids": [ { "system_name": "Cisco Bug ID", "text": "CSCvw00918" }, { "system_name": "Cisco Bug ID", "text": "CSCvx66581" }, { "system_name": "Cisco Bug ID", "text": "CSCvx66584" }, { "system_name": "Cisco Bug ID", "text": "CSCvx17339" }, { "system_name": "Cisco Bug ID", "text": "CSCvx20637" }, { "system_name": "Cisco Bug ID", "text": "CSCvv83232" } ], "notes": [ { "category": "other", "text": "Complete.", "title": "Affected Product Comprehensiveness" } ], "product_status": { "known_affected": [ "CSAFPID-277608", "CSAFPID-80720", "CSAFPID-209614", "CSAFPID-111903" ] }, "release_date": "2021-01-19T12:15:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "Cisco has released software updates that address this vulnerability.", "product_ids": [ "CSAFPID-80720", "CSAFPID-277608", "CSAFPID-209614", "CSAFPID-111903" ], "url": "https://software.cisco.com" } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "CSAFPID-277608", "CSAFPID-80720", "CSAFPID-209614", "CSAFPID-111903" ] } ], "title": "vuln-CVE-2020-25686" }, { "cve": "CVE-2020-25685", "ids": [ { "system_name": "Cisco Bug ID", "text": "CSCvx20637" }, { "system_name": "Cisco Bug ID", "text": "CSCvw00918" }, { "system_name": "Cisco Bug ID", "text": "CSCvv83232" }, { "system_name": "Cisco Bug ID", "text": "CSCvx66581" }, { "system_name": "Cisco Bug ID", "text": "CSCvx66584" } ], "notes": [ { "category": "other", "text": "Complete.", "title": "Affected Product Comprehensiveness" } ], "product_status": { "known_affected": [ "CSAFPID-209614", "CSAFPID-277608", "CSAFPID-111903", "CSAFPID-80720" ] }, "release_date": "2021-01-19T12:15:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "Cisco has released software updates that address this vulnerability.", "product_ids": [ "CSAFPID-80720", "CSAFPID-277608", "CSAFPID-209614", "CSAFPID-111903" ], "url": "https://software.cisco.com" } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "CSAFPID-209614", "CSAFPID-277608", "CSAFPID-111903", "CSAFPID-80720" ] } ], "title": "vuln-CVE-2020-25685" }, { "cve": "CVE-2020-25684", "ids": [ { "system_name": "Cisco Bug ID", "text": "CSCvw00918" }, { "system_name": "Cisco Bug ID", "text": "CSCvv83232" }, { "system_name": "Cisco Bug ID", "text": "CSCvx66581" }, { "system_name": "Cisco Bug ID", "text": "CSCvx66584" }, { "system_name": "Cisco Bug ID", "text": "CSCvx20637" } ], "notes": [ { "category": "other", "text": "Complete.", "title": "Affected Product Comprehensiveness" } ], "product_status": { "known_affected": [ "CSAFPID-277608", "CSAFPID-111903", "CSAFPID-80720", "CSAFPID-209614" ] }, "release_date": "2021-01-19T12:15:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "Cisco has released software updates that address this vulnerability.", "product_ids": [ "CSAFPID-80720", "CSAFPID-277608", "CSAFPID-209614", "CSAFPID-111903" ], "url": "https://software.cisco.com" } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "CSAFPID-277608", "CSAFPID-111903", "CSAFPID-80720", "CSAFPID-209614" ] } ], "title": "Multiple Vulnerabilities in dnsmasq DNS server affecting Cisco Products: January 2021" } ] }
wid-sec-w-2023-2836
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Dnsmasq ist ein leichtgewichtiger DNS- und DHCP Server.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in dnsmasq und mehreren Cisco Produkten ausnutzen, um beliebigen Programmcode auszuf\u00fchren und um den DNS Cache zu manipulieren.", "title": "Angriff" }, { "category": "general", "text": "- UNIX\n- Linux\n- CISCO Appliance\n- Appliance", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2023-2836 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2021/wid-sec-w-2023-2836.json" }, { "category": "self", "summary": "WID-SEC-2023-2836 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-2836" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2023-12971 vom 2023-11-06", "url": "https://linux.oracle.com/errata/ELSA-2023-12971.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2023-12972 vom 2023-11-06", "url": "https://linux.oracle.com/errata/ELSA-2023-12972.html" }, { "category": "external", "summary": "Debian Security Advisory DLA-2604 vom 2021-03-22", "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00027.html" }, { "category": "external", "summary": "Cisco Security Advisory CISCO-SA-DNSMASQ-DNS-2021-C5MRDF3G vom 2021-01-18", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dnsmasq-dns-2021-c5mrdf3g" }, { "category": "external", "summary": "DNSpooq Attack vom 2021-01-18", "url": "https://www.jsof-tech.com/disclosures/dnspooq/" }, { "category": "external", "summary": "Arista Security Advisory 61 vom 2021-01-19", "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/12135-security-advisory-61" }, { "category": "external", "summary": "Ubuntu Security Notice USN-4698-1 vom 2021-01-19", "url": "https://usn.ubuntu.com/4698-1" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:0150 vom 2021-01-19", "url": "https://access.redhat.com/errata/RHSA-2021:0150" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:0151 vom 2021-01-19", "url": "https://access.redhat.com/errata/RHSA-2021:0151" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:0152 vom 2021-01-19", "url": "https://access.redhat.com/errata/RHSA-2021:0152" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:0153 vom 2021-01-19", "url": "https://access.redhat.com/errata/RHSA-2021:0153" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:0154 vom 2021-01-19", "url": "https://access.redhat.com/errata/RHSA-2021:0154" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:0155 vom 2021-01-19", "url": "https://access.redhat.com/errata/RHSA-2021:0155" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:0156 vom 2021-01-19", "url": "https://access.redhat.com/errata/RHSA-2021:0156" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2021-0153 vom 2021-01-19", "url": "http://linux.oracle.com/errata/ELSA-2021-0153.