Action not permitted
Modal body text goes here.
cve-2020-25685
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T15:40:36.614Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.jsof-tech.com/disclosures/dnspooq/" }, { "tags": [ "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889688" }, { "name": "FEDORA-2021-84440e87ba", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WYW3IR6APUSKOYKL5FT3ACTIHWHGQY32/" }, { "name": "GLSA-202101-17", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202101-17" }, { "name": "DSA-4844", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.debian.org/security/2021/dsa-4844" }, { "name": "FEDORA-2021-2e4c3d5a9d", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QGB7HL3OWHTLEPSMLDGOMXQKG3KM2QME/" }, { "tags": [ "x_transferred" ], "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/12135-security-advisory-61" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "dnsmasq", "vendor": "n/a", "versions": [ { "status": "affected", "version": "dnsmasq 2.83" } ] } ], "descriptions": [ { "lang": "en", "value": "A flaw was found in dnsmasq before version 2.83. When getting a reply from a forwarded query, dnsmasq checks in forward.c:reply_query(), which is the forwarded query that matches the reply, by only using a weak hash of the query name. Due to the weak hash (CRC32 when dnsmasq is compiled without DNSSEC, SHA-1 when it is) this flaw allows an off-path attacker to find several different domains all having the same hash, substantially reducing the number of attempts they would have to perform to forge a reply and get it accepted by dnsmasq. This is in contrast with RFC5452, which specifies that the query name is one of the attributes of a query that must be used to match a reply. This flaw could be abused to perform a DNS Cache Poisoning attack. If chained with CVE-2020-25684 the attack complexity of a successful attack is reduced. The highest threat from this vulnerability is to data integrity." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-326", "description": "CWE-326", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-07T00:00:00", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "url": "https://www.jsof-tech.com/disclosures/dnspooq/" }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889688" }, { "name": "FEDORA-2021-84440e87ba", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WYW3IR6APUSKOYKL5FT3ACTIHWHGQY32/" }, { "name": "GLSA-202101-17", "tags": [ "vendor-advisory" ], "url": "https://security.gentoo.org/glsa/202101-17" }, { "name": "DSA-4844", "tags": [ "vendor-advisory" ], "url": "https://www.debian.org/security/2021/dsa-4844" }, { "name": "FEDORA-2021-2e4c3d5a9d", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QGB7HL3OWHTLEPSMLDGOMXQKG3KM2QME/" }, { "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/12135-security-advisory-61" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2020-25685", "datePublished": "2021-01-20T00:00:00", "dateReserved": "2020-09-16T00:00:00", "dateUpdated": "2024-08-04T15:40:36.614Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2020-25685\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2021-01-20T16:15:14.303\",\"lastModified\":\"2023-11-07T03:20:22.197\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A flaw was found in dnsmasq before version 2.83. When getting a reply from a forwarded query, dnsmasq checks in forward.c:reply_query(), which is the forwarded query that matches the reply, by only using a weak hash of the query name. Due to the weak hash (CRC32 when dnsmasq is compiled without DNSSEC, SHA-1 when it is) this flaw allows an off-path attacker to find several different domains all having the same hash, substantially reducing the number of attempts they would have to perform to forge a reply and get it accepted by dnsmasq. This is in contrast with RFC5452, which specifies that the query name is one of the attributes of a query that must be used to match a reply. This flaw could be abused to perform a DNS Cache Poisoning attack. If chained with CVE-2020-25684 the attack complexity of a successful attack is reduced. The highest threat from this vulnerability is to data integrity.\"},{\"lang\":\"es\",\"value\":\"Se encontr\u00f3 un fallo en dnsmasq versiones anteriores a 2.83.\u0026#xa0;Al obtener una respuesta de una consulta reenviada, dnsmasq comprueba en forward.c:reply_query(), que es la consulta reenviada que coincide con la respuesta, usando solo un hash d\u00e9bil del nombre de la consulta.\u0026#xa0;Debido al hash d\u00e9bil (CRC32 cuando dnsmasq se compila sin DNSSEC, SHA-1 cuando lo es), este fallo permite a un atacante fuera de ruta encontrar varios dominios diferentes que tengan el mismo hash, reduciendo sustancialmente el n\u00famero de intentos que tendr\u00edan que realizar para falsificar una respuesta y conseguir que dnsmasq la acepte.\u0026#xa0;Esto contrasta con RFC5452, que especifica que el nombre de la consulta es uno de los atributos de una consulta que debe ser usada para hacer coincidir una respuesta.\u0026#xa0;Se puede abusar de este fallo para realizar un ataque de envenenamiento de cach\u00e9 de DNS.\u0026#xa0;Si se encadena con CVE-2020-25684, se reduce la complejidad del ataque de un ataque con \u00e9xito\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\",\"baseScore\":3.7,\"baseSeverity\":\"LOW\"},\"exploitabilityScore\":2.2,\"impactScore\":1.4}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:N/I:P/A:N\",\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\",\"baseScore\":4.3},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-326\"}]},{\"source\":\"secalert@redhat.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-326\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:thekelleys:dnsmasq:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.83\",\"matchCriteriaId\":\"F38115DF-0F5C-442D-83D4-1125AAB4E2B7\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"36D96259-24BD-44E2-96D9-78CE1D41F956\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E460AA51-FCDA-46B9-AE97-E6676AA5E194\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07B237A9-69A3-4A9C-9DA0-4E06BD37AE73\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arista:eos:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.21\",\"versionEndExcluding\":\"4.21.14m\",\"matchCriteriaId\":\"2E5C0DA1-5E51-40F1-82FE-CF7E391C07E4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arista:eos:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.22\",\"versionEndExcluding\":\"4.22.9m\",\"matchCriteriaId\":\"206E795F-BFE9-4AB9-A35F-60AC911F38E4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arista:eos:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.23\",\"versionEndExcluding\":\"4.23.7m\",\"matchCriteriaId\":\"6FA15712-F804-4060-99C0-7370D6111B83\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arista:eos:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.24\",\"versionEndExcluding\":\"4.24.5m\",\"matchCriteriaId\":\"21A321F5-CB56-4258-BB30-6753EECB89DD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arista:eos:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.25\",\"versionEndExcluding\":\"4.25.2f\",\"matchCriteriaId\":\"9445AF76-6AE4-46A6-A470-979ADBB19EE2\"}]}]}],\"references\":[{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=1889688\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QGB7HL3OWHTLEPSMLDGOMXQKG3KM2QME/\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WYW3IR6APUSKOYKL5FT3ACTIHWHGQY32/\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://security.gentoo.org/glsa/202101-17\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.arista.com/en/support/advisories-notices/security-advisories/12135-security-advisory-61\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2021/dsa-4844\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.jsof-tech.com/disclosures/dnspooq/\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]}]}}" } }
wid-sec-w-2023-2836
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Dnsmasq ist ein leichtgewichtiger DNS- und DHCP Server.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in dnsmasq und mehreren Cisco Produkten ausnutzen, um beliebigen Programmcode auszuf\u00fchren und um den DNS Cache zu manipulieren.", "title": "Angriff" }, { "category": "general", "text": "- UNIX\n- Linux\n- CISCO Appliance\n- Appliance", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2023-2836 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2021/wid-sec-w-2023-2836.json" }, { "category": "self", "summary": "WID-SEC-2023-2836 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-2836" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2023-12971 vom 2023-11-06", "url": "https://linux.oracle.com/errata/ELSA-2023-12971.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2023-12972 vom 2023-11-06", "url": "https://linux.oracle.com/errata/ELSA-2023-12972.html" }, { "category": "external", "summary": "Debian Security Advisory DLA-2604 vom 2021-03-22", "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00027.html" }, { "category": "external", "summary": "Cisco Security Advisory CISCO-SA-DNSMASQ-DNS-2021-C5MRDF3G vom 2021-01-18", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dnsmasq-dns-2021-c5mrdf3g" }, { "category": "external", "summary": "DNSpooq Attack vom 2021-01-18", "url": "https://www.jsof-tech.com/disclosures/dnspooq/" }, { "category": "external", "summary": "Arista Security Advisory 61 vom 2021-01-19", "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/12135-security-advisory-61" }, { "category": "external", "summary": "Ubuntu Security Notice USN-4698-1 vom 2021-01-19", "url": "https://usn.ubuntu.com/4698-1" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:0150 vom 2021-01-19", "url": "https://access.redhat.com/errata/RHSA-2021:0150" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:0151 vom 2021-01-19", "url": "https://access.redhat.com/errata/RHSA-2021:0151" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:0152 vom 2021-01-19", "url": "https://access.redhat.com/errata/RHSA-2021:0152" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:0153 vom 2021-01-19", "url": "https://access.redhat.com/errata/RHSA-2021:0153" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:0154 vom 2021-01-19", "url": "https://access.redhat.com/errata/RHSA-2021:0154" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:0155 vom 2021-01-19", "url": "https://access.redhat.com/errata/RHSA-2021:0155" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:0156 vom 2021-01-19", "url": "https://access.redhat.com/errata/RHSA-2021:0156" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2021-0153 vom 2021-01-19", "url": "http://linux.oracle.com/errata/ELSA-2021-0153.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2021-0150 vom 2021-01-20", "url": "https://linux.oracle.com/errata/ELSA-2021-0150.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:0163-1 vom 2021-01-19", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-January/008222.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:14603-1 vom 2021-01-19", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-January/008224.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:0166-1 vom 2021-01-19", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-January/008223.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:0162-1 vom 2021-01-19", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-January/008225.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:14604-1 vom 2021-01-19", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-January/008226.html" }, { "category": "external", "summary": "ICS CERT Advisory ICSA-21-019-01 vom 2021-01-19", "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-019-01" }, { "category": "external", "summary": "Changelog dnsmasq", "url": "http://www.thekelleys.org.uk/dnsmasq/CHANGELOG" }, { "category": "external", "summary": "Arch Linux Security Advisory ASA-202101-38 vom 2021-01-21", "url": "https://security.archlinux.org/ASA-202101-38/generate" }, { "category": "external", "summary": "Synology Security Advisory SYNOLOGY-SA-21:01 vom 2021-01-25", "url": "https://www.synology.com/en-global/support/security/Synology_SA_21_01" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:0240 vom 2021-01-25", "url": "https://access.redhat.com/errata/RHSA-2021:0240" }, { "category": "external", "summary": "Gentoo Linux Security Advisory GLSA-202101-17 vom 2021-01-25", "url": "https://security.gentoo.org/glsa/202101-17" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:0245 vom 2021-01-25", "url": "https://access.redhat.com/errata/RHSA-2021:0245" }, { "category": "external", "summary": "CentOS Security Advisory CESA-2021:0153 vom 2021-01-26", "url": "http://centos-announce.2309468.n4.nabble.com/CentOS-announce-CESA-2021-0153-Moderate-CentOS-7-dnsmasq-Security-Update-tp4646120.html" }, { "category": "external", "summary": "Zyxel security advisory for DNSpooq vom 2021-01-26", "url": "https://www.zyxel.com/support/DNSpooq.shtml" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:0281 vom 2021-02-03", "url": "https://access.redhat.com/errata/RHSA-2021:0281" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:0395 vom 2021-02-03", "url": "https://access.redhat.com/errata/RHSA-2021:0395" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:0401 vom 2021-02-03", "url": "https://access.redhat.com/errata/RHSA-2021:0401" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2021-1587 vom 2021-02-03", "url": "https://alas.aws.amazon.com/AL2/ALAS-2021-1587.html" }, { "category": "external", "summary": "Debian Security Advisory DSA-4844 vom 2021-02-04", "url": "https://www.debian.org/security/2021/dsa-4844" }, { "category": "external", "summary": "Aruba Product Security Advisory", "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-006.txt" }, { "category": "external", "summary": "Ubuntu Security Notice USN-4698-2 vom 2021-02-24", "url": "https://ubuntu.com/security/notices/USN-4698-2" }, { "category": "external", "summary": "AVAYA Security Advisory ASA-2021-006 vom 2021-03-03", "url": "https://downloads.avaya.com/css/P8/documents/101074267" }, { "category": "external", "summary": "QNAP Security Advisory QSA-21-09 vom 2021-06-30", "url": "https://www.qnap.com/de-de/security-advisory/QSA-21-09" } ], "source_lang": "en-US", "title": "dnsmasq: Mehrere Schwachstellen", "tracking": { "current_release_date": "2023-11-06T23:00:00.000+00:00", "generator": { "date": "2024-08-15T18:01:09.653+00:00", "engine": { "name": "BSI-WID", "version": "1.3.5" } }, "id": "WID-SEC-W-2023-2836", "initial_release_date": "2021-01-18T23:00:00.000+00:00", "revision_history": [ { "date": "2021-01-18T23:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2021-01-19T23:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Arista, Cisco, Ubuntu, Red Hat, Oracle Linux und SUSE aufgenommen" }, { "date": "2021-01-20T23:00:00.000+00:00", "number": "3", "summary": "Neue Updates von Arch Linux aufgenommen" }, { "date": "2021-01-24T23:00:00.000+00:00", "number": "4", "summary": "Neue Updates von Synology aufgenommen" }, { "date": "2021-01-25T23:00:00.000+00:00", "number": "5", "summary": "Neue Updates von Red Hat und Gentoo aufgenommen" }, { "date": "2021-01-26T23:00:00.000+00:00", "number": "6", "summary": "Neue Updates von CentOS aufgenommen" }, { "date": "2021-02-02T23:00:00.000+00:00", "number": "7", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2021-02-03T23:00:00.000+00:00", "number": "8", "summary": "Neue Updates von Red Hat und Amazon aufgenommen" }, { "date": "2021-02-04T23:00:00.000+00:00", "number": "9", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2021-02-23T23:00:00.000+00:00", "number": "10", "summary": "Neue Updates von Aruba aufgenommen" }, { "date": "2021-02-24T23:00:00.000+00:00", "number": "11", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2021-03-04T23:00:00.000+00:00", "number": "12", "summary": "Neue Updates von AVAYA aufgenommen" }, { "date": "2021-03-22T23:00:00.000+00:00", "number": "13", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2021-06-30T22:00:00.000+00:00", "number": "14", "summary": "Neue