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2021-0150 vom 2021-01-20", "url": "https://linux.oracle.com/errata/ELSA-2021-0150.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:0163-1 vom 2021-01-19", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-January/008222.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:14603-1 vom 2021-01-19", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-January/008224.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:0166-1 vom 2021-01-19", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-January/008223.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:0162-1 vom 2021-01-19", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-January/008225.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:14604-1 vom 2021-01-19", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-January/008226.html" }, { "category": "external", "summary": "ICS CERT Advisory ICSA-21-019-01 vom 2021-01-19", "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-019-01" }, { "category": "external", "summary": "Changelog dnsmasq", "url": "http://www.thekelleys.org.uk/dnsmasq/CHANGELOG" }, { "category": "external", "summary": "Arch Linux Security Advisory ASA-202101-38 vom 2021-01-21", "url": "https://security.archlinux.org/ASA-202101-38/generate" }, { "category": "external", "summary": "Synology Security Advisory SYNOLOGY-SA-21:01 vom 2021-01-25", "url": "https://www.synology.com/en-global/support/security/Synology_SA_21_01" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:0240 vom 2021-01-25", "url": "https://access.redhat.com/errata/RHSA-2021:0240" }, { "category": "external", "summary": "Gentoo Linux Security Advisory GLSA-202101-17 vom 2021-01-25", "url": "https://security.gentoo.org/glsa/202101-17" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:0245 vom 2021-01-25", "url": "https://access.redhat.com/errata/RHSA-2021:0245" }, { "category": "external", "summary": "CentOS Security Advisory CESA-2021:0153 vom 2021-01-26", "url": "http://centos-announce.2309468.n4.nabble.com/CentOS-announce-CESA-2021-0153-Moderate-CentOS-7-dnsmasq-Security-Update-tp4646120.html" }, { "category": "external", "summary": "Zyxel security advisory for DNSpooq vom 2021-01-26", "url": "https://www.zyxel.com/support/DNSpooq.shtml" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:0281 vom 2021-02-03", "url": "https://access.redhat.com/errata/RHSA-2021:0281" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:0395 vom 2021-02-03", "url": "https://access.redhat.com/errata/RHSA-2021:0395" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:0401 vom 2021-02-03", "url": "https://access.redhat.com/errata/RHSA-2021:0401" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2021-1587 vom 2021-02-03", "url": "https://alas.aws.amazon.com/AL2/ALAS-2021-1587.html" }, { "category": "external", "summary": "Debian Security Advisory DSA-4844 vom 2021-02-04", "url": "https://www.debian.org/security/2021/dsa-4844" }, { "category": "external", "summary": "Aruba Product Security Advisory", "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-006.txt" }, { "category": "external", "summary": "Ubuntu Security Notice USN-4698-2 vom 2021-02-24", "url": "https://ubuntu.com/security/notices/USN-4698-2" }, { "category": "external", "summary": "AVAYA Security Advisory ASA-2021-006 vom 2021-03-03", "url": "https://downloads.avaya.com/css/P8/documents/101074267" }, { "category": "external", "summary": "QNAP Security Advisory QSA-21-09 vom 2021-06-30", "url": "https://www.qnap.com/de-de/security-advisory/QSA-21-09" } ], "source_lang": "en-US", "title": "dnsmasq: Mehrere Schwachstellen", "tracking": { "current_release_date": "2023-11-06T23:00:00.000+00:00", "generator": { "date": "2024-02-15T17:50:15.691+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2023-2836", "initial_release_date": "2021-01-18T23:00:00.000+00:00", "revision_history": [ { "date": "2021-01-18T23:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2021-01-19T23:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Arista, Cisco, Ubuntu, Red Hat, Oracle Linux und SUSE aufgenommen" }, { "date": "2021-01-20T23:00:00.000+00:00", "number": "3", "summary": "Neue Updates von Arch Linux aufgenommen" }, { "date": "2021-01-24T23:00:00.000+00:00", "number": "4", "summary": "Neue Updates von Synology aufgenommen" }, { "date": "2021-01-25T23:00:00.000+00:00", "number": "5", "summary": "Neue Updates von Red Hat und Gentoo aufgenommen" }, { "date": "2021-01-26T23:00:00.000+00:00", "number": "6", "summary": "Neue Updates von CentOS aufgenommen" }, { "date": "2021-02-02T23:00:00.000+00:00", "number": "7", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2021-02-03T23:00:00.000+00:00", "number": "8", "summary": "Neue Updates von Red Hat und Amazon aufgenommen" }, { "date": "2021-02-04T23:00:00.000+00:00", "number": "9", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2021-02-23T23:00:00.000+00:00", "number": "10", "summary": "Neue Updates von Aruba aufgenommen" }, { "date": "2021-02-24T23:00:00.000+00:00", "number": "11", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2021-03-04T23:00:00.000+00:00", "number": "12", "summary": "Neue Updates von AVAYA aufgenommen" }, { "date": "2021-03-22T23:00:00.000+00:00", "number": "13", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2021-06-30T22:00:00.000+00:00", "number": "14", "summary": "Neue Updates von QNAP aufgenommen" }, { "date": "2023-11-06T23:00:00.000+00:00", "number": "15", "summary": "Neue Updates von Oracle Linux aufgenommen" } ], "status": "final", "version": "15" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Amazon Linux 2", "product": { "name": "Amazon Linux 2", "product_id": "398363", "product_identification_helper": { "cpe": "cpe:/o:amazon:linux_2:-" } } } ], "category": "vendor", "name": "Amazon" }, { "branches": [ { "category": "product_name", "name": "Arista EOS", "product": { "name": "Arista EOS", "product_id": "T007065", "product_identification_helper": { "cpe": "cpe:/o:arista:arista_eos:-" } } } ], "category": "vendor", "name": "Arista" }, { "branches": [ { "category": "product_name", "name": "Aruba ArubaOS", "product": { "name": "Aruba ArubaOS", "product_id": "T016785", "product_identification_helper": { "cpe": "cpe:/o:arubanetworks:arubaos:-" } } } ], "category": "vendor", "name": "Aruba" }, { "branches": [ { "category": "product_name", "name": "Avaya Aura Application Enablement Services", "product": { "name": "Avaya Aura Application Enablement Services", "product_id": "T015516", "product_identification_helper": { "cpe": "cpe:/a:avaya:aura_application_enablement_services:-" } } }, { "category": "product_name", "name": "Avaya Aura Communication Manager", "product": { "name": "Avaya Aura Communication Manager", "product_id": "T015126", "product_identification_helper": { "cpe": "cpe:/a:avaya:communication_manager:-" } } }, { "category": "product_name", "name": "Avaya Aura Session Manager", "product": { "name": "Avaya Aura Session Manager", "product_id": "T015127", "product_identification_helper": { "cpe": "cpe:/a:avaya:session_manager:-" } } }, { "category": "product_name", "name": "Avaya Aura System Manager", "product": { "name": "Avaya Aura System Manager", "product_id": "T015518", "product_identification_helper": { "cpe": "cpe:/a:avaya:aura_system_manager:-" } } }, { "category": "product_name", "name": "Avaya Web License Manager", "product": { "name": "Avaya Web License Manager", "product_id": "T016243", "product_identification_helper": { "cpe": "cpe:/a:avaya:web_license_manager:-" } } } ], "category": "vendor", "name": "Avaya" }, { "branches": [ { "category": "product_name", "name": "Cisco Aironet Access Point", "product": { "name": "Cisco Aironet Access Point", "product_id": "T012215", "product_identification_helper": { "cpe": "cpe:/o:cisco:aironet_access_point_software:-" } } }, { "category": "product_name", "name": "Cisco Analog Telephone Adaptor (ATA)", "product": { "name": "Cisco Analog Telephone Adaptor (ATA)", "product_id": "T015211", "product_identification_helper": { "cpe": "cpe:/h:cisco:ata:spa122" } } }, { "category": "product_name", "name": "Cisco Catalyst Access Point", "product": { "name": "Cisco Catalyst Access Point", "product_id": "T018120", "product_identification_helper": { "cpe": "cpe:/h:cisco:catalyst:access_point" } } }, { "category": "product_name", "name": "Cisco IP Phone", "product": { "name": "Cisco IP Phone", "product_id": "2070", "product_identification_helper": { "cpe": "cpe:/h:cisco:ip_phone:-" } } }, { "category": "product_name", "name": "Cisco Small Business", "product": { "name": "Cisco Small Business", "product_id": "T006515", "product_identification_helper": { "cpe": "cpe:/h:cisco:small_business:srp520" } } }, { "category": "product_name", "name": "Cisco TelePresence Video Communication Server", "product": { "name": "Cisco TelePresence Video Communication Server", "product_id": "T018121", "product_identification_helper": { "cpe": "cpe:/h:cisco:telepresence:video_communication_server" } } }, { "category": "product_name", "name": "Cisco Unified IP Phone", "product": { "name": "Cisco Unified IP Phone", "product_id": "T003264", "product_identification_helper": { "cpe": "cpe:/h:cisco:unified_ip_phones:-" } } }, { "category": "product_name", "name": "Cisco WebEx Teams", "product": { "name": "Cisco WebEx Teams", "product_id": "T013516", "product_identification_helper": { "cpe": "cpe:/a:cisco:webex:teams" } } } ], "category": "vendor", "name": "Cisco" }, { "branches": [ { "category": "product_name", "name": "Debian Linux", "product": { "name": "Debian Linux", "product_id": "2951", "product_identification_helper": { "cpe": "cpe:/o:debian:debian_linux:-" } } } ], "category": "vendor", "name": "Debian" }, { "branches": [ { "category": "product_name", "name": "Gentoo Linux", "product": { "name": "Gentoo Linux", "product_id": "T012167", "product_identification_helper": { "cpe": "cpe:/o:gentoo:linux:-" } } } ], "category": "vendor", "name": "Gentoo" }, { "branches": [ { "category": "product_name", "name": "Open Source Arch Linux", "product": { "name": "Open Source Arch Linux", "product_id": "T013312", "product_identification_helper": { "cpe": "cpe:/o:archlinux:archlinux:-" } } }, { "category": "product_name", "name": "Open Source CentOS", "product": { "name": "Open Source CentOS", "product_id": "1727", "product_identification_helper": { "cpe": "cpe:/o:centos:centos:-" } } }, { "category": "product_name", "name": "Open Source dnsmasq \u003c 2.83", "product": { "name": "Open Source dnsmasq \u003c 2.83", "product_id": "T018119", "product_identification_helper": { "cpe": "cpe:/a:dnsmasq:dnsmasq:2.83" } } } ], "category": "vendor", "name": "Open Source" }, { "branches": [ { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T004914", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "category": "product_name", "name": "QNAP NAS", "product": { "name": "QNAP