Updates von QNAP aufgenommen" }, { "date": "2023-11-06T23:00:00.000+00:00", "number": "15", "summary": "Neue Updates von Oracle Linux aufgenommen" } ], "status": "final", "version": "15" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Amazon Linux 2", "product": { "name": "Amazon Linux 2", "product_id": "398363", "product_identification_helper": { "cpe": "cpe:/o:amazon:linux_2:-" } } } ], "category": "vendor", "name": "Amazon" }, { "branches": [ { "category": "product_name", "name": "Arista EOS", "product": { "name": "Arista EOS", "product_id": "T007065", "product_identification_helper": { "cpe": "cpe:/o:arista:arista_eos:-" } } } ], "category": "vendor", "name": "Arista" }, { "branches": [ { "category": "product_name", "name": "Aruba ArubaOS", "product": { "name": "Aruba ArubaOS", "product_id": "T016785", "product_identification_helper": { "cpe": "cpe:/o:arubanetworks:arubaos:-" } } } ], "category": "vendor", "name": "Aruba" }, { "branches": [ { "category": "product_name", "name": "Avaya Aura Application Enablement Services", "product": { "name": "Avaya Aura Application Enablement Services", "product_id": "T015516", "product_identification_helper": { "cpe": "cpe:/a:avaya:aura_application_enablement_services:-" } } }, { "category": "product_name", "name": "Avaya Aura Communication Manager", "product": { "name": "Avaya Aura Communication Manager", "product_id": "T015126", "product_identification_helper": { "cpe": "cpe:/a:avaya:communication_manager:-" } } }, { "category": "product_name", "name": "Avaya Aura Session Manager", "product": { "name": "Avaya Aura Session Manager", "product_id": "T015127", "product_identification_helper": { "cpe": "cpe:/a:avaya:session_manager:-" } } }, { "category": "product_name", "name": "Avaya Aura System Manager", "product": { "name": "Avaya Aura System Manager", "product_id": "T015518", "product_identification_helper": { "cpe": "cpe:/a:avaya:aura_system_manager:-" } } }, { "category": "product_name", "name": "Avaya Web License Manager", "product": { "name": "Avaya Web License Manager", "product_id": "T016243", "product_identification_helper": { "cpe": "cpe:/a:avaya:web_license_manager:-" } } } ], "category": "vendor", "name": "Avaya" }, { "branches": [ { "category": "product_name", "name": "Cisco Aironet Access Point", "product": { "name": "Cisco Aironet Access Point", "product_id": "T012215", "product_identification_helper": { "cpe": "cpe:/o:cisco:aironet_access_point_software:-" } } }, { "category": "product_name", "name": "Cisco Analog Telephone Adaptor (ATA)", "product": { "name": "Cisco Analog Telephone Adaptor (ATA)", "product_id": "T015211", "product_identification_helper": { "cpe": "cpe:/h:cisco:ata:spa122" } } }, { "category": "product_name", "name": "Cisco Catalyst Access Point", "product": { "name": "Cisco Catalyst Access Point", "product_id": "T018120", "product_identification_helper": { "cpe": "cpe:/h:cisco:catalyst:access_point" } } }, { "category": "product_name", "name": "Cisco IP Phone", "product": { "name": "Cisco IP Phone", "product_id": "2070", "product_identification_helper": { "cpe": "cpe:/h:cisco:ip_phone:-" } } }, { "category": "product_name", "name": "Cisco Small Business", "product": { "name": "Cisco Small Business", "product_id": "T006515", "product_identification_helper": { "cpe": "cpe:/h:cisco:small_business:srp520" } } }, { "category": "product_name", "name": "Cisco TelePresence Video Communication Server", "product": { "name": "Cisco TelePresence Video Communication Server", "product_id": "T018121", "product_identification_helper": { "cpe": "cpe:/h:cisco:telepresence:video_communication_server" } } }, { "category": "product_name", "name": "Cisco Unified IP Phone", "product": { "name": "Cisco Unified IP Phone", "product_id": "T003264", "product_identification_helper": { "cpe": "cpe:/h:cisco:unified_ip_phones:-" } } }, { "category": "product_name", "name": "Cisco WebEx Teams", "product": { "name": "Cisco WebEx Teams", "product_id": "T013516", "product_identification_helper": { "cpe": "cpe:/a:cisco:webex:teams" } } } ], "category": "vendor", "name": "Cisco" }, { "branches": [ { "category": "product_name", "name": "Debian Linux", "product": { "name": "Debian Linux", "product_id": "2951", "product_identification_helper": { "cpe": "cpe:/o:debian:debian_linux:-" } } } ], "category": "vendor", "name": "Debian" }, { "branches": [ { "category": "product_name", "name": "Gentoo Linux", "product": { "name": "Gentoo Linux", "product_id": "T012167", "product_identification_helper": { "cpe": "cpe:/o:gentoo:linux:-" } } } ], "category": "vendor", "name": "Gentoo" }, { "branches": [ { "category": "product_name", "name": "Open Source Arch Linux", "product": { "name": "Open Source Arch Linux", "product_id": "T013312", "product_identification_helper": { "cpe": "cpe:/o:archlinux:archlinux:-" } } }, { "category": "product_name", "name": "Open Source CentOS", "product": { "name": "Open Source CentOS", "product_id": "1727", "product_identification_helper": { "cpe": "cpe:/o:centos:centos:-" } } }, { "category": "product_name", "name": "Open Source dnsmasq \u003c 2.83", "product": { "name": "Open Source dnsmasq \u003c 2.83", "product_id": "T018119", "product_identification_helper": { "cpe": "cpe:/a:dnsmasq:dnsmasq:2.83" } } } ], "category": "vendor", "name": "Open Source" }, { "branches": [ { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T004914", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "category": "product_name", "name": "QNAP NAS", "product": { "name": "QNAP NAS", "product_id": "T017100", "product_identification_helper": { "cpe": "cpe:/h:qnap:nas:-" } } } ], "category": "vendor", "name": "QNAP" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" }, { "branches": [ { "category": "product_name", "name": "Synology DiskStation Manager", "product": { "name": "Synology DiskStation Manager", "product_id": "450918", "product_identification_helper": { "cpe": "cpe:/a:synology:diskstation_manager:-" } } } ], "category": "vendor", "name": "Synology" }, { "branches": [ { "category": "product_name", "name": "Ubuntu Linux", "product": { "name": "Ubuntu Linux", "product_id": "T000126", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:-" } } } ], "category": "vendor", "name": "Ubuntu" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-25681", "notes": [ { "category": "description", "text": "In dnsmasq und mehreren Cisco Produkten existieren mehrere Schwachstellen aufgrund von Buffer-Overflows und fehlerhafter Eingabepr\u00fcfungen. Ein entfernter, anonymer Angreifer kann dadurch beliebigen Code im Kontext des Dienstes zur Ausf\u00fchrung bringen oder DNS Cache-Poisoning Angriffe durchf\u00fchren." } ], "product_status": { "known_affected": [ "2070", "T003264", "67646", "T006515", "T012215", "T015127", "T015126", "T004914", "450918", "T018120", "T018121", "398363", "T007065", "T013516", "T015518", "T015516", "T013312", "T012167", "T016785", "T015211", "T016243", "T017100", "2951", "T002207", "T000126", "1727" ] }, "release_date": "2021-01-18T23:00:00.000+00:00", "title": "CVE-2020-25681" }, { "cve": "CVE-2020-25682", "notes": [ { "category": "description", "text": "In dnsmasq und mehreren Cisco Produkten existieren mehrere Schwachstellen aufgrund von Buffer-Overflows und fehlerhafter Eingabepr\u00fcfungen. Ein entfernter, anonymer Angreifer kann dadurch beliebigen Code im Kontext des Dienstes zur Ausf\u00fchrung bringen oder DNS Cache-Poisoning Angriffe durchf\u00fchren." } ], "product_status": { "known_affected": [ "2070", "T003264", "67646", "T006515", "T012215", "T015127", "T015126", "T004914", "450918", "T018120", "T018121", "398363", "T007065", "T013516", "T015518", "T015516", "T013312", "T012167", "T016785", "T015211", "T016243", "T017100", "2951", "T002207", "T000126", "1727" ] }, "release_date": "2021-01-18T23:00:00.000+00:00", "title": "CVE-2020-25682" }, { "cve": "CVE-2020-25683", "notes": [ { "category": "description", "text": "In dnsmasq und mehreren Cisco Produkten existieren mehrere Schwachstellen aufgrund von Buffer-Overflows und fehlerhafter Eingabepr\u00fcfungen. Ein entfernter, anonymer Angreifer kann dadurch beliebigen Code im Kontext des Dienstes zur Ausf\u00fchrung bringen oder DNS Cache-Poisoning Angriffe durchf\u00fchren." } ], "product_status": { "known_affected": [ "2070", "T003264", "67646", "T006515", "T012215", "T015127", "T015126", "T004914", "450918", "T018120", "T018121", "398363", "T007065", "T013516", "T015518", "T015516", "T013312", "T012167", "T016785", "T015211", "T016243", "T017100", "2951", "T002207", "T000126", "1727" ] }, "release_date": "2021-01-18T23:00:00.000+00:00", "title": "CVE-2020-25683" }, { "cve": "CVE-2020-25684", "notes": [ { "category": "description", "text": "In dnsmasq und mehreren Cisco Produkten existieren mehrere Schwachstellen aufgrund von Buffer-Overflows und fehlerhafter Eingabepr\u00fcfungen. Ein entfernter, anonymer Angreifer kann dadurch beliebigen Code im Kontext des Dienstes zur Ausf\u00fchrung bringen oder DNS Cache-Poisoning Angriffe durchf\u00fchren." } ], "product_status": { "known_affected": [ "2070", "T003264", "67646", "T006515", "T012215", "T015127", "T015126", "T004914", "450918", "T018120", "T018121", "398363", "T007065", "T013516", "T015518", "T015516", "T013312", "T012167", "T016785", "T015211", "T016243", "T017100", "2951", "T002207", "T000126", "1727" ] }, "release_date": "2021-01-18T23:00:00.000+00:00", "title": "CVE-2020-25684" }, { "cve": "CVE-2020-25685", "notes": [ { "category": "description", "text": "In dnsmasq und mehreren Cisco Produkten existieren mehrere Schwachstellen aufgrund von Buffer-Overflows und fehlerhafter Eingabepr\u00fcfungen. Ein entfernter, anonymer Angreifer kann dadurch beliebigen Code im Kontext des Dienstes zur Ausf\u00fchrung bringen oder DNS Cache-Poisoning Angriffe durchf\u00fchren." } ], "product_status": { "known_affected": [ "2070", "T003264", "67646", "T006515", "T012215", "T015127", "T015126", "T004914", "450918", "T018120", "T018121", "398363", "T007065", "T013516", "T015518", "T015516", "T013312", "T012167", "T016785", "T015211", "T016243", "T017100", "2951", "T002207", "T000126", "1727" ] }, "release_date": "2021-01-18T23:00:00.000+00:00", "title": "CVE-2020-25685" }, { "cve": "CVE-2020-25686", "notes": [ { "category": "description", "text": "In dnsmasq und mehreren Cisco Produkten existieren mehrere Schwachstellen aufgrund von Buffer-Overflows und fehlerhafter Eingabepr\u00fcfungen. Ein entfernter, anonymer Angreifer kann dadurch beliebigen Code im Kontext des Dienstes zur Ausf\u00fchrung bringen oder DNS Cache-Poisoning Angriffe durchf\u00fchren." } ], "product_status": { "known_affected": [ "2070", "T003264", "67646", "T006515", "T012215", "T015127", "T015126", "T004914", "450918", "T018120", "T018121", "398363", "T007065", "T013516", "T015518", "T015516", "T013312", "T012167", "T016785", "T015211", "T016243", "T017100", "2951", "T002207", "T000126", "1727" ] }, "release_date": "2021-01-18T23:00:00.000+00:00", "title": "CVE-2020-25686" }, { "cve": "CVE-2020-25687", "notes": [ { "category": "description", "text": "In dnsmasq und mehreren Cisco Produkten existieren mehrere Schwachstellen aufgrund von Buffer-Overflows und fehlerhafter Eingabepr\u00fcfungen. Ein entfernter, anonymer Angreifer kann dadurch beliebigen Code im Kontext des Dienstes zur Ausf\u00fchrung bringen oder DNS Cache-Poisoning Angriffe durchf\u00fchren." } ], "product_status": { "known_affected": [ "2070", "T003264", "67646", "T006515", "T012215", "T015127", "T015126", "T004914", "450918", "T018120", "T018121", "398363", "T007065", "T013516", "T015518", "T015516", "T013312", "T012167", "T016785", "T015211", "T016243", "T017100", "2951", "T002207", "T000126", "1727" ] }, "release_date": "2021-01-18T23:00:00.000+00:00", "title": "CVE-2020-25687" } ] }
cisco-sa-dnsmasq-dns-2021-c5mrdf3g
Vulnerability from csaf_cisco
Notes
{ "document": { "acknowledgments": [ { "summary": "Cisco would like to thank Moshe Kol and Shlomi Oberman of JSOF for reporting these vulnerabilities, which were investigated and disclosed under the coordination of CERT/CC." } ], "category": "csaf_security_advisory", "csaf_version": "2.0", "notes": [ { "category": "summary", "text": "A set of previously unknown vulnerabilities in the DNS forwarder implementation of dnsmasq were disclosed on January 19, 2021. The vulnerabilities are collectively known as DNSpooq.\r\n\r\nExploitation of these vulnerabilities could result in remote code execution or denial of service (DoS), or may allow an attacker to more easily forge DNS answers that can poison DNS caches, depending on the specific vulnerability.\r\n\r\nMultiple Cisco products are affected by these vulnerabilities.\r\n\r\nCisco will release software updates that address these vulnerabilities. Any workarounds for a specific Cisco product or service will be documented in the relevant Cisco bugs, which are identified in the Vulnerable Products [\"#vp\"] section of this advisory.\r\n\r\nNote: At the time of publication, no Cisco products were found to be affected by the remote code execution and DoS vulnerabilities, which are identified by the following Common Vulnerabilities and Exposures (CVE) IDs:\r\n\r\n\r\nCVE-2020-25681\r\nCVE-2020-25682\r\nCVE-2020-25683\r\nCVE-2020-25687\r\n\r\n", "title": "Summary" }, { "category": "general", "text": "Cisco investigated its product line to determine which products may be affected by these vulnerabilities.\r\n\r\nThe Vulnerable Products [\"#vp\"] section includes Cisco bug IDs for each affected product or service. The bugs are accessible through the Cisco Bug Search Tool [\"https://bst.cloudapps.cisco.com/bugsearch/bug/BUGID\"] and contain additional platform-specific information, including workarounds (if available) and fixed software releases.\r\n\r\nAny product or service not listed in Vulnerable Products [\"#vp\"] section of this advisory is to be considered not vulnerable.", "title": "Affected Products" }, { "category": "general", "text": "For information about which Cisco software releases are vulnerable, see the Fixed Software [\"#fs\"] section of this advisory.\r\n\r\nAt the time of this investigation, no Cisco products have been found to be affected by the remote code execution and DoS vulnerabilities.\r\n\r\nMultiple Cisco products have been found to be susceptible to DNS cache poisoning attacks. The following table lists Cisco products that have been found to be susceptible to DNS cache poisoning attacks.\r\n\r\nIf a future release date is indicated for software, the date provided represents an estimate based on all information known to Cisco as of the Last Updated date at the top of the advisory. Availability dates are subject to change based on a number of factors, including satisfactory testing results and delivery of other priority features and fixes. If no version or date is listed for an affected component (indicated by a blank field and/or an advisory designation of Interim), Cisco is continuing to evaluate the fix and will update the advisory as additional information becomes available. After the advisory is marked Final, customers should refer to the associated Cisco bug(s) for further details.\r\n Product Cisco Bug ID Fixed Release Availability Network Management and Provisioning Cisco Aironet 1560 Series Access Points CSCvv83754 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83754\"] Wireless LAN Controller:\r\n8.10.151.0\r\n8.5.171.0\r\n\r\nCatalyst 9800 Wireless Controller:\r\n16.12.5\r\n17.3.3\r\n17.5.1 (Mar 2021) Cisco Aironet 1810 Series OfficeExtend Access Points CSCvv83754 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83754\"] Wireless LAN Controller:\r\n8.10.151.0\r\n8.5.171.0\r\n\r\nCatalyst 9800 Wireless Controller:\r\n16.12.5\r\n17.3.3\r\n17.5.1 (Mar 2021) Cisco Aironet 1810w Series Access Points CSCvv83754 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83754\"] Wireless LAN Controller:\r\n8.10.151.0\r\n8.5.171.0\r\n\r\nCatalyst 9800 Wireless Controller:\r\n16.12.5\r\n17.3.3\r\n17.5.1 (Mar 2021) Cisco Aironet 1815 Series Access Points CSCvv83754 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83754\"] Wireless LAN Controller:\r\n8.10.151.0\r\n8.5.171.0\r\n\r\nCatalyst 9800 Wireless Controller:\r\n16.12.5\r\n17.3.3\r\n17.5.1 (Mar 2021) Cisco Aironet 1830 Series Access Points CSCvv83754 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83754\"] Wireless LAN Controller:\r\n8.10.151.0\r\n8.5.171.0\r\n\r\nCatalyst 9800 Wireless Controller:\r\n16.12.5\r\n17.3.3\r\n17.5.1 (Mar 2021) Cisco Aironet 1850 Series Access Points CSCvv83754 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83754\"] Wireless LAN Controller:\r\n8.10.151.0\r\n8.5.171.0\r\n\r\nCatalyst 9800 Wireless Controller:\r\n16.12.5\r\n17.3.3\r\n17.5.1 (Mar 2021) Cisco Aironet 2800 Series Access Points CSCvv83754 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83754\"] Wireless LAN Controller:\r\n8.10.151.0\r\n8.5.171.0\r\n\r\nCatalyst 9800 Wireless Controller:\r\n16.12.5\r\n17.3.3\r\n17.5.1 (Mar 2021) Cisco Aironet 3800 Series Access Points CSCvv83754 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83754\"] Wireless LAN Controller:\r\n8.10.151.0\r\n8.5.171.0\r\n\r\nCatalyst 9800 Wireless Controller:\r\n16.12.5\r\n17.3.3\r\n17.5.1 (Mar 2021) Cisco Aironet 4800 Access Points CSCvv83754 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83754\"] Wireless LAN Controller:\r\n8.10.151.0\r\n8.5.171.0\r\n\r\nCatalyst 9800 Wireless Controller:\r\n16.12.5\r\n17.3.3\r\n17.5.1 (Mar 2021) Cisco Business 100 Series Access Points CSCvv83754 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83754\"] 10.4.1.0 (Mar 2021) Cisco Business 200 Series Access Points CSCvv83754 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83754\"] 10.4.1.0 (Mar 2021) Cisco Catalyst 9100 Access Points CSCvv83754 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83754\"] Wireless LAN Controller:\r\n8.10.151.0\r\n\r\nCatalyst 9800 Wireless Controller:\r\n16.12.5\r\n17.3.3\r\n17.5.1 (Mar 2021) Cisco Catalyst IW6300 Access Points CSCvv83754 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83754\"] Wireless LAN Controller:\r\n8.10.151.0\r\n\r\nCatalyst 9800 Wireless Controller:\r\n16.12.5\r\n17.3.3\r\n17.5.1 (Mar 2021) Cisco ESW6300 Series Access Points CSCvv83754 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83754\"] Wireless LAN Controller:\r\n8.10.151.0\r\n\r\nCatalyst 9800 Wireless Controller:\r\n16.12.5\r\n17.3.3\r\n17.5.1 (Mar 2021) Cisco Policy Suite CSCvv83241 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83241\"] 21.1.0 Routing and Switching - Enterprise and Service Provider Cisco 1000 Series Connected Grid Routers (CGR1000 compute module) CSCvv84554 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv84554\"] 15.9(3)M4 (Jul 2021) Cisco IR800 Integrated Services Router (Guest OS) CSCvv84553 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv84553\"] 15.9(3)M4 (Jul 2021) Cisco Wireless Gateway for LoRaWAN CSCvw00914 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvw00914\"] 2.1.0.3 (Mar 2021) Meraki Products Cisco Meraki MR (all models) N/A Release no. TBD (Aug 2021) Cisco Meraki MS (all models) N/A Release no. TBD (Aug 2021) Cisco Meraki MV (all models) N/A Release no. TBD (Aug 2021) Cisco Meraki MX (all models) N/A Release no. TBD (Aug 2021) Cisco Meraki Z-Series (all models) N/A Release no. TBD (Aug 2021) Routing and Switching - Small Business Cisco RV042 Dual WAN VPN Router CSCvv83789 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83789\"] None planned Cisco RV042G Dual Gigabit WAN VPN Router CSCvv83789 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83789\"] None planned Cisco RV160x VPN Router CSCvv83787 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83787\"] 1.0.02.x (Mar 2021) Cisco RV260x VPN Router CSCvv83788 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83788\"] 1.0.02.x (Mar 2021) Cisco RV340W Dual WAN Gigabit Wireless-AC VPN Router CSCvv83239 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83239\"] 1.0.04.x (Mar 2021) Cisco Small Business RV Series RV110W Wireless-N VPN Firewall CSCvv83235 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83235\"] None planned Cisco Small Business RV Series RV215W Wireless-N VPN Router CSCvv83237 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83237\"] None planned Cisco Small Business RV Series RV320 Dual Gigabit WAN VPN Router CSCvv83238 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83238\"] None planned Cisco Small Business RV Series RV325 Dual WAN VPN Router CSCvv83816 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83816\"] None planned Cisco Small Business RV130 Series VPN Routers CSCvv83791 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83791\"] None planned Cisco Small Business RV130 VPN Router CSCvv83236 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83236\"] None planned Unified Computing Cisco Enterprise NFV Infrastructure Software (NFVIS) CSCvw00975 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvw00975\"] 4.5 (Mar 2021) Voice and Unified Communications Devices Cisco IP Conference Phone 7832 CSCvv83246 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83246\"] 14.0 (Mar 2021) Cisco IP Conference Phone 8832 CSCvv83250 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83250\"] 14.0 (Mar 2021) Cisco IP Phone 6800 Series with Multiplatform Firmware CSCvv83248 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83248\"] 11.3.4 (Jun 2021) Cisco IP Phone 6821 with Multiplatform Firmware CSCvw00982 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvw00982\"] 11.3.4 (Jun 2021) Cisco IP Phone 7800 Series with Multiplatform Firmware CSCvv83243 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83243\"] 11.3.4 (Jun 2021) Cisco IP Phone 7800 Series CSCvv83249 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83249\"] 14.0 (Mar 2021) Cisco IP Phone 8800 Series with Multiplatform Firmware CSCvv83242 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83242\"] 11.3.4 (Jun 2021) Cisco IP Phone 8800 Series CSCvv83242 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83242\"] 14.0 (Mar 2021) Cisco IP Phone 8865 CSCvv83245 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83245\"] 14.0 (Mar 2021) Cisco SPA112 2-Port Phone Adapter CSCvv83234 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83234\"] None planned Cisco SPA122 Analog Telephone Adapter (ATA) with Router CSCvv83234 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83234\"] None planned Cisco SPA232D Multi-Line DECT Analog Telephone Adapter (ATA) CSCvv83234 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83234\"] None planned Cisco Unified IP Phone 9951 CSCvv83247 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83247\"]\r\nNone planned Cisco Unified IP Phone 9971 CSCvv83247 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83247\"]\r\nNone planned Cisco Wireless IP Phone 8821 CSCvw00918 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvw00918\"] 11.0(6)SR1 (Apr 2021) Video, Streaming, TelePresence, and Transcoding Devices Cisco Expressway Series CSCvv83227 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83227\"] X12.7.1 Cisco TelePresence Video Communication Server (VCS) CSCvv83227 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83227\"] X12.7.1 Cisco Cloud Hosted Services Cisco IP Phone 6800 Series CSCvw01205 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvw01205\"] 11.3.4 (Jun 2021) Cisco Spark Calling CSCvw00907 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvw00907\"] X12.7.1 (Feb 2021) Cisco Webex Teams (formerly Cisco Spark) CSCvv83214 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83214\"] None planned Cisco Webex Room Phone CSCvv87082 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv87082\"] 1.2(0)SR1 (Aug 2021)", "title": "Vulnerable Products" }, { "category": "general", "text": "Only products listed in the Vulnerable Products [\"#vp\"] section of this advisory are known to be affected by these vulnerabilities.\r\n\r\nCisco products that do not offer DNS server capabilities are not affected by these vulnerabilities. Cisco has also confirmed that Cisco IOS XE Software is not affected by any of these vulnerabilities.\r\n\r\nAt the time of publication, no Cisco products were found to be affected by the vulnerabilities identified by the following Common Vulnerabilities and Exposures (CVE) IDs:\r\n\r\nCVE-2020-25681\r\nCVE-2020-25682\r\nCVE-2020-25683\r\nCVE-2020-25687", "title": "Products Confirmed Not Vulnerable" }, { "category": "general", "text": "Remote Code Execution and Denial of Service Vulnerabilities\r\n\r\nMultiple vulnerabilities in the DNSSEC implementation of dnsmasq could allow an unauthenticated, remote attacker to execute arbitrary code or cause a denial of service (DoS) condition on an affected device.\r\n\r\nThe vulnerabilities are due to improper memory management when the affected software processes DNS packets with DNSSEC data. An attacker could exploit these vulnerabilities by sending malicious DNS packets to be processed by the affected device.\r\n\r\nWhen these packets are processed, an exploitable overflow condition may occur. A successful exploit could allow the attacker to execute arbitrary code with the privileges of the underlying dnsmasq software or cause DoS condition on the affected device.\r\n\r\nThese vulnerabilities affect dnsmasq installations that match all of the following criteria:\r\n\r\nInclude a vulnerable release of dnsmasq\r\nCapable of acting as a DNS server\r\nCapable of validating DNSSEC data\r\n\r\nThese vulnerabilities have been assigned the following CVE IDs:\r\n\r\n\r\nCVE-2020-25681\r\nCVE-2020-25682\r\nCVE-2020-25683\r\nCVE-2020-25687\r\n\r\nAt the time of this investigation, no Cisco products have been found to be affected by these vulnerabilities.\r\n\r\nDNS Cache Poisoning Attacks\r\n\r\nMultiple weaknesses in the DNS server functionality of dnsmasq could allow an unauthenticated, remote attacker to more easily forge DNS answers that can poison DNS caches.\r\n\r\nEach weakness results in dnsmasq accepting DNS answers based on checks that are performed on an amount of entropy that is lower than what is mandated by RFC 5452. The combination of these weaknesses would allow an attacker to mount a successful DNS cache poisoning attack with low traffic requirements.\r\n\r\nThese weaknesses affect dnsmasq installations that match all of the following criteria:\r\n\r\nInclude a vulnerable release of dnsmasq\r\nCapable of acting as a DNS server\r\nCapable of caching DNS responses\r\n\r\nThese weaknesses have been assigned the following CVE IDs:\r\n\r\nCVE-2020-25684\r\nCVE-2020-25685\r\nCVE-2020-25686\r\n\r\nMultiple Cisco products have been found to be susceptible to DNS cache poisoning attacks.", "title": "Details" }, { "category": "general", "text": "Any workarounds for a specific Cisco product or service will be documented in the relevant Cisco bugs, which are identified in the Vulnerable Products [\"#vp\"] section of this advisory.", "title": "Workarounds" }, { "category": "general", "text": "For information about fixed software releases [\"https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#fixes\"], consult the Cisco bugs identified in the Vulnerable Products [\"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dnsmasq-dns-2021-c5mrdf3g#vp\"] section of this advisory.\r\n\r\nWhen considering software upgrades [\"https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#fixes\"], customers are advised to regularly consult the advisories for Cisco products, which are available from the Cisco Security Advisories page [\"https://www.cisco.com/go/psirt\"], to determine exposure and a complete upgrade solution.\r\n\r\nIn all cases, customers should ensure that the devices to be upgraded contain sufficient memory and confirm that current hardware and software configurations will continue to be supported properly by the new release. If the information is not clear, customers are advised to contact the Cisco Technical Assistance Center (TAC) or their contracted maintenance providers.", "title": "Fixed Software" }, { "category": "general", "text": "To learn about Cisco security vulnerability disclosure policies and publications, see the Security Vulnerability Policy [\"https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html\"]. This document also contains instructions for obtaining fixed software and receiving security vulnerability information from Cisco.", "title": "Vulnerability Policy" }, { "category": "general", "text": "The Cisco Product Security Incident Response Team (PSIRT) is aware that proof-of-concept exploit code is available for the vulnerabilities that are described in this advisory.\r\n\r\nCisco PSIRT is not aware of any malicious use of the vulnerabilities that are described in this advisory.", "title": "Exploitation and Public Announcements" }, { "category": "general", "text": "Cisco would like to thank Moshe Kol and Shlomi Oberman of JSOF for reporting these vulnerabilities, which were investigated and disclosed under the coordination of CERT/CC.", "title": "Source" }, { "category": "legal_disclaimer", "text": "THIS DOCUMENT IS PROVIDED ON AN \"AS IS\" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.\r\n\r\nA standalone copy or paraphrase of the text of this document that omits the distribution URL is an uncontrolled copy and may lack important information or contain factual errors. The information in this document is intended for end users of Cisco products.", "title": "Legal Disclaimer" } ], "publisher": { "category": "vendor", "contact_details": "psirt@cisco.com", "issuing_authority": "Cisco PSIRT", "name": "Cisco", "namespace": "https://wwww.cisco.com" }, "references": [ { "category": "self", "summary": "Multiple Vulnerabilities in dnsmasq DNS Forwarder Affecting Cisco Products: January 2021", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dnsmasq-dns-2021-c5mrdf3g" }, { "category": "external", "summary": "Cisco Security Vulnerability Policy", "url": "https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html" }, { "category": "external", "summary": "Cisco\u0026nbsp;Bug Search Tool", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/BUGID" }, { "category": "external", "summary": "CSCvv83754", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83754" }, { "category": "external", "summary": "CSCvv83241", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83241" }, { "category": "external", "summary": "CSCvv84554", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv84554" }, { "category": "external", "summary": "CSCvv84553", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv84553" }, { "category": "external", "summary": "CSCvw00914", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvw00914" }, { "category": "external", "summary": "CSCvv83789", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83789" }, { "category": "external", "summary": "CSCvv83787", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83787" }, { "category": "external", "summary": "CSCvv83788", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83788" }, { "category": "external", "summary": "CSCvv83239", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83239" }, { "category": "external", "summary": "CSCvv83235", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83235" }, { "category": "external", "summary": "CSCvv83237", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83237" }, { "category": "external", "summary": "CSCvv83238", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83238" }, { "category": "external", "summary": "CSCvv83816", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83816" }, { "category": "external", "summary": "CSCvv83791", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83791" }, { "category": "external", "summary": "CSCvv83236", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83236" }, { "category": "external", "summary": "CSCvw00975", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvw00975" }, { "category": "external", "summary": "CSCvv83246", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83246" }, { "category": "external", "summary": "CSCvv83250", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83250" }, { "category": "external", "summary": "CSCvv83248", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83248" }, { "category": "external", "summary": "CSCvw00982", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvw00982" }, { "category": "external", "summary": "CSCvv83243", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83243" }, { "category": "external", "summary": "CSCvv83249", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83249" }, { "category": "external", "summary": "CSCvv83242", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83242" }, { "category": "external", "summary": "CSCvv83245", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83245" }, { "category": "external", "summary": "CSCvv83234", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83234" }, { "category": "external", "summary": "CSCvv83247", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83247" }, { "category": "external", "summary": "CSCvw00918", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvw00918" }, { "category": "external", "summary": "CSCvv83227", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83227" }, { "category": "external", "summary": "CSCvw01205", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvw01205" }, { "category": "external", "summary": "CSCvw00907", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvw00907" }, { "category": "external", "summary": "CSCvv83214", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83214" }, { "category": "external", "summary": "CSCvv87082", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv87082" }, { "category": "external", "summary": "fixed