NAS", "product_id": "T017100", "product_identification_helper": { "cpe": "cpe:/h:qnap:nas:-" } } } ], "category": "vendor", "name": "QNAP" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" }, { "branches": [ { "category": "product_name", "name": "Synology DiskStation Manager", "product": { "name": "Synology DiskStation Manager", "product_id": "450918", "product_identification_helper": { "cpe": "cpe:/a:synology:diskstation_manager:-" } } } ], "category": "vendor", "name": "Synology" }, { "branches": [ { "category": "product_name", "name": "Ubuntu Linux", "product": { "name": "Ubuntu Linux", "product_id": "T000126", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:-" } } } ], "category": "vendor", "name": "Ubuntu" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-25681", "notes": [ { "category": "description", "text": "In dnsmasq und mehreren Cisco Produkten existieren mehrere Schwachstellen aufgrund von Buffer-Overflows und fehlerhafter Eingabepr\u00fcfungen. Ein entfernter, anonymer Angreifer kann dadurch beliebigen Code im Kontext des Dienstes zur Ausf\u00fchrung bringen oder DNS Cache-Poisoning Angriffe durchf\u00fchren." } ], "product_status": { "known_affected": [ "2070", "T003264", "67646", "T006515", "T012215", "T015127", "T015126", "T004914", "450918", "T018120", "T018121", "398363", "T007065", "T013516", "T015518", "T015516", "T013312", "T012167", "T016785", "T015211", "T016243", "T017100", "2951", "T002207", "T000126", "1727" ] }, "release_date": "2021-01-18T23:00:00Z", "title": "CVE-2020-25681" }, { "cve": "CVE-2020-25682", "notes": [ { "category": "description", "text": "In dnsmasq und mehreren Cisco Produkten existieren mehrere Schwachstellen aufgrund von Buffer-Overflows und fehlerhafter Eingabepr\u00fcfungen. Ein entfernter, anonymer Angreifer kann dadurch beliebigen Code im Kontext des Dienstes zur Ausf\u00fchrung bringen oder DNS Cache-Poisoning Angriffe durchf\u00fchren." } ], "product_status": { "known_affected": [ "2070", "T003264", "67646", "T006515", "T012215", "T015127", "T015126", "T004914", "450918", "T018120", "T018121", "398363", "T007065", "T013516", "T015518", "T015516", "T013312", "T012167", "T016785", "T015211", "T016243", "T017100", "2951", "T002207", "T000126", "1727" ] }, "release_date": "2021-01-18T23:00:00Z", "title": "CVE-2020-25682" }, { "cve": "CVE-2020-25683", "notes": [ { "category": "description", "text": "In dnsmasq und mehreren Cisco Produkten existieren mehrere Schwachstellen aufgrund von Buffer-Overflows und fehlerhafter Eingabepr\u00fcfungen. Ein entfernter, anonymer Angreifer kann dadurch beliebigen Code im Kontext des Dienstes zur Ausf\u00fchrung bringen oder DNS Cache-Poisoning Angriffe durchf\u00fchren." } ], "product_status": { "known_affected": [ "2070", "T003264", "67646", "T006515", "T012215", "T015127", "T015126", "T004914", "450918", "T018120", "T018121", "398363", "T007065", "T013516", "T015518", "T015516", "T013312", "T012167", "T016785", "T015211", "T016243", "T017100", "2951", "T002207", "T000126", "1727" ] }, "release_date": "2021-01-18T23:00:00Z", "title": "CVE-2020-25683" }, { "cve": "CVE-2020-25684", "notes": [ { "category": "description", "text": "In dnsmasq und mehreren Cisco Produkten existieren mehrere Schwachstellen aufgrund von Buffer-Overflows und fehlerhafter Eingabepr\u00fcfungen. Ein entfernter, anonymer Angreifer kann dadurch beliebigen Code im Kontext des Dienstes zur Ausf\u00fchrung bringen oder DNS Cache-Poisoning Angriffe durchf\u00fchren." } ], "product_status": { "known_affected": [ "2070", "T003264", "67646", "T006515", "T012215", "T015127", "T015126", "T004914", "450918", "T018120", "T018121", "398363", "T007065", "T013516", "T015518", "T015516", "T013312", "T012167", "T016785", "T015211", "T016243", "T017100", "2951", "T002207", "T000126", "1727" ] }, "release_date": "2021-01-18T23:00:00Z", "title": "CVE-2020-25684" }, { "cve": "CVE-2020-25685", "notes": [ { "category": "description", "text": "In dnsmasq und mehreren Cisco Produkten existieren mehrere Schwachstellen aufgrund von Buffer-Overflows und fehlerhafter Eingabepr\u00fcfungen. Ein entfernter, anonymer Angreifer kann dadurch beliebigen Code im Kontext des Dienstes zur Ausf\u00fchrung bringen oder DNS Cache-Poisoning Angriffe durchf\u00fchren." } ], "product_status": { "known_affected": [ "2070", "T003264", "67646", "T006515", "T012215", "T015127", "T015126", "T004914", "450918", "T018120", "T018121", "398363", "T007065", "T013516", "T015518", "T015516", "T013312", "T012167", "T016785", "T015211", "T016243", "T017100", "2951", "T002207", "T000126", "1727" ] }, "release_date": "2021-01-18T23:00:00Z", "title": "CVE-2020-25685" }, { "cve": "CVE-2020-25686", "notes": [ { "category": "description", "text": "In dnsmasq und mehreren Cisco Produkten existieren mehrere Schwachstellen aufgrund von Buffer-Overflows und fehlerhafter Eingabepr\u00fcfungen. Ein entfernter, anonymer Angreifer kann dadurch beliebigen Code im Kontext des Dienstes zur Ausf\u00fchrung bringen oder DNS Cache-Poisoning Angriffe durchf\u00fchren." } ], "product_status": { "known_affected": [ "2070", "T003264", "67646", "T006515", "T012215", "T015127", "T015126", "T004914", "450918", "T018120", "T018121", "398363", "T007065", "T013516", "T015518", "T015516", "T013312", "T012167", "T016785", "T015211", "T016243", "T017100", "2951", "T002207", "T000126", "1727" ] }, "release_date": "2021-01-18T23:00:00Z", "title": "CVE-2020-25686" }, { "cve": "CVE-2020-25687", "notes": [ { "category": "description", "text": "In dnsmasq und mehreren Cisco Produkten existieren mehrere Schwachstellen aufgrund von Buffer-Overflows und fehlerhafter Eingabepr\u00fcfungen. Ein entfernter, anonymer Angreifer kann dadurch beliebigen Code im Kontext des Dienstes zur Ausf\u00fchrung bringen oder DNS Cache-Poisoning Angriffe durchf\u00fchren." } ], "product_status": { "known_affected": [ "2070", "T003264", "67646", "T006515", "T012215", "T015127", "T015126", "T004914", "450918", "T018120", "T018121", "398363", "T007065", "T013516", "T015518", "T015516", "T013312", "T012167", "T016785", "T015211", "T016243", "T017100", "2951", "T002207", "T000126", "1727" ] }, "release_date": "2021-01-18T23:00:00Z", "title": "CVE-2020-25687" } ] }