software releases", "url": "https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#fixes" }, { "category": "external", "summary": "Vulnerable Products", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dnsmasq-dns-2021-c5mrdf3g#vp" }, { "category": "external", "summary": "Cisco\u0026nbsp;Security Advisories page", "url": "https://www.cisco.com/go/psirt" } ], "title": "Multiple Vulnerabilities in dnsmasq DNS Forwarder Affecting Cisco Products: January 2021", "tracking": { "current_release_date": "2021-08-30T17:24:42+00:00", "generator": { "date": "2024-05-10T22:57:53+00:00", "engine": { "name": "TVCE" } }, "id": "cisco-sa-dnsmasq-dns-2021-c5mrdf3g", "initial_release_date": "2021-01-19T12:15:00+00:00", "revision_history": [ { "date": "2021-01-19T12:05:02+00:00", "number": "1.0.0", "summary": "Initial public release." }, { "date": "2021-02-02T17:34:33+00:00", "number": "1.1.0", "summary": "Updated fixed release availability information for Cisco Meraki devices, Cisco Access Points, Cisco IR800 Integrated Services Router, and Cisco 1000 Series Connected Grid Routers." }, { "date": "2021-03-09T12:32:04+00:00", "number": "1.2.0", "summary": "Updated fixed release availability information." }, { "date": "2021-04-26T12:02:10+00:00", "number": "1.3.0", "summary": "Updated list of products confirmed not vulnerable. Removed list of products under investigation." }, { "date": "2021-08-30T17:24:42+00:00", "number": "1.4.0", "summary": "Updated Webex Room Phone fixed release." } ], "status": "final", "version": "1.4.0" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_family", "name": "Cisco NX-OS Software", "product": { "name": "Cisco NX-OS Software ", "product_id": "CSAFPID-80720" } }, { "category": "product_family", "name": "Cisco Identity Services Engine Software", "product": { "name": "Cisco Identity Services Engine Software ", "product_id": "CSAFPID-111903" } }, { "category": "product_family", "name": "Cisco TelePresence Video Communication Server (VCS) Expressway", "product": { "name": "Cisco TelePresence Video Communication Server (VCS) Expressway ", "product_id": "CSAFPID-209614" } }, { "category": "product_family", "name": "Cisco Session Initiation Protocol (SIP) Software", "product": { "name": "Cisco Session Initiation Protocol (SIP) Software ", "product_id": "CSAFPID-277608" } } ], "category": "vendor", "name": "Cisco" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-25683", "ids": [ { "system_name": "Cisco Bug ID", "text": "CSCvx66581" }, { "system_name": "Cisco Bug ID", "text": "CSCvx66584" }, { "system_name": "Cisco Bug ID", "text": "CSCvx17339" }, { "system_name": "Cisco Bug ID", "text": "CSCvx20637" }, { "system_name": "Cisco Bug ID", "text": "CSCvv83232" }, { "system_name": "Cisco Bug ID", "text": "CSCvw00918" } ], "notes": [ { "category": "other", "text": "Complete.", "title": "Affected Product Comprehensiveness" } ], "product_status": { "known_affected": [ "CSAFPID-80720", "CSAFPID-209614", "CSAFPID-111903", "CSAFPID-277608" ] }, "release_date": "2021-01-19T12:15:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "Cisco has released software updates that address this vulnerability.", "product_ids": [ "CSAFPID-209614", "CSAFPID-277608", "CSAFPID-111903", "CSAFPID-80720" ], "url": "https://software.cisco.com" } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-80720", "CSAFPID-209614", "CSAFPID-111903", "CSAFPID-277608" ] } ], "title": "vuln-CVE-2020-25683" }, { "cve": "CVE-2020-25687", "ids": [ { "system_name": "Cisco Bug ID", "text": "CSCvv83232" }, { "system_name": "Cisco Bug ID", "text": "CSCvx17339" }, { "system_name": "Cisco Bug ID", "text": "CSCvx20637" }, { "system_name": "Cisco Bug ID", "text": "CSCvx66581" }, { "system_name": "Cisco Bug ID", "text": "CSCvx66584" }, { "system_name": "Cisco Bug ID", "text": "CSCvw00918" } ], "notes": [ { "category": "other", "text": "Complete.", "title": "Affected Product Comprehensiveness" } ], "product_status": { "known_affected": [ "CSAFPID-111903", "CSAFPID-209614", "CSAFPID-80720", "CSAFPID-277608" ] }, "release_date": "2021-01-19T12:15:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "Cisco has released software updates that address this vulnerability.", "product_ids": [ "CSAFPID-209614", "CSAFPID-277608", "CSAFPID-111903", "CSAFPID-80720" ], "url": "https://software.cisco.com" } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-111903", "CSAFPID-209614", "CSAFPID-80720", "CSAFPID-277608" ] } ], "title": "vuln-CVE-2020-25687" }, { "cve": "CVE-2020-25681", "ids": [ { "system_name": "Cisco Bug ID", "text": "CSCvx20637" }, { "system_name": "Cisco Bug ID", "text": "CSCvx66581" }, { "system_name": "Cisco Bug ID", "text": "CSCvx66584" }, { "system_name": "Cisco Bug ID", "text": "CSCvw00918" }, { "system_name": "Cisco Bug ID", "text": "CSCvv83232" } ], "notes": [ { "category": "other", "text": "Complete.", "title": "Affected Product Comprehensiveness" } ], "product_status": { "known_affected": [ "CSAFPID-209614", "CSAFPID-80720", "CSAFPID-277608", "CSAFPID-111903" ] }, "release_date": "2021-01-19T12:15:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "Cisco has released software updates that address this vulnerability.", "product_ids": [ "CSAFPID-209614", "CSAFPID-277608", "CSAFPID-111903", "CSAFPID-80720" ], "url": "https://software.cisco.com" } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-209614", "CSAFPID-80720", "CSAFPID-277608", "CSAFPID-111903" ] } ], "title": "vuln-CVE-2020-25681" }, { "cve": "CVE-2020-25682", "ids": [ { "system_name": "Cisco Bug ID", "text": "CSCvx20637" }, { "system_name": "Cisco Bug ID", "text": "CSCvw00918" }, { "system_name": "Cisco Bug ID", "text": "CSCvv83232" }, { "system_name": "Cisco Bug ID", "text": "CSCvx66581" }, { "system_name": "Cisco Bug ID", "text": "CSCvx66584" } ], "notes": [ { "category": "other", "text": "Complete.", "title": "Affected Product Comprehensiveness" } ], "product_status": { "known_affected": [ "CSAFPID-209614", "CSAFPID-277608", "CSAFPID-111903", "CSAFPID-80720" ] }, "release_date": "2021-01-19T12:15:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "Cisco has released software updates that address this vulnerability.", "product_ids": [ "CSAFPID-209614", "CSAFPID-277608", "CSAFPID-111903", "CSAFPID-80720" ], "url": "https://software.cisco.com" } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-209614", "CSAFPID-277608", "CSAFPID-111903", "CSAFPID-80720" ] } ], "title": "vuln-CVE-2020-25682" }, { "cve": "CVE-2020-25686", "ids": [ { "system_name": "Cisco Bug ID", "text": "CSCvw00918" }, { "system_name": "Cisco Bug ID", "text": "CSCvx66581" }, { "system_name": "Cisco Bug ID", "text": "CSCvx66584" }, { "system_name": "Cisco Bug ID", "text": "CSCvx17339" }, { "system_name": "Cisco Bug ID", "text": "CSCvx20637" }, { "system_name": "Cisco Bug ID", "text": "CSCvv83232" } ], "notes": [ { "category": "other", "text": "Complete.", "title": "Affected Product Comprehensiveness" } ], "product_status": { "known_affected": [ "CSAFPID-277608", "CSAFPID-80720", "CSAFPID-209614", "CSAFPID-111903" ] }, "release_date": "2021-01-19T12:15:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "Cisco has released software updates that address this vulnerability.", "product_ids": [ "CSAFPID-209614", "CSAFPID-277608", "CSAFPID-111903", "CSAFPID-80720" ], "url": "https://software.cisco.com" } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "CSAFPID-277608", "CSAFPID-80720", "CSAFPID-209614", "CSAFPID-111903" ] } ], "title": "vuln-CVE-2020-25686" }, { "cve": "CVE-2020-25685", "ids": [ { "system_name": "Cisco Bug ID", "text": "CSCvx20637" }, { "system_name": "Cisco Bug ID", "text": "CSCvw00918" }, { "system_name": "Cisco Bug ID", "text": "CSCvv83232" }, { "system_name": "Cisco Bug ID", "text": "CSCvx66581" }, { "system_name": "Cisco Bug ID", "text": "CSCvx66584" } ], "notes": [ { "category": "other", "text": "Complete.", "title": "Affected Product Comprehensiveness" } ], "product_status": { "known_affected": [ "CSAFPID-209614", "CSAFPID-277608", "CSAFPID-111903", "CSAFPID-80720" ] }, "release_date": "2021-01-19T12:15:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "Cisco has released software updates that address this vulnerability.", "product_ids": [ "CSAFPID-209614", "CSAFPID-277608", "CSAFPID-111903", "CSAFPID-80720" ], "url": "https://software.cisco.com" } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "CSAFPID-209614", "CSAFPID-277608", "CSAFPID-111903", "CSAFPID-80720" ] } ], "title": "vuln-CVE-2020-25685" }, { "cve": "CVE-2020-25684", "ids": [ { "system_name": "Cisco Bug ID", "text": "CSCvw00918" }, { "system_name": "Cisco Bug ID", "text": "CSCvv83232" }, { "system_name": "Cisco Bug ID", "text": "CSCvx66581" }, { "system_name": "Cisco Bug ID", "text": "CSCvx66584" }, { "system_name": "Cisco Bug ID", "text": "CSCvx20637" } ], "notes": [ { "category": "other", "text": "Complete.", "title": "Affected Product Comprehensiveness" } ], "product_status": { "known_affected": [ "CSAFPID-277608", "CSAFPID-111903", "CSAFPID-80720", "CSAFPID-209614" ] }, "release_date": "2021-01-19T12:15:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "Cisco has released software updates that address this vulnerability.", "product_ids": [ "CSAFPID-209614", "CSAFPID-277608", "CSAFPID-111903", "CSAFPID-80720" ], "url": "https://software.cisco.com" } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "CSAFPID-277608", "CSAFPID-111903", "CSAFPID-80720", "CSAFPID-209614" ] } ], "title": "Multiple Vulnerabilities in dnsmasq DNS server affecting Cisco Products: January 2021" } ] }
rhsa-2021_0152
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_vex", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for dnsmasq is now available for Red Hat Enterprise Linux 8.1 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The dnsmasq packages contain Dnsmasq, a lightweight DNS (Domain Name Server) forwarder and DHCP (Dynamic Host Configuration Protocol) server.\n\nSecurity Fix(es):\n\n* dnsmasq: heap-based buffer overflow in sort_rrset() when DNSSEC is enabled (CVE-2020-25681)\n\n* dnsmasq: buffer overflow in extract_name() due to missing length check when DNSSEC is enabled (CVE-2020-25682)\n\n* dnsmasq: heap-based buffer overflow with large memcpy in get_rdata() when DNSSEC is enabled (CVE-2020-25683)\n\n* dnsmasq: loose address/port check in reply_query() makes forging replies easier for an off-path attacker (CVE-2020-25684)\n\n* dnsmasq: loose query name check in reply_query() makes forging replies easier for an off-path attacker (CVE-2020-25685)\n\n* dnsmasq: multiple queries forwarded for the same name makes forging replies easier for an off-path attacker (CVE-2020-25686)\n\n* dnsmasq: heap-based buffer overflow with large memcpy in sort_rrset() when DNSSEC is enabled (CVE-2020-25687)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat offerings.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:0152", "url": "https://access.redhat.com/errata/RHSA-2021:0152" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-001", "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-001" }, { "category": "external", "summary": "1881875", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1881875" }, { "category": "external", "summary": "1882014", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1882014" }, { "category": "external", "summary": "1882018", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1882018" }, { "category": "external", "summary": "1889686", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889686" }, { "category": "external", "summary": "1889688", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889688" }, { "category": "external", "summary": "1890125", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890125" }, { "category": "external", "summary": "1891568", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1891568" }, { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/data/csaf/v2/advisories/2021/rhsa-2021_0152.json" } ], "title": "Red Hat Security Advisory: dnsmasq security update", "tracking": { "current_release_date": "2024-09-16T05:15:40+00:00", "generator": { "date": "2024-09-16T05:15:40+00:00", "engine": { "name": "Red Hat SDEngine", "version": "3.33.3" } }, "id": "RHSA-2021:0152", "initial_release_date": "2021-01-19T13:11:33+00:00", "revision_history": [ { "date": "2021-01-19T13:11:33+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-01-19T13:11:33+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-09-16T05:15:40+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product": { "name": "Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_eus:8.1::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "dnsmasq-0:2.79-6.el8_1.1.src", "product": { "name": "dnsmasq-0:2.79-6.el8_1.1.src", "product_id": "dnsmasq-0:2.79-6.el8_1.1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq@2.79-6.el8_1.1?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "dnsmasq-0:2.79-6.el8_1.1.aarch64", "product": { "name": "dnsmasq-0:2.79-6.el8_1.1.aarch64", "product_id": "dnsmasq-0:2.79-6.el8_1.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq@2.79-6.el8_1.1?arch=aarch64" } } }, { "category": "product_version", "name": "dnsmasq-utils-0:2.79-6.el8_1.1.aarch64", "product": { "name": "dnsmasq-utils-0:2.79-6.el8_1.1.aarch64", "product_id": "dnsmasq-utils-0:2.79-6.el8_1.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-utils@2.79-6.el8_1.1?arch=aarch64" } } }, { "category": "product_version", "name": "dnsmasq-debugsource-0:2.79-6.el8_1.1.aarch64", "product": { "name": "dnsmasq-debugsource-0:2.79-6.el8_1.1.aarch64", "product_id": "dnsmasq-debugsource-0:2.79-6.el8_1.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-debugsource@2.79-6.el8_1.1?arch=aarch64" } } }, { "category": "product_version", "name": "dnsmasq-debuginfo-0:2.79-6.el8_1.1.aarch64", "product": { "name": "dnsmasq-debuginfo-0:2.79-6.el8_1.1.aarch64", "product_id": "dnsmasq-debuginfo-0:2.79-6.el8_1.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-debuginfo@2.79-6.el8_1.1?arch=aarch64" } } }, { "category": "product_version", "name": "dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.aarch64", "product": { "name": "dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.aarch64", "product_id": "dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-utils-debuginfo@2.79-6.el8_1.1?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "dnsmasq-0:2.79-6.el8_1.1.ppc64le", "product": { "name": "dnsmasq-0:2.79-6.el8_1.1.ppc64le", "product_id": "dnsmasq-0:2.79-6.el8_1.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq@2.79-6.el8_1.1?arch=ppc64le" } } }, { "category": "product_version", "name": "dnsmasq-utils-0:2.79-6.el8_1.1.ppc64le", "product": { "name": "dnsmasq-utils-0:2.79-6.el8_1.1.ppc64le", "product_id": "dnsmasq-utils-0:2.79-6.el8_1.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-utils@2.79-6.el8_1.1?arch=ppc64le" } } }, { "category": "product_version", "name": "dnsmasq-debugsource-0:2.79-6.el8_1.1.ppc64le", "product": { "name": "dnsmasq-debugsource-0:2.79-6.el8_1.1.ppc64le", "product_id": "dnsmasq-debugsource-0:2.79-6.el8_1.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-debugsource@2.79-6.el8_1.1?arch=ppc64le" } } }, { "category": "product_version", "name": "dnsmasq-debuginfo-0:2.79-6.el8_1.1.ppc64le", "product": { "name": "dnsmasq-debuginfo-0:2.79-6.el8_1.1.ppc64le", "product_id": "dnsmasq-debuginfo-0:2.79-6.el8_1.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-debuginfo@2.79-6.el8_1.1?arch=ppc64le" } } }, { "category": "product_version", "name": "dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.ppc64le", "product": { "name": "dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.ppc64le", "product_id": "dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-utils-debuginfo@2.79-6.el8_1.1?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "dnsmasq-0:2.79-6.el8_1.1.x86_64", "product": { "name": "dnsmasq-0:2.79-6.el8_1.1.x86_64", "product_id": "dnsmasq-0:2.79-6.el8_1.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq@2.79-6.el8_1.1?arch=x86_64" } } }, { "category": "product_version", "name": "dnsmasq-utils-0:2.79-6.el8_1.1.x86_64", "product": { "name": "dnsmasq-utils-0:2.79-6.el8_1.1.x86_64", "product_id": "dnsmasq-utils-0:2.79-6.el8_1.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-utils@2.79-6.el8_1.1?arch=x86_64" } } }, { "category": "product_version", "name": "dnsmasq-debugsource-0:2.79-6.el8_1.1.x86_64", "product": { "name": "dnsmasq-debugsource-0:2.79-6.el8_1.1.x86_64", "product_id": "dnsmasq-debugsource-0:2.79-6.el8_1.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-debugsource@2.79-6.el8_1.1?arch=x86_64" } } }, { "category": "product_version", "name": "dnsmasq-debuginfo-0:2.79-6.el8_1.1.x86_64", "product": { "name": "dnsmasq-debuginfo-0:2.79-6.el8_1.1.x86_64", "product_id": "dnsmasq-debuginfo-0:2.79-6.el8_1.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-debuginfo@2.79-6.el8_1.1?arch=x86_64" } } }, { "category": "product_version", "name": "dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.x86_64", "product": { "name": "dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.x86_64", "product_id": "dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-utils-debuginfo@2.79-6.el8_1.1?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "dnsmasq-0:2.79-6.el8_1.1.s390x", "product": { "name": "dnsmasq-0:2.79-6.el8_1.1.s390x", "product_id": "dnsmasq-0:2.79-6.el8_1.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq@2.79-6.el8_1.1?arch=s390x" } } }, { "category": "product_version", "name": "dnsmasq-utils-0:2.79-6.el8_1.1.s390x", "product": { "name": "dnsmasq-utils-0:2.79-6.el8_1.1.s390x", "product_id": "dnsmasq-utils-0:2.79-6.el8_1.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-utils@2.79-6.el8_1.1?arch=s390x" } } }, { "category": "product_version", "name": "dnsmasq-debugsource-0:2.79-6.el8_1.1.s390x", "product": { "name": "dnsmasq-debugsource-0:2.79-6.el8_1.1.s390x", "product_id": "dnsmasq-debugsource-0:2.79-6.el8_1.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-debugsource@2.79-6.el8_1.1?arch=s390x" } } }, { "category": "product_version", "name": "dnsmasq-debuginfo-0:2.79-6.el8_1.1.s390x", "product": { "name": "dnsmasq-debuginfo-0:2.79-6.el8_1.1.s390x", "product_id": "dnsmasq-debuginfo-0:2.79-6.el8_1.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-debuginfo@2.79-6.el8_1.1?arch=s390x" } } }, { "category": "product_version", "name": "dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.s390x", "product": { "name": "dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.s390x", "product_id": "dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-utils-debuginfo@2.79-6.el8_1.1?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.79-6.el8_1.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.aarch64" }, "product_reference": "dnsmasq-0:2.79-6.el8_1.1.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.79-6.el8_1.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.ppc64le" }, "product_reference": "dnsmasq-0:2.79-6.el8_1.1.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.79-6.el8_1.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.s390x" }, "product_reference": "dnsmasq-0:2.79-6.el8_1.1.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.79-6.el8_1.1.src as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.src" }, "product_reference": "dnsmasq-0:2.79-6.el8_1.1.src", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.79-6.el8_1.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.x86_64" }, "product_reference": "dnsmasq-0:2.79-6.el8_1.1.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.79-6.el8_1.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.aarch64" }, "product_reference": "dnsmasq-debuginfo-0:2.79-6.el8_1.1.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.79-6.el8_1.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.ppc64le" }, "product_reference": "dnsmasq-debuginfo-0:2.79-6.el8_1.1.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.79-6.el8_1.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.s390x" }, "product_reference": "dnsmasq-debuginfo-0:2.79-6.el8_1.1.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.79-6.el8_1.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.x86_64" }, "product_reference": "dnsmasq-debuginfo-0:2.79-6.el8_1.1.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debugsource-0:2.79-6.el8_1.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.aarch64" }, "product_reference": "dnsmasq-debugsource-0:2.79-6.el8_1.1.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debugsource-0:2.79-6.el8_1.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.ppc64le" }, "product_reference": "dnsmasq-debugsource-0:2.79-6.el8_1.1.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debugsource-0:2.79-6.el8_1.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.s390x" }, "product_reference": "dnsmasq-debugsource-0:2.79-6.el8_1.1.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debugsource-0:2.79-6.el8_1.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.x86_64" }, "product_reference": "dnsmasq-debugsource-0:2.79-6.el8_1.1.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.79-6.el8_1.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.aarch64" }, "product_reference": "dnsmasq-utils-0:2.79-6.el8_1.1.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.79-6.el8_1.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.ppc64le" }, "product_reference": "dnsmasq-utils-0:2.79-6.el8_1.1.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.79-6.el8_1.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.s390x" }, "product_reference": "dnsmasq-utils-0:2.79-6.el8_1.1.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.79-6.el8_1.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.x86_64" }, "product_reference": "dnsmasq-utils-0:2.79-6.el8_1.1.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.aarch64" }, "product_reference": "dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.ppc64le" }, "product_reference": "dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.s390x" }, "product_reference": "dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.x86_64" }, "product_reference": "dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Moshe Kol", "Shlomi Oberman" ], "organization": "JSOF" } ], "cve": "CVE-2020-25681", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2020-09-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1881875" } ], "notes": [ { "category": "description", "text": "A flaw was found in dnsmasq. A heap-based buffer overflow was discovered in the way RRSets are sorted before validating with DNSSEC data. An attacker on the network, who can forge DNS replies such as that they are accepted as valid, could use this flaw to cause a buffer overflow with arbitrary data in a heap memory segment, possibly executing code on the machine. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "dnsmasq: heap-based buffer overflow in sort_rrset() when DNSSEC is enabled", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the versions of dnsmasq as shipped with Red Hat Enterprise Linux 5, 6, and 7 as they are not compiled with DNSSEC support.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.src", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-25681" }, { "category": "external", "summary": "RHBZ#1881875", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1881875" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-25681", "url": "https://www.cve.org/CVERecord?id=CVE-2020-25681" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25681", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25681" }, { "category": "external", "summary": "https://www.jsof-tech.com/disclosures/dnspooq/", "url": "https://www.jsof-tech.com/disclosures/dnspooq/" } ], "release_date": "2021-01-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.src", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0152" }, { "category": "workaround", "details": "The only known way to mitigate this flaw is to disable DNSSEC altogether, by removing the `--dnssec` command line option or the `dnssec` option from dnsmasq configuration file.", "product_ids": [ "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.src", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.src", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "dnsmasq: heap-based buffer overflow in sort_rrset() when DNSSEC is enabled" }, { "acknowledgments": [ { "names": [ "Moshe Kol", "Shlomi Oberman" ], "organization": "JSOF" } ], "cve": "CVE-2020-25682", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2020-09-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1882014" } ], "notes": [ { "category": "description", "text": "A flaw was found in dnsmasq. A buffer overflow vulnerability was discovered in the way dnsmasq extract names from DNS packets before validating them with DNSSEC data. An attacker on the network, who can create valid DNS replies, could use this flaw to cause an overflow with arbitrary data in a heap-allocated memory, possibly executing code on the machine. The flaw is in the rfc1035.c:extract_name() function, which writes data to the memory pointed by name assuming MAXDNAME*2 bytes are available in the buffer. However, in some code execution paths, it is possible extract_name() gets passed an offset from the base buffer, thus reducing, in practice, the number of available bytes that can be written in the buffer. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "dnsmasq: buffer overflow in extract_name() due to missing length check when DNSSEC is enabled", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the versions of dnsmasq as shipped with Red Hat Enterprise Linux 5, 6, and 7 as they are not compiled with DNSSEC support.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.src", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-25682" }, { "category": "external", "summary": "RHBZ#1882014", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1882014" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-25682", "url": "https://www.cve.org/CVERecord?id=CVE-2020-25682" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25682", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25682" }, { "category": "external", "summary": "https://www.jsof-tech.com/disclosures/dnspooq/", "url": "https://www.jsof-tech.com/disclosures/dnspooq/" } ], "release_date": "2021-01-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.src", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0152" }, { "category": "workaround", "details": "The only known way to mitigate this flaw is to disable DNSSEC altogether, by removing the `--dnssec` command line option or the `dnssec` option from dnsmasq configuration file.", "product_ids": [ "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.src", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.src", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "dnsmasq: buffer overflow in extract_name() due to missing length check when DNSSEC is enabled" }, { "acknowledgments": [ { "names": [ "Moshe Kol", "Shlomi Oberman" ], "organization": "JSOF" } ], "cve": "CVE-2020-25683", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2020-09-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1882018" } ], "notes": [ { "category": "description", "text": "A flaw was found in dnsmasq. A heap-based buffer overflow was discovered in dnsmasq when DNSSEC is enabled and before it validates the received DNS entries. A remote attacker, who can create valid DNS replies, could use this flaw to cause an overflow in a heap-allocated memory. This flaw is caused by the lack of length checks in rfc1035.c:extract_name(), which could be abused to make the code execute memcpy() with a negative size in get_rdata() and cause a crash in dnsmasq, resulting in a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "dnsmasq: heap-based buffer overflow with large memcpy in get_rdata() when DNSSEC is enabled", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the versions of dnsmasq as shipped with Red Hat Enterprise Linux 5, 6, and 7 as they are not compiled with DNSSEC support.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.src", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-25683" }, { "category": "external", "summary": "RHBZ#1882018", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1882018" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-25683", "url": "https://www.cve.org/CVERecord?id=CVE-2020-25683" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25683", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25683" }, { "category": "external", "summary": "https://www.jsof-tech.com/disclosures/dnspooq/", "url": "https://www.jsof-tech.com/disclosures/dnspooq/" } ], "release_date": "2021-01-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.src", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0152" }, { "category": "workaround", "details": "The only known way to mitigate this flaw is to disable DNSSEC altogether, by removing the `--dnssec` command line option or the `dnssec` option from dnsmasq configuration file.", "product_ids": [ "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.src", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.src", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "dnsmasq: heap-based buffer overflow with large memcpy in get_rdata() when DNSSEC is enabled" }, { "acknowledgments": [ { "names": [ "Moshe Kol", "Shlomi Oberman" ], "organization": "JSOF" } ], "cve": "CVE-2020-25684", "cwe": { "id": "CWE-358", "name": "Improperly Implemented Security Check for Standard" }, "discovery_date": "2020-09-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1889686" } ], "notes": [ { "category": "description", "text": "A flaw was found in dnsmasq. When getting a reply from a forwarded query, dnsmasq checks in the forward.c:reply_query() if the reply destination address/port is used by the pending forwarded queries. However, it does not use the address/port to retrieve the exact forwarded query, substantially reducing the number of attempts an attacker on the network would have to perform to forge a reply and get it accepted by dnsmasq. This issue contrasts with RFC5452, which specifies a query\u0027s attributes that all must be used to match a reply. This flaw allows an attacker to perform a DNS Cache Poisoning attack. If chained with CVE-2020-25685 or CVE-2020-25686, the attack complexity of a successful attack is reduced. The highest threat from this vulnerability is to data integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "dnsmasq: loose address/port check in reply_query() makes forging replies easier for an off-path attacker", "title": "Vulnerability summary" }, { "category": "other", "text": "Dnsmasq may be run by libvirt and/or NetworkManager. libvirt uses dnsmasq by default to provide DNS service to its guests. NetworkManager may be configured to use dnsmasq to provide DNS service to the system, if a line `dns=dnsmasq` is present in the `[main]` section of the configuration file /etc/NetworkManager/NetworkManager.conf.