gsd-2020-25684
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2020-25684", "description": "A flaw was found in dnsmasq before version 2.83. When getting a reply from a forwarded query, dnsmasq checks in the forward.c:reply_query() if the reply destination address/port is used by the pending forwarded queries. However, it does not use the address/port to retrieve the exact forwarded query, substantially reducing the number of attempts an attacker on the network would have to perform to forge a reply and get it accepted by dnsmasq. This issue contrasts with RFC5452, which specifies a query\u0027s attributes that all must be used to match a reply. This flaw allows an attacker to perform a DNS Cache Poisoning attack. If chained with CVE-2020-25685 or CVE-2020-25686, the attack complexity of a successful attack is reduced. The highest threat from this vulnerability is to data integrity.", "id": "GSD-2020-25684", "references": [ "https://www.suse.com/security/cve/CVE-2020-25684.html", "https://www.debian.org/security/2021/dsa-4844", "https://access.redhat.com/errata/RHSA-2021:0401", "https://access.redhat.com/errata/RHSA-2021:0395", "https://access.redhat.com/errata/RHSA-2021:0245", "https://access.redhat.com/errata/RHSA-2021:0240", "https://access.redhat.com/errata/RHSA-2021:0156", "https://access.redhat.com/errata/RHSA-2021:0155", "https://access.redhat.com/errata/RHSA-2021:0154", "https://access.redhat.com/errata/RHSA-2021:0153", "https://access.redhat.com/errata/RHSA-2021:0152", "https://access.redhat.com/errata/RHSA-2021:0151", "https://access.redhat.com/errata/RHSA-2021:0150", "https://ubuntu.com/security/CVE-2020-25684", "https://advisories.mageia.org/CVE-2020-25684.html", "https://security.archlinux.org/CVE-2020-25684", "https://linux.oracle.com/cve/CVE-2020-25684.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2020-25684" ], "details": "A flaw was found in dnsmasq before version 2.83. When getting a reply from a forwarded query, dnsmasq checks in the forward.c:reply_query() if the reply destination address/port is used by the pending forwarded queries. However, it does not use the address/port to retrieve the exact forwarded query, substantially reducing the number of attempts an attacker on the network would have to perform to forge a reply and get it accepted by dnsmasq. This issue contrasts with RFC5452, which specifies a query\u0027s attributes that all must be used to match a reply. This flaw allows an attacker to perform a DNS Cache Poisoning attack. If chained with CVE-2020-25685 or CVE-2020-25686, the attack complexity of a successful attack is reduced. The highest threat from this vulnerability is to data integrity.", "id": "GSD-2020-25684", "modified": "2023-12-13T01:21:57.265733Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2020-25684", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "dnsmasq", "version": { "version_data": [ { "version_value": "dnsmasq 2.83" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A flaw was found in dnsmasq before version 2.83. When getting a reply from a forwarded query, dnsmasq checks in the forward.c:reply_query() if the reply destination address/port is used by the pending forwarded queries. However, it does not use the address/port to retrieve the exact forwarded query, substantially reducing the number of attempts an attacker on the network would have to perform to forge a reply and get it accepted by dnsmasq. This issue contrasts with RFC5452, which specifies a query\u0027s attributes that all must be used to match a reply. This flaw allows an attacker to perform a DNS Cache Poisoning attack. If chained with CVE-2020-25685 or CVE-2020-25686, the attack complexity of a successful attack is reduced. The highest threat from this vulnerability is to data integrity." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-358" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1889686", "refsource": "MISC", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889686" }, { "name": "https://www.jsof-tech.com/disclosures/dnspooq/", "refsource": "MISC", "url": "https://www.jsof-tech.com/disclosures/dnspooq/" }, { "name": "FEDORA-2021-84440e87ba", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WYW3IR6APUSKOYKL5FT3ACTIHWHGQY32/" }, { "name": "GLSA-202101-17", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/202101-17" }, { "name": "DSA-4844", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4844" }, { "name": "FEDORA-2021-2e4c3d5a9d", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGB7HL3OWHTLEPSMLDGOMXQKG3KM2QME/" }, { "name": "[debian-lts-announce] 20210322 [SECURITY] [DLA 2604-1] dnsmasq security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00027.html" }, { "name": "https://www.arista.com/en/support/advisories-notices/security-advisories/12135-security-advisory-61", "refsource": "MISC", "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/12135-security-advisory-61" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:thekelleys:dnsmasq:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.83", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:arista:eos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "4.21.14m", "versionStartIncluding": "4.21", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:arista:eos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "4.22.9m", "versionStartIncluding": "4.22", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:arista:eos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "4.23.7m", "versionStartIncluding": "4.23", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:arista:eos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "4.24.5m", "versionStartIncluding": "4.24", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:arista:eos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "4.25.2f", "versionStartIncluding": "4.25", "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2020-25684" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "A flaw was found in dnsmasq before version 2.83. When getting a reply from a forwarded query, dnsmasq checks in the forward.c:reply_query() if the reply destination address/port is used by the pending forwarded queries. However, it does not use the address/port to retrieve the exact forwarded query, substantially reducing the number of attempts an attacker on the network would have to perform to forge a reply and get it accepted by dnsmasq. This issue contrasts with RFC5452, which specifies a query\u0027s attributes that all must be used to match a reply. This flaw allows an attacker to perform a DNS Cache Poisoning attack. If chained with CVE-2020-25685 or CVE-2020-25686, the attack complexity of a successful attack is reduced. The highest threat from this vulnerability is to data integrity." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1889686", "refsource": "MISC", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889686" }, { "name": "https://www.jsof-tech.com/disclosures/dnspooq/", "refsource": "MISC", "tags": [ "Third Party Advisory" ], "url": "https://www.jsof-tech.com/disclosures/dnspooq/" }, { "name": "FEDORA-2021-84440e87ba", "refsource": "FEDORA", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WYW3IR6APUSKOYKL5FT3ACTIHWHGQY32/" }, { "name": "GLSA-202101-17", "refsource": "GENTOO", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202101-17" }, { "name": "DSA-4844", "refsource": "DEBIAN", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2021/dsa-4844" }, { "name": "FEDORA-2021-2e4c3d5a9d", "refsource": "FEDORA", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGB7HL3OWHTLEPSMLDGOMXQKG3KM2QME/" }, { "name": "[debian-lts-announce] 20210322 [SECURITY] [DLA 2604-1] dnsmasq security update", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00027.html" }, { "name": "https://www.arista.com/en/support/advisories-notices/security-advisories/12135-security-advisory-61", "refsource": "MISC", "tags": [ "Third Party Advisory" ], "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/12135-security-advisory-61" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 1.4 } }, "lastModifiedDate": "2022-02-14T14:56Z", "publishedDate": "2021-01-20T16:15Z" } } }
icsa-21-019-01
Vulnerability from csaf_cisa
Notes
{ "document": { "acknowledgments": [ { "names": [ "Moshe Kol", "Shlomi Oberman" ], "organization": "JSOF", "summary": "reporting these vulnerabilities to CISA" } ], "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited", "tlp": { "label": "WHITE", "url": "https://us-cert.cisa.gov/tlp/" } }, "lang": "en-US", "notes": [ { "category": "general", "text": "This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov", "title": "CISA Disclaimer" }, { "category": "legal_disclaimer", "text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.", "title": "Legal Notice" }, { "category": "summary", "text": "Successful exploitation of these vulnerabilities could result in cache poisoning, remote code execution, and a denial-of-service condition.", "title": "Risk evaluation" }, { "category": "other", "text": "Multiple", "title": "Critical infrastructure sectors" }, { "category": "other", "text": "Worldwide", "title": "Countries/areas deployed" }, { "category": "other", "text": "United Kingdom", "title": "Company headquarters location" }, { "category": "general", "text": "CISA recommends users take defensive measures to minimize the risk of exploitation of this vulnerability. Specifically, users should:", "title": "Recommended Practices" }, { "category": "general", "text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.\nCISA also provides a section for control systems security recommended practices on the ICS webpage onus-cert.cisa.gov. Several recommended practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "Additional mitigation guidance and recommended practices are publicly available on the ICS webpage on us-cert.cisa.gov in the Technical Information Paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.\nOrganizations observing any suspected malicious activity should follow their established internal procedures and report their findings to CISA for tracking and correlation against other incidents.