\n\nIn Red Hat OpenStack Platform (RHOSP) and Red Hat Virtualization (RHV), the dnsmasq package is provided by the underlying Red Hat Enterprise Linux (RHEL) product. RHOSP and RHV are therefore indirectly affected, so please ensure that the underlying RHEL dnsmasq package is updated.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.src", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-25684" }, { "category": "external", "summary": "RHBZ#1889686", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889686" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-25684", "url": "https://www.cve.org/CVERecord?id=CVE-2020-25684" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25684", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25684" }, { "category": "external", "summary": "https://www.jsof-tech.com/disclosures/dnspooq/", "url": "https://www.jsof-tech.com/disclosures/dnspooq/" } ], "release_date": "2021-01-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.src", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0152" }, { "category": "workaround", "details": "The impact of this flaw can be reduced by disabling the dnsmasq cache by adding `--cache-size=0` when calling dnsmasq or by adding a line with `cache-size=0` to the dnsmasq configuration file (/etc/dnsmasq.conf by default).\n\nWhen using Red Hat Enterprise Linux 8.3 with libvirt through a virt:rhel module, use `virsh net-edit \u003cnetwork-name\u003e` and reference https://libvirt.org/formatnetwork.html#elementsNamespaces to add the suggested option `cache-size=0`. \n\nThere is no way to customize the dnsmasq configuration generated by libvirt, when using versions of Red Hat Enterprise Linux prior to version 8.3. If dnsmasq is being run through NetworkManager, create a new file in /etc/NetworkManager/dnsmasq.d/ and add `cache-size=0` to it.\n\nIn all cases, by disabling the cache, you may experience a performance loss in your environment due to all DNS queries being forwarded to the upstream servers. Please evaluate if the mitigation is appropriate for the system\u2019s environment before applying.", "product_ids": [ "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.src", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N", "version": "3.1" }, "products": [ "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.src", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "dnsmasq: loose address/port check in reply_query() makes forging replies easier for an off-path attacker" }, { "acknowledgments": [ { "names": [ "Moshe Kol", "Shlomi Oberman" ], "organization": "JSOF" } ], "cve": "CVE-2020-25685", "cwe": { "id": "CWE-326", "name": "Inadequate Encryption Strength" }, "discovery_date": "2020-09-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1889688" } ], "notes": [ { "category": "description", "text": "A flaw was found in dnsmasq. When getting a reply from a forwarded query, dnsmasq checks in forward.c:reply_query(), which is the forwarded query that matches the reply, by only using a weak hash of the query name. Due to the weak hash (CRC32 when dnsmasq is compiled without DNSSEC, SHA-1 when it is) this flaw allows an off-path attacker to find several different domains all having the same hash, substantially reducing the number of attempts they would have to perform to forge a reply and get it accepted by dnsmasq. This is in contrast with RFC5452, which specifies that the query name is one of the attributes of a query that must be used to match a reply. This flaw could be abused to perform a DNS Cache Poisoning attack. If chained with CVE-2020-25684 the attack complexity of a successful attack is reduced. The highest threat from this vulnerability is to data integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "dnsmasq: loose query name check in reply_query() makes forging replies easier for an off-path attacker", "title": "Vulnerability summary" }, { "category": "other", "text": "Dnsmasq may be run by libvirt and/or NetworkManager. libvirt uses dnsmasq by default to provide DNS service to its guests. NetworkManager may be configured to use dnsmasq to provide DNS service to the system, if a line `dns=dnsmasq` is present in the `[main]` section of the configuration file /etc/NetworkManager/NetworkManager.conf.\n\nIn Red Hat OpenStack Platform (RHOSP) and Red Hat Virtualization (RHV), the dnsmasq package is provided by the underlying Red Hat Enterprise Linux (RHEL) product. RHOSP and RHV are therefore indirectly affected, so please ensure that the underlying RHEL dnsmasq package is updated.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.src", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-25685" }, { "category": "external", "summary": "RHBZ#1889688", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889688" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-25685", "url": "https://www.cve.org/CVERecord?id=CVE-2020-25685" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25685", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25685" }, { "category": "external", "summary": "https://www.jsof-tech.com/disclosures/dnspooq/", "url": "https://www.jsof-tech.com/disclosures/dnspooq/" } ], "release_date": "2021-01-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.src", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0152" }, { "category": "workaround", "details": "The impact of this flaw can be reduced by disabling the dnsmasq cache by adding `--cache-size=0` when calling dnsmasq or by adding a line with `cache-size=0` to the dnsmasq configuration file (/etc/dnsmasq.conf by default). \n\nWhen using Red Hat Enterprise Linux 8.3 with libvirt through a virt:rhel module, use `virsh net-edit \u003cnetwork-name\u003e` and reference https://libvirt.org/formatnetwork.html#elementsNamespaces to add the suggested option `cache-size=0`. \n\nThere is no way to customize the dnsmasq configuration generated by libvirt, when using versions of Red Hat Enterprise Linux prior to version 8.3. If dnsmasq is being run through NetworkManager, create a new file in /etc/NetworkManager/dnsmasq.d/ and add `cache-size=0` to it.\n\nIn all cases, by disabling the cache, you may experience a performance loss in your environment due to all DNS queries being forwarded to the upstream servers. Please evaluate if the mitigation is appropriate for the system\u2019s environment before applying.", "product_ids": [ "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.src", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N", "version": "3.1" }, "products": [ "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.src", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "dnsmasq: loose query name check in reply_query() makes forging replies easier for an off-path attacker" }, { "acknowledgments": [ { "names": [ "Moshe Kol", "Shlomi Oberman" ], "organization": "JSOF" } ], "cve": "CVE-2020-25686", "cwe": { "id": "CWE-290", "name": "Authentication Bypass by Spoofing" }, "discovery_date": "2020-09-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1890125" } ], "notes": [ { "category": "description", "text": "A flaw was found in dnsmasq. When receiving a query, dnsmasq does not check for an existing pending request for the same name and forwards a new request. By default, a maximum of 150 pending queries can be sent to upstream servers, so there can be at most 150 queries for the same name. This flaw allows an off-path attacker on the network to substantially reduce the number of attempts that it would have to perform to forge a reply and have it accepted by dnsmasq. This issue is mentioned in the \"Birthday Attacks\" section of RFC5452. If chained with CVE-2020-25684, the attack complexity of a successful attack is reduced. The highest threat from this vulnerability is to data integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "dnsmasq: multiple queries forwarded for the same name makes forging replies easier for an off-path attacker", "title": "Vulnerability summary" }, { "category": "other", "text": "Dnsmasq may be run by libvirt and/or NetworkManager. libvirt uses dnsmasq by default to provide DNS service to its guests. NetworkManager may be configured to use dnsmasq to provide DNS service to the system, if a line `dns=dnsmasq` is present in the `[main]` section of the configuration file /etc/NetworkManager/NetworkManager.conf.\n\nIn Red Hat OpenStack Platform (RHOSP) and Red Hat Virtualization (RHV), the dnsmasq package is provided by the underlying Red Hat Enterprise Linux (RHEL) product. RHOSP and RHV are therefore indirectly affected, so please ensure that the underlying RHEL dnsmasq package is updated.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.src", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-25686" }, { "category": "external", "summary": "RHBZ#1890125", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890125" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-25686", "url": "https://www.cve.org/CVERecord?id=CVE-2020-25686" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25686", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25686" }, { "category": "external", "summary": "https://www.jsof-tech.com/disclosures/dnspooq/", "url": "https://www.jsof-tech.com/disclosures/dnspooq/" } ], "release_date": "2021-01-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.src", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0152" }, { "category": "workaround", "details": "The impact of this flaw can be reduced by disabling the dnsmasq cache by adding `--cache-size=0` when calling dnsmasq or by adding a line with `cache-size=0` to the dnsmasq configuration file (/etc/dnsmasq.conf by default). \n\nWhen using Red Hat Enterprise Linux 8.3 with libvirt through a virt:rhel module, use `virsh net-edit \u003cnetwork-name\u003e` and reference https://libvirt.org/formatnetwork.html#elementsNamespaces to add the suggested option `cache-size=0`. \n\nThere is no way to customize the dnsmasq configuration generated by libvirt, when using versions of Red Hat Enterprise Linux prior to version 8.3. If dnsmasq is being run through NetworkManager, create a new file in /etc/NetworkManager/dnsmasq.d/ and add `cache-size=0` to it.\n\nIn all cases, by disabling the cache, you may experience a performance loss in your environment due to all DNS queries being forwarded to the upstream servers. Please evaluate if the mitigation is appropriate for the system\u2019s environment before applying.", "product_ids": [ "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.src", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N", "version": "3.1" }, "products": [ "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.src", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "dnsmasq: multiple queries forwarded for the same name makes forging replies easier for an off-path attacker" }, { "acknowledgments": [ { "names": [ "Moshe Kol", "Shlomi Oberman" ], "organization": "JSOF" } ], "cve": "CVE-2020-25687", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2020-09-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1891568" } ], "notes": [ { "category": "description", "text": "A flaw was found in dnsmasq. A heap-based buffer overflow was discovered in dnsmasq when DNSSEC is enabled and before it validates the received DNS entries. This flaw allows a remote attacker, who can create valid DNS replies, to cause an overflow in a heap-allocated memory. This flaw is caused by the lack of length checks in rfc1035.c:extract_name(), which could be abused to make the code execute memcpy() with a negative size in sort_rrset() and cause a crash in dnsmasq, resulting in a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "dnsmasq: heap-based buffer overflow with large memcpy in sort_rrset() when DNSSEC is enabled", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the versions of dnsmasq as shipped with Red Hat Enterprise Linux 5, 6, and 7 as they are not compiled with DNSSEC support.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.src", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-25687" }, { "category": "external", "summary": "RHBZ#1891568", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1891568" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-25687", "url": "https://www.cve.org/CVERecord?id=CVE-2020-25687" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25687", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25687" }, { "category": "external", "summary": "https://www.jsof-tech.com/disclosures/dnspooq/", "url": "https://www.jsof-tech.com/disclosures/dnspooq/" } ], "release_date": "2021-01-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.src", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0152" }, { "category": "workaround", "details": "The only known way to mitigate this flaw is to disable DNSSEC altogether, by removing the `--dnssec` command line option or the `dnssec` option from dnsmasq configuration file.", "product_ids": [ "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.src", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.src", "AppStream-8.1.0.Z.EUS:dnsmasq-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-debuginfo-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-debugsource-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-0:2.79-6.el8_1.1.x86_64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.aarch64", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.ppc64le", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.s390x", "AppStream-8.1.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-6.el8_1.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "dnsmasq: heap-based buffer overflow with large memcpy in sort_rrset() when DNSSEC is enabled" } ] }
rhsa-2021_0395