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA also recommends users take the following measures to protect themselves from social engineering attacks:", "title": "Recommended Practices" }, { "category": "general", "text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories", "title": "Additional Resources" }, { "category": "other", "text": "No known public exploits specifically target these vulnerabilities.", "title": "Exploitability" } ], "publisher": { "category": "coordinator", "contact_details": "Email: CISAservicedesk@cisa.dhs.gov;\n Toll Free: 1-888-282-0870", "name": "CISA", "namespace": "https://www.cisa.gov/" }, "references": [ { "category": "external", "summary": "SSA-646763: DNSpooq - Dnsmasq Vulnerabilities in SCALANCE and RUGGEDCOM Devices - CSAF Version", "url": "https://cert-portal.siemens.com/productcert/csaf/ssa-646763.json" }, { "category": "self", "summary": "ICS Advisory ICSA-21-019-01 JSON", "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2021/icsa-21-019-01.json" }, { "category": "self", "summary": "ICS Advisory ICSA-21-019-01 Web Version", "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-21-019-01" }, { "category": "external", "summary": "Recommended Practices", "url": "https://us-cert.cisa.gov/ncas/tips/ST04-014" }, { "category": "external", "summary": "Recommended Practices", "url": "https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf" }, { "category": "external", "summary": "Recommended Practices", "url": "https://us-cert.cisa.gov/ics/tips/ICS-TIP-12-146-01B" }, { "category": "external", "summary": "SSA-646763: DNSpooq - Dnsmasq Vulnerabilities in SCALANCE and RUGGEDCOM Devices - PDF Version", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-646763.pdf" }, { "category": "external", "summary": "SSA-646763: DNSpooq - Dnsmasq Vulnerabilities in SCALANCE and RUGGEDCOM Devices - TXT Version", "url": "https://cert-portal.siemens.com/productcert/txt/ssa-646763.txt" } ], "title": "dnsmasq by Simon Kelley (Update A)", "tracking": { "current_release_date": "2021-03-09T00:00:00.000000Z", "generator": { "engine": { "name": "CISA CSAF Generator", "version": "1.0.0" } }, "id": "ICSA-21-019-01", "initial_release_date": "2021-01-19T00:00:00.000000Z", "revision_history": [ { "date": "2021-01-19T00:00:00.000000Z", "legacy_version": "Initial", "number": "1", "summary": "ICSA-21-019-01 Dnsmasq by Simon Kelley" }, { "date": "2021-03-09T00:00:00.000000Z", "legacy_version": "A", "number": "2", "summary": "ICSA-21-019-01 dnsmasq by Simon Kelley (Update A)" } ], "status": "final", "version": "2" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c V6.4", "product": { "name": "RUGGEDCOM RM1224", "product_id": "CSAFPID-0001" } } ], "category": "product_name", "name": "RUGGEDCOM RM1224" }, { "branches": [ { "category": "product_version_range", "name": "\u003c V6.4", "product": { "name": "SCALANCE M-800", "product_id": "CSAFPID-0002" } } ], "category": "product_name", "name": "SCALANCE M-800" }, { "branches": [ { "category": "product_version_range", "name": "\u003c V6.4", "product": { "name": "SCALANCE S615", "product_id": "CSAFPID-0003" } } ], "category": "product_name", "name": "SCALANCE S615" }, { "branches": [ { "category": "product_version_range", "name": "\u003c V2.1.3", "product": { "name": "SCALANCE SC-600", "product_id": "CSAFPID-0004" } } ], "category": "product_name", "name": "SCALANCE SC-600" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W1750D", "product_id": "CSAFPID-0005" } } ], "category": "product_name", "name": "SCALANCE W1750D" } ], "category": "vendor", "name": "Siemens" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-25684", "cwe": { "id": "CWE-290", "name": "Authentication Bypass by Spoofing" }, "notes": [ { "category": "summary", "text": "Affected devices lack proper address/port check in the DNS reply_query function of dnsmasq.\n\nThis could make it easier for remote off-path attackers to forge replies.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "summary": "CVE-2020-25684 - RUGGEDCOM RM1224", "url": "https://support.industry.siemens.com/cs/ww/en/view/109794349/" }, { "summary": "CVE-2020-25684 - SCALANCE M-800", "url": "https://support.industry.siemens.com/cs/ww/en/view/109794349/" }, { "summary": "CVE-2020-25684 - SCALANCE S615", "url": "https://support.industry.siemens.com/cs/ww/en/view/109794349/" }, { "summary": "CVE-2020-25684 - SCALANCE SC-600", "url": "https://support.industry.siemens.com/cs/ww/en/view/109793041/" }, { "summary": "CVE-2020-25684 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-25684.json" }, { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-25684" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V6.4 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109794349/" }, { "category": "vendor_fix", "details": "Update to V2.1.3 or later version", "product_ids": [ "CSAFPID-0004" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109793041/" }, { "category": "none_available", "details": "Currently no remediation is available", "product_ids": [ "CSAFPID-0005" ] }, { "category": "mitigation", "details": "SCALANCE M-800: Disable DNS proxy in the device configuration (System - DNS - DNS Proxy - Disable Checkbox \u201eEnable DNS Proxy\u201c), and configure the connected devices in the internal network to use a different DNS server. Note that the DNS proxy is enabled by default.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "RUGGEDCOM RM1224: Same as for SCALANCE M-800. Note that the DNS proxy is enabled by default.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "SCALANCE S615: Same as for SCALANCE M-800. Note that the DNS proxy is disabled by default.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "SCALANCE SC-600: Same as for SCALANCE M-800. Note that the DNS proxy is disabled by default.