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_vex", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for redhat-virtualization-host is now available for Red Hat Virtualization 4 for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The redhat-virtualization-host packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host. Red Hat Virtualization Hosts (RHVH) are installed using a special build of Red Hat Enterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host\u0027s resources and performing administrative tasks.\n\nSecurity Fix(es):\n\n* sudo: Heap buffer overflow in argument parsing (CVE-2021-3156)\n\n* dnsmasq: loose address/port check in reply_query() makes forging replies easier for an off-path attacker (CVE-2020-25684)\n\n* dnsmasq: loose query name check in reply_query() makes forging replies easier for an off-path attacker (CVE-2020-25685)\n\n* dnsmasq: multiple queries forwarded for the same name makes forging replies easier for an off-path attacker (CVE-2020-25686)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* When performing an upgrade of the Red Hat Virtualization Host using the command `yum update`, the yum repository for RHV 4.3 EUS is unreachable\n\nAs a workaround, run the following command:\n`# yum update --releasever=7Server` (BZ#1899378)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat offerings.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:0395", "url": "https://access.redhat.com/errata/RHSA-2021:0395" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-001", "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-001" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-002", "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-002" }, { "category": "external", "summary": "1889686", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889686" }, { "category": "external", "summary": "1889688", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889688" }, { "category": "external", "summary": "1890125", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890125" }, { "category": "external", "summary": "1899378", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1899378" }, { "category": "external", "summary": "1916111", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1916111" }, { "category": "external", "summary": "1917684", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1917684" }, { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/data/csaf/v2/advisories/2021/rhsa-2021_0395.json" } ], "title": "Red Hat Security Advisory: RHV-H security, bug fix, enhancement update (redhat-virtualization-host) 4.3.13", "tracking": { "current_release_date": "2024-09-13T20:24:31+00:00", "generator": { "date": "2024-09-13T20:24:31+00:00", "engine": { "name": "Red Hat SDEngine", "version": "3.33.3" } }, "id": "RHSA-2021:0395", "initial_release_date": "2021-02-03T10:39:04+00:00", "revision_history": [ { "date": "2021-02-03T10:39:04+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-02-03T10:39:04+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-09-13T20:24:31+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product": { "name": "Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "7Server-RHEV-4-Agents-7", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::hypervisor" } } }, { "category": "product_name", "name": "RHEL 7-based RHEV-H for RHEV 4 (build requirements)", "product": { "name": "RHEL 7-based RHEV-H for RHEV 4 (build requirements)", "product_id": "7Server-RHEV-4-HypervisorBuild-7", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::hypervisor" } } }, { "category": "product_name", "name": "Red Hat Virtualization 4 Hypervisor for RHEL 7", "product": { "name": "Red Hat Virtualization 4 Hypervisor for RHEL 7", "product_id": "7Server-RHEV-4-Hypervisor-7", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::hypervisor" } } } ], "category": "product_family", "name": "Red Hat Virtualization" }, { "branches": [ { "category": "product_version", "name": "vdsm-0:4.30.51-1.el7ev.src", "product": { "name": "vdsm-0:4.30.51-1.el7ev.src", "product_id": "vdsm-0:4.30.51-1.el7ev.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm@4.30.51-1.el7ev?arch=src" } } }, { "category": "product_version", "name": "redhat-release-virtualization-host-0:4.3.13-2.el7ev.src", "product": { "name": "redhat-release-virtualization-host-0:4.3.13-2.el7ev.src", "product_id": "redhat-release-virtualization-host-0:4.3.13-2.el7ev.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/redhat-release-virtualization-host@4.3.13-2.el7ev?arch=src" } } }, { "category": "product_version", "name": "redhat-virtualization-host-0:4.3.13-20210127.0.el7_9.src", "product": { "name": "redhat-virtualization-host-0:4.3.13-20210127.0.el7_9.src", "product_id": "redhat-virtualization-host-0:4.3.13-20210127.0.el7_9.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/redhat-virtualization-host@4.3.13-20210127.0.el7_9?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "vdsm-0:4.30.51-1.el7ev.x86_64", "product": { "name": "vdsm-0:4.30.51-1.el7ev.x86_64", "product_id": "vdsm-0:4.30.51-1.el7ev.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm@4.30.51-1.el7ev?arch=x86_64" } } }, { "category": "product_version", "name": "vdsm-gluster-0:4.30.51-1.el7ev.x86_64", "product": { "name": "vdsm-gluster-0:4.30.51-1.el7ev.x86_64", "product_id": "vdsm-gluster-0:4.30.51-1.el7ev.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm-gluster@4.30.51-1.el7ev?arch=x86_64" } } }, { "category": "product_version", "name": "vdsm-hook-checkips-0:4.30.51-1.el7ev.x86_64", "product": { "name": "vdsm-hook-checkips-0:4.30.51-1.el7ev.x86_64", "product_id": "vdsm-hook-checkips-0:4.30.51-1.el7ev.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm-hook-checkips@4.30.51-1.el7ev?arch=x86_64" } } }, { "category": "product_version", "name": "vdsm-hook-extra-ipv4-addrs-0:4.30.51-1.el7ev.x86_64", "product": { "name": "vdsm-hook-extra-ipv4-addrs-0:4.30.51-1.el7ev.x86_64", "product_id": "vdsm-hook-extra-ipv4-addrs-0:4.30.51-1.el7ev.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm-hook-extra-ipv4-addrs@4.30.51-1.el7ev?arch=x86_64" } } }, { "category": "product_version", "name": "vdsm-network-0:4.30.51-1.el7ev.x86_64", "product": { "name": "vdsm-network-0:4.30.51-1.el7ev.x86_64", "product_id": "vdsm-network-0:4.30.51-1.el7ev.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm-network@4.30.51-1.el7ev?arch=x86_64" } } }, { "category": "product_version", "name": "redhat-release-virtualization-host-0:4.3.13-2.el7ev.x86_64", "product": { "name": "redhat-release-virtualization-host-0:4.3.13-2.el7ev.x86_64", "product_id": "redhat-release-virtualization-host-0:4.3.13-2.el7ev.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/redhat-release-virtualization-host@4.3.13-2.el7ev?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "vdsm-0:4.30.51-1.el7ev.ppc64le", "product": { "name": "vdsm-0:4.30.51-1.el7ev.ppc64le", "product_id": "vdsm-0:4.30.51-1.el7ev.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm@4.30.51-1.el7ev?arch=ppc64le" } } }, { "category": "product_version", "name": "vdsm-gluster-0:4.30.51-1.el7ev.ppc64le", "product": { "name": "vdsm-gluster-0:4.30.51-1.el7ev.ppc64le", "product_id": "vdsm-gluster-0:4.30.51-1.el7ev.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm-gluster@4.30.51-1.el7ev?arch=ppc64le" } } }, { "category": "product_version", "name": "vdsm-hook-checkips-0:4.30.51-1.el7ev.ppc64le", "product": { "name": "vdsm-hook-checkips-0:4.30.51-1.el7ev.ppc64le", "product_id": "vdsm-hook-checkips-0:4.30.51-1.el7ev.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm-hook-checkips@4.30.51-1.el7ev?arch=ppc64le" } } }, { "category": "product_version", "name": "vdsm-hook-extra-ipv4-addrs-0:4.30.51-1.el7ev.ppc64le", "product": { "name": "vdsm-hook-extra-ipv4-addrs-0:4.30.51-1.el7ev.ppc64le", "product_id": "vdsm-hook-extra-ipv4-addrs-0:4.30.51-1.el7ev.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm-hook-extra-ipv4-addrs@4.30.51-1.el7ev?arch=ppc64le" } } }, { "category": "product_version", "name": "vdsm-network-0:4.30.51-1.el7ev.ppc64le", "product": { "name": "vdsm-network-0:4.30.51-1.el7ev.ppc64le", "product_id": "vdsm-network-0:4.30.51-1.el7ev.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm-network@4.30.51-1.el7ev?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "vdsm-api-0:4.30.51-1.el7ev.noarch", "product": { "name": "vdsm-api-0:4.30.51-1.el7ev.noarch", "product_id": "vdsm-api-0:4.30.51-1.el7ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm-api@4.30.51-1.el7ev?arch=noarch" } } }, { "category": "product_version", "name": "vdsm-client-0:4.30.51-1.el7ev.noarch", "product": { "name": "vdsm-client-0:4.30.51-1.el7ev.noarch", "product_id": "vdsm-client-0:4.30.51-1.el7ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm-client@4.30.51-1.el7ev?arch=noarch" } } }, { "category": "product_version", "name": "vdsm-common-0:4.30.51-1.el7ev.noarch", "product": { "name": "vdsm-common-0:4.30.51-1.el7ev.noarch", "product_id": "vdsm-common-0:4.30.51-1.el7ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm-common@4.30.51-1.el7ev?arch=noarch" } } }, { "category": "product_version", "name": "vdsm-hook-cpuflags-0:4.30.51-1.el7ev.noarch", "product": { "name": "vdsm-hook-cpuflags-0:4.30.51-1.el7ev.noarch", "product_id": "vdsm-hook-cpuflags-0:4.30.51-1.el7ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm-hook-cpuflags@4.30.51-1.el7ev?arch=noarch" } } }, { "category": "product_version", "name": "vdsm-hook-ethtool-options-0:4.30.51-1.el7ev.noarch", "product": { "name": "vdsm-hook-ethtool-options-0:4.30.51-1.el7ev.noarch", "product_id": "vdsm-hook-ethtool-options-0:4.30.51-1.el7ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm-hook-ethtool-options@4.30.51-1.el7ev?arch=noarch" } } }, { "category": "product_version", "name": "vdsm-hook-fcoe-0:4.30.51-1.el7ev.noarch", "product": { "name": "vdsm-hook-fcoe-0:4.30.51-1.el7ev.noarch", "product_id": "vdsm-hook-fcoe-0:4.30.51-1.el7ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm-hook-fcoe@4.30.51-1.el7ev?arch=noarch" } } }, { "category": "product_version", "name": "vdsm-hook-localdisk-0:4.30.51-1.el7ev.noarch", "product": { "name": "vdsm-hook-localdisk-0:4.30.51-1.el7ev.noarch", "product_id": "vdsm-hook-localdisk-0:4.30.51-1.el7ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm-hook-localdisk@4.30.51-1.el7ev?arch=noarch" } } }, { "category": "product_version", "name": "vdsm-hook-macspoof-0:4.30.51-1.el7ev.noarch", "product": { "name": "vdsm-hook-macspoof-0:4.30.51-1.el7ev.noarch", "product_id": "vdsm-hook-macspoof-0:4.30.51-1.el7ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm-hook-macspoof@4.30.51-1.el7ev?arch=noarch" } } }, { "category": "product_version", "name": "vdsm-hook-nestedvt-0:4.30.51-1.el7ev.noarch", "product": { "name": "vdsm-hook-nestedvt-0:4.30.51-1.el7ev.noarch", "product_id": "vdsm-hook-nestedvt-0:4.30.51-1.el7ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm-hook-nestedvt@4.30.51-1.el7ev?arch=noarch" } } }, { "category": "product_version", "name": "vdsm-hook-openstacknet-0:4.30.51-1.el7ev.noarch", "product": { "name": "vdsm-hook-openstacknet-0:4.30.51-1.el7ev.noarch", "product_id": "vdsm-hook-openstacknet-0:4.30.51-1.el7ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm-hook-openstacknet@4.30.51-1.el7ev?arch=noarch" } } }, { "category": "product_version", "name": "vdsm-hook-vhostmd-0:4.30.51-1.el7ev.noarch", "product": { "name": "vdsm-hook-vhostmd-0:4.30.51-1.el7ev.noarch", "product_id": "vdsm-hook-vhostmd-0:4.30.51-1.el7ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm-hook-vhostmd@4.30.51-1.el7ev?arch=noarch" } } }, { "category": "product_version", "name": "vdsm-hook-vmfex-dev-0:4.30.51-1.el7ev.noarch", "product": { "name": "vdsm-hook-vmfex-dev-0:4.30.51-1.el7ev.noarch", "product_id": "vdsm-hook-vmfex-dev-0:4.30.51-1.el7ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm-hook-vmfex-dev@4.30.51-1.el7ev?arch=noarch" } } }, { "category": "product_version", "name": "vdsm-http-0:4.30.51-1.el7ev.noarch", "product": { "name": "vdsm-http-0:4.30.51-1.el7ev.noarch", "product_id": "vdsm-http-0:4.30.51-1.el7ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm-http@4.30.51-1.el7ev?arch=noarch" } } }, { "category": "product_version", "name": "vdsm-jsonrpc-0:4.30.51-1.el7ev.noarch", "product": { "name": "vdsm-jsonrpc-0:4.30.51-1.el7ev.noarch", "product_id": "vdsm-jsonrpc-0:4.30.51-1.el7ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm-jsonrpc@4.30.51-1.el7ev?arch=noarch" } } }, { "category": "product_version", "name": "vdsm-python-0:4.30.51-1.el7ev.noarch", "product": { "name": "vdsm-python-0:4.30.51-1.el7ev.noarch", "product_id": "vdsm-python-0:4.30.51-1.el7ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm-python@4.30.51-1.el7ev?arch=noarch" } } }, { "category": "product_version", "name": "vdsm-yajsonrpc-0:4.30.51-1.el7ev.noarch", "product": { "name": "vdsm-yajsonrpc-0:4.30.51-1.el7ev.noarch", "product_id": "vdsm-yajsonrpc-0:4.30.51-1.el7ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm-yajsonrpc@4.30.51-1.el7ev?arch=noarch" } } }, { "category": "product_version", "name": "redhat-virtualization-host-image-update-placeholder-0:4.3.13-2.el7ev.noarch", "product": { "name": "redhat-virtualization-host-image-update-placeholder-0:4.3.13-2.el7ev.noarch", "product_id": "redhat-virtualization-host-image-update-placeholder-0:4.3.13-2.el7ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/redhat-virtualization-host-image-update-placeholder@4.3.13-2.el7ev?arch=noarch" } } }, { "category": "product_version", "name": "redhat-virtualization-host-image-update-0:4.3.13-20210127.0.el7_9.noarch", "product": { "name": "redhat-virtualization-host-image-update-0:4.3.13-20210127.0.el7_9.noarch", "product_id": "redhat-virtualization-host-image-update-0:4.3.13-20210127.0.el7_9.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/redhat-virtualization-host-image-update@4.3.13-20210127.0.el7_9?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "vdsm-0:4.30.51-1.el7ev.ppc64le as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "7Server-RHEV-4-Agents-7:vdsm-0:4.30.51-1.el7ev.ppc64le" }, "product_reference": "vdsm-0:4.30.51-1.el7ev.ppc64le", "relates_to_product_reference": "7Server-RHEV-4-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-0:4.30.51-1.el7ev.src as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "7Server-RHEV-4-Agents-7:vdsm-0:4.30.51-1.el7ev.src" }, "product_reference": "vdsm-0:4.30.51-1.el7ev.src", "relates_to_product_reference": "7Server-RHEV-4-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-0:4.30.51-1.el7ev.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "7Server-RHEV-4-Agents-7:vdsm-0:4.30.51-1.el7ev.x86_64" }, "product_reference": "vdsm-0:4.30.51-1.el7ev.x86_64", "relates_to_product_reference": "7Server-RHEV-4-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-api-0:4.30.51-1.el7ev.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "7Server-RHEV-4-Agents-7:vdsm-api-0:4.30.51-1.el7ev.noarch" }, "product_reference": "vdsm-api-0:4.30.51-1.el7ev.noarch", "relates_to_product_reference": "7Server-RHEV-4-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-client-0:4.30.51-1.el7ev.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "7Server-RHEV-4-Agents-7:vdsm-client-0:4.30.51-1.el7ev.noarch" }, "product_reference": "vdsm-client-0:4.30.51-1.el7ev.noarch", "relates_to_product_reference": "7Server-RHEV-4-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-common-0:4.30.51-1.el7ev.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "7Server-RHEV-4-Agents-7:vdsm-common-0:4.30.51-1.el7ev.noarch" }, "product_reference": "vdsm-common-0:4.30.51-1.el7ev.noarch", "relates_to_product_reference": "7Server-RHEV-4-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-gluster-0:4.30.51-1.el7ev.ppc64le as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "7Server-RHEV-4-Agents-7:vdsm-gluster-0:4.30.51-1.el7ev.ppc64le" }, "product_reference": "vdsm-gluster-0:4.30.51-1.el7ev.ppc64le", "relates_to_product_reference": "7Server-RHEV-4-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-gluster-0:4.30.51-1.el7ev.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "7Server-RHEV-4-Agents-7:vdsm-gluster-0:4.30.51-1.el7ev.x86_64" }, "product_reference": "vdsm-gluster-0:4.30.51-1.el7ev.x86_64", "relates_to_product_reference": "7Server-RHEV-4-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-hook-checkips-0:4.30.51-1.el7ev.ppc64le as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "7Server-RHEV-4-Agents-7:vdsm-hook-checkips-0:4.30.51-1.el7ev.ppc64le" }, "product_reference": "vdsm-hook-checkips-0:4.30.51-1.el7ev.ppc64le", "relates_to_product_reference": "7Server-RHEV-4-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-hook-checkips-0:4.30.51-1.el7ev.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "7Server-RHEV-4-Agents-7:vdsm-hook-checkips-0:4.30.51-1.el7ev.x86_64" }, "product_reference": "vdsm-hook-checkips-0:4.30.51-1.el7ev.x86_64", "relates_to_product_reference": "7Server-RHEV-4-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-hook-cpuflags-0:4.30.51-1.el7ev.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "7Server-RHEV-4-Agents-7:vdsm-hook-cpuflags-0:4.30.51-1.el7ev.noarch" }, "product_reference": "vdsm-hook-cpuflags-0:4.30.51-1.el7ev.noarch", "relates_to_product_reference": "7Server-RHEV-4-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-hook-ethtool-options-0:4.30.51-1.el7ev.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "7Server-RHEV-4-Agents-7:vdsm-hook-ethtool-options-0:4.30.51-1.el7ev.noarch" }, "product_reference": "vdsm-hook-ethtool-options-0:4.30.51-1.el7ev.noarch", "relates_to_product_reference": "7Server-RHEV-4-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-hook-extra-ipv4-addrs-0:4.30.51-1.el7ev.ppc64le as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "7Server-RHEV-4-Agents-7:vdsm-hook-extra-ipv4-addrs-0:4.30.51-1.el7ev.ppc64le" }, "product_reference": "vdsm-hook-extra-ipv4-addrs-0:4.30.51-1.el7ev.ppc64le", "relates_to_product_reference": "7Server-RHEV-4-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-hook-extra-ipv4-addrs-0:4.30.51-1.el7ev.