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "SCALANCE W1750D: If \u201cOpenDNS\u201d, \u201cCaptive Portal\u201d or \u201cURL redirection\u201d functionality is not used, deploy firewall rules in the device configuration to block incoming access to port 53/UDP", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.0, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N/E:P/RL:U/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2020-25684" }, { "cve": "CVE-2020-25685", "cwe": { "id": "CWE-290", "name": "Authentication Bypass by Spoofing" }, "notes": [ { "category": "summary", "text": "Affected devices lack query resource name (RRNAME) checks in the DNS reply_query function of dnsmasq.\n\nThis could allow a remote attacker to spoof DNS traffic that can lead to DNS cache poisoning.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "summary": "CVE-2020-25685 - RUGGEDCOM RM1224", "url": "https://support.industry.siemens.com/cs/ww/en/view/109794349/" }, { "summary": "CVE-2020-25685 - SCALANCE M-800", "url": "https://support.industry.siemens.com/cs/ww/en/view/109794349/" }, { "summary": "CVE-2020-25685 - SCALANCE S615", "url": "https://support.industry.siemens.com/cs/ww/en/view/109794349/" }, { "summary": "CVE-2020-25685 - SCALANCE SC-600", "url": "https://support.industry.siemens.com/cs/ww/en/view/109793041/" }, { "summary": "CVE-2020-25685 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-25685.json" }, { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-25685" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V6.4 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109794349/" }, { "category": "vendor_fix", "details": "Update to V2.1.3 or later version", "product_ids": [ "CSAFPID-0004" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109793041/" }, { "category": "none_available", "details": "Currently no remediation is available", "product_ids": [ "CSAFPID-0005" ] }, { "category": "mitigation", "details": "SCALANCE M-800: Disable DNS proxy in the device configuration (System - DNS - DNS Proxy - Disable Checkbox \u201eEnable DNS Proxy\u201c), and configure the connected devices in the internal network to use a different DNS server. Note that the DNS proxy is enabled by default.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "RUGGEDCOM RM1224: Same as for SCALANCE M-800. Note that the DNS proxy is enabled by default.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "SCALANCE S615: Same as for SCALANCE M-800. Note that the DNS proxy is disabled by default.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "SCALANCE SC-600: Same as for SCALANCE M-800. Note that the DNS proxy is disabled by default.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "SCALANCE W1750D: If \u201cOpenDNS\u201d, \u201cCaptive Portal\u201d or \u201cURL redirection\u201d functionality is not used, deploy firewall rules in the device configuration to block incoming access to port 53/UDP", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.0, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N/E:P/RL:U/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2020-25685" }, { "cve": "CVE-2020-25686", "cwe": { "id": "CWE-330", "name": "Use of Insufficiently Random Values" }, "notes": [ { "category": "summary", "text": "Affected devices lack sufficient entropy in dnsmasq to handle multiple DNS query requests from the same resource name (RRNAME).\n\nThis could allow a remote attacker to spoof DNS traffic, using a birthday attack (RFC 5452), than can lead to DNS cache poisoning.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "summary": "CVE-2020-25686 - RUGGEDCOM RM1224", "url": "https://support.industry.siemens.com/cs/ww/en/view/109794349/" }, { "summary": "CVE-2020-25686 - SCALANCE M-800", "url": "https://support.industry.siemens.com/cs/ww/en/view/109794349/" }, { "summary": "CVE-2020-25686 - SCALANCE S615", "url": "https://support.industry.siemens.com/cs/ww/en/view/109794349/" }, { "summary": "CVE-2020-25686 - SCALANCE SC-600", "url": "https://support.industry.siemens.com/cs/ww/en/view/109793041/" }, { "summary": "CVE-2020-25686 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-25686.json" }, { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-25686" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V6.4 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109794349/" }, { "category": "vendor_fix", "details": "Update to V2.1.3 or later version", "product_ids": [ "CSAFPID-0004" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109793041/" }, { "category": "none_available", "details": "Currently no remediation is available", "product_ids": [ "CSAFPID-0005" ] }, { "category": "mitigation", "details": "SCALANCE M-800: Disable DNS proxy in the device configuration (System - DNS - DNS Proxy - Disable Checkbox \u201eEnable DNS Proxy\u201c), and configure the connected devices in the internal network to use a different DNS server. Note that the DNS proxy is enabled by default.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "RUGGEDCOM RM1224: Same as for SCALANCE M-800. Note that the DNS proxy is enabled by default.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "SCALANCE S615: Same as for SCALANCE M-800. Note that the DNS proxy is disabled by default.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "SCALANCE SC-600: Same as for SCALANCE M-800. Note that the DNS proxy is disabled by default.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "SCALANCE W1750D: If \u201cOpenDNS\u201d, \u201cCaptive Portal\u201d or \u201cURL redirection\u201d functionality is not used, deploy firewall rules in the device configuration to block incoming access to port 53/UDP", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.0, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N/E:P/RL:U/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2020-25686" } ] }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.