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "7Server-RHEV-4-Agents-7:vdsm-hook-extra-ipv4-addrs-0:4.30.51-1.el7ev.x86_64" }, "product_reference": "vdsm-hook-extra-ipv4-addrs-0:4.30.51-1.el7ev.x86_64", "relates_to_product_reference": "7Server-RHEV-4-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-hook-fcoe-0:4.30.51-1.el7ev.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "7Server-RHEV-4-Agents-7:vdsm-hook-fcoe-0:4.30.51-1.el7ev.noarch" }, "product_reference": "vdsm-hook-fcoe-0:4.30.51-1.el7ev.noarch", "relates_to_product_reference": "7Server-RHEV-4-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-hook-localdisk-0:4.30.51-1.el7ev.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "7Server-RHEV-4-Agents-7:vdsm-hook-localdisk-0:4.30.51-1.el7ev.noarch" }, "product_reference": "vdsm-hook-localdisk-0:4.30.51-1.el7ev.noarch", "relates_to_product_reference": "7Server-RHEV-4-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-hook-macspoof-0:4.30.51-1.el7ev.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "7Server-RHEV-4-Agents-7:vdsm-hook-macspoof-0:4.30.51-1.el7ev.noarch" }, "product_reference": "vdsm-hook-macspoof-0:4.30.51-1.el7ev.noarch", "relates_to_product_reference": "7Server-RHEV-4-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-hook-nestedvt-0:4.30.51-1.el7ev.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "7Server-RHEV-4-Agents-7:vdsm-hook-nestedvt-0:4.30.51-1.el7ev.noarch" }, "product_reference": "vdsm-hook-nestedvt-0:4.30.51-1.el7ev.noarch", "relates_to_product_reference": "7Server-RHEV-4-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-hook-openstacknet-0:4.30.51-1.el7ev.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "7Server-RHEV-4-Agents-7:vdsm-hook-openstacknet-0:4.30.51-1.el7ev.noarch" }, "product_reference": "vdsm-hook-openstacknet-0:4.30.51-1.el7ev.noarch", "relates_to_product_reference": "7Server-RHEV-4-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-hook-vhostmd-0:4.30.51-1.el7ev.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "7Server-RHEV-4-Agents-7:vdsm-hook-vhostmd-0:4.30.51-1.el7ev.noarch" }, "product_reference": "vdsm-hook-vhostmd-0:4.30.51-1.el7ev.noarch", "relates_to_product_reference": "7Server-RHEV-4-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-hook-vmfex-dev-0:4.30.51-1.el7ev.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "7Server-RHEV-4-Agents-7:vdsm-hook-vmfex-dev-0:4.30.51-1.el7ev.noarch" }, "product_reference": "vdsm-hook-vmfex-dev-0:4.30.51-1.el7ev.noarch", "relates_to_product_reference": "7Server-RHEV-4-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-http-0:4.30.51-1.el7ev.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "7Server-RHEV-4-Agents-7:vdsm-http-0:4.30.51-1.el7ev.noarch" }, "product_reference": "vdsm-http-0:4.30.51-1.el7ev.noarch", "relates_to_product_reference": "7Server-RHEV-4-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-jsonrpc-0:4.30.51-1.el7ev.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "7Server-RHEV-4-Agents-7:vdsm-jsonrpc-0:4.30.51-1.el7ev.noarch" }, "product_reference": "vdsm-jsonrpc-0:4.30.51-1.el7ev.noarch", "relates_to_product_reference": "7Server-RHEV-4-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-network-0:4.30.51-1.el7ev.ppc64le as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "7Server-RHEV-4-Agents-7:vdsm-network-0:4.30.51-1.el7ev.ppc64le" }, "product_reference": "vdsm-network-0:4.30.51-1.el7ev.ppc64le", "relates_to_product_reference": "7Server-RHEV-4-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-network-0:4.30.51-1.el7ev.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "7Server-RHEV-4-Agents-7:vdsm-network-0:4.30.51-1.el7ev.x86_64" }, "product_reference": "vdsm-network-0:4.30.51-1.el7ev.x86_64", "relates_to_product_reference": "7Server-RHEV-4-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-python-0:4.30.51-1.el7ev.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "7Server-RHEV-4-Agents-7:vdsm-python-0:4.30.51-1.el7ev.noarch" }, "product_reference": "vdsm-python-0:4.30.51-1.el7ev.noarch", "relates_to_product_reference": "7Server-RHEV-4-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-yajsonrpc-0:4.30.51-1.el7ev.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "7Server-RHEV-4-Agents-7:vdsm-yajsonrpc-0:4.30.51-1.el7ev.noarch" }, "product_reference": "vdsm-yajsonrpc-0:4.30.51-1.el7ev.noarch", "relates_to_product_reference": "7Server-RHEV-4-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "redhat-virtualization-host-0:4.3.13-20210127.0.el7_9.src as a component of Red Hat Virtualization 4 Hypervisor for RHEL 7", "product_id": "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.13-20210127.0.el7_9.src" }, "product_reference": "redhat-virtualization-host-0:4.3.13-20210127.0.el7_9.src", "relates_to_product_reference": "7Server-RHEV-4-Hypervisor-7" }, { "category": "default_component_of", "full_product_name": { "name": "redhat-virtualization-host-image-update-0:4.3.13-20210127.0.el7_9.noarch as a component of Red Hat Virtualization 4 Hypervisor for RHEL 7", "product_id": "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.13-20210127.0.el7_9.noarch" }, "product_reference": "redhat-virtualization-host-image-update-0:4.3.13-20210127.0.el7_9.noarch", "relates_to_product_reference": "7Server-RHEV-4-Hypervisor-7" }, { "category": "default_component_of", "full_product_name": { "name": "redhat-release-virtualization-host-0:4.3.13-2.el7ev.src as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)", "product_id": "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.13-2.el7ev.src" }, "product_reference": "redhat-release-virtualization-host-0:4.3.13-2.el7ev.src", "relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7" }, { "category": "default_component_of", "full_product_name": { "name": "redhat-release-virtualization-host-0:4.3.13-2.el7ev.x86_64 as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)", "product_id": "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.13-2.el7ev.x86_64" }, "product_reference": "redhat-release-virtualization-host-0:4.3.13-2.el7ev.x86_64", "relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7" }, { "category": "default_component_of", "full_product_name": { "name": "redhat-virtualization-host-0:4.3.13-20210127.0.el7_9.src as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)", "product_id": "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.13-20210127.0.el7_9.src" }, "product_reference": "redhat-virtualization-host-0:4.3.13-20210127.0.el7_9.src", "relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7" }, { "category": "default_component_of", "full_product_name": { "name": "redhat-virtualization-host-image-update-0:4.3.13-20210127.0.el7_9.noarch as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)", "product_id": "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.13-20210127.0.el7_9.noarch" }, "product_reference": "redhat-virtualization-host-image-update-0:4.3.13-20210127.0.el7_9.noarch", "relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7" }, { "category": "default_component_of", "full_product_name": { "name": "redhat-virtualization-host-image-update-placeholder-0:4.3.13-2.el7ev.noarch as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)", "product_id": "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.13-2.el7ev.noarch" }, "product_reference": "redhat-virtualization-host-image-update-placeholder-0:4.3.13-2.el7ev.noarch", "relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Moshe Kol", "Shlomi Oberman" ], "organization": "JSOF" } ], "cve": "CVE-2020-25684", "cwe": { "id": "CWE-358", "name": "Improperly Implemented Security Check for Standard" }, "discovery_date": "2020-09-03T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RHEV-4-Agents-7:vdsm-0:4.30.51-1.el7ev.ppc64le", "7Server-RHEV-4-Agents-7:vdsm-0:4.30.51-1.el7ev.src", "7Server-RHEV-4-Agents-7:vdsm-0:4.30.51-1.el7ev.x86_64", "7Server-RHEV-4-Agents-7:vdsm-api-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-client-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-common-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-gluster-0:4.30.51-1.el7ev.ppc64le", "7Server-RHEV-4-Agents-7:vdsm-gluster-0:4.30.51-1.el7ev.x86_64", "7Server-RHEV-4-Agents-7:vdsm-hook-checkips-0:4.30.51-1.el7ev.ppc64le", "7Server-RHEV-4-Agents-7:vdsm-hook-checkips-0:4.30.51-1.el7ev.x86_64", "7Server-RHEV-4-Agents-7:vdsm-hook-cpuflags-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-ethtool-options-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-extra-ipv4-addrs-0:4.30.51-1.el7ev.ppc64le", "7Server-RHEV-4-Agents-7:vdsm-hook-extra-ipv4-addrs-0:4.30.51-1.el7ev.x86_64", "7Server-RHEV-4-Agents-7:vdsm-hook-fcoe-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-localdisk-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-macspoof-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-nestedvt-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-openstacknet-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-vhostmd-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-vmfex-dev-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-http-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-jsonrpc-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-network-0:4.30.51-1.el7ev.ppc64le", "7Server-RHEV-4-Agents-7:vdsm-network-0:4.30.51-1.el7ev.x86_64", "7Server-RHEV-4-Agents-7:vdsm-python-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-yajsonrpc-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.13-2.el7ev.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.13-2.el7ev.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.13-2.el7ev.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1889686" } ], "notes": [ { "category": "description", "text": "A flaw was found in dnsmasq. When getting a reply from a forwarded query, dnsmasq checks in the forward.c:reply_query() if the reply destination address/port is used by the pending forwarded queries. However, it does not use the address/port to retrieve the exact forwarded query, substantially reducing the number of attempts an attacker on the network would have to perform to forge a reply and get it accepted by dnsmasq. This issue contrasts with RFC5452, which specifies a query\u0027s attributes that all must be used to match a reply. This flaw allows an attacker to perform a DNS Cache Poisoning attack. If chained with CVE-2020-25685 or CVE-2020-25686, the attack complexity of a successful attack is reduced. The highest threat from this vulnerability is to data integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "dnsmasq: loose address/port check in reply_query() makes forging replies easier for an off-path attacker", "title": "Vulnerability summary" }, { "category": "other", "text": "Dnsmasq may be run by libvirt and/or NetworkManager. libvirt uses dnsmasq by default to provide DNS service to its guests. NetworkManager may be configured to use dnsmasq to provide DNS service to the system, if a line `dns=dnsmasq` is present in the `[main]` section of the configuration file /etc/NetworkManager/NetworkManager.conf.\n\nIn Red Hat OpenStack Platform (RHOSP) and Red Hat Virtualization (RHV), the dnsmasq package is provided by the underlying Red Hat Enterprise Linux (RHEL) product. RHOSP and RHV are therefore indirectly affected, so please ensure that the underlying RHEL dnsmasq package is updated.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.13-20210127.0.el7_9.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.13-20210127.0.el7_9.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.13-20210127.0.el7_9.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.13-20210127.0.el7_9.noarch" ], "known_not_affected": [ "7Server-RHEV-4-Agents-7:vdsm-0:4.30.51-1.el7ev.ppc64le", "7Server-RHEV-4-Agents-7:vdsm-0:4.30.51-1.el7ev.src", "7Server-RHEV-4-Agents-7:vdsm-0:4.30.51-1.el7ev.x86_64", "7Server-RHEV-4-Agents-7:vdsm-api-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-client-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-common-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-gluster-0:4.30.51-1.el7ev.ppc64le", "7Server-RHEV-4-Agents-7:vdsm-gluster-0:4.30.51-1.el7ev.x86_64", "7Server-RHEV-4-Agents-7:vdsm-hook-checkips-0:4.30.51-1.el7ev.ppc64le", "7Server-RHEV-4-Agents-7:vdsm-hook-checkips-0:4.30.51-1.el7ev.x86_64", "7Server-RHEV-4-Agents-7:vdsm-hook-cpuflags-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-ethtool-options-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-extra-ipv4-addrs-0:4.30.51-1.el7ev.ppc64le", "7Server-RHEV-4-Agents-7:vdsm-hook-extra-ipv4-addrs-0:4.30.51-1.el7ev.x86_64", "7Server-RHEV-4-Agents-7:vdsm-hook-fcoe-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-localdisk-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-macspoof-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-nestedvt-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-openstacknet-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-vhostmd-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-vmfex-dev-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-http-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-jsonrpc-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-network-0:4.30.51-1.el7ev.ppc64le", "7Server-RHEV-4-Agents-7:vdsm-network-0:4.30.51-1.el7ev.x86_64", "7Server-RHEV-4-Agents-7:vdsm-python-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-yajsonrpc-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.13-2.el7ev.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.13-2.el7ev.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.13-2.el7ev.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-25684" }, { "category": "external", "summary": "RHBZ#1889686", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889686" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-25684", "url": "https://www.cve.org/CVERecord?id=CVE-2020-25684" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25684", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25684" }, { "category": "external", "summary": "https://www.jsof-tech.com/disclosures/dnspooq/", "url": "https://www.jsof-tech.com/disclosures/dnspooq/" } ], "release_date": "2021-01-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891", "product_ids": [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.13-20210127.0.el7_9.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.13-20210127.0.el7_9.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.13-20210127.0.el7_9.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.13-20210127.0.el7_9.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0395" }, { "category": "workaround", "details": "The impact of this flaw can be reduced by disabling the dnsmasq cache by adding `--cache-size=0` when calling dnsmasq or by adding a line with `cache-size=0` to the dnsmasq configuration file (/etc/dnsmasq.conf by default).\n\nWhen using Red Hat Enterprise Linux 8.3 with libvirt through a virt:rhel module, use `virsh net-edit \u003cnetwork-name\u003e` and reference https://libvirt.org/formatnetwork.html#elementsNamespaces to add the suggested option `cache-size=0`. \n\nThere is no way to customize the dnsmasq configuration generated by libvirt, when using versions of Red Hat Enterprise Linux prior to version 8.3. If dnsmasq is being run through NetworkManager, create a new file in /etc/NetworkManager/dnsmasq.d/ and add `cache-size=0` to it.\n\nIn all cases, by disabling the cache, you may experience a performance loss in your environment due to all DNS queries being forwarded to the upstream servers. Please evaluate if the mitigation is appropriate for the system\u2019s environment before applying.", "product_ids": [ "7Server-RHEV-4-Agents-7:vdsm-0:4.30.51-1.el7ev.ppc64le", "7Server-RHEV-4-Agents-7:vdsm-0:4.30.51-1.el7ev.src", "7Server-RHEV-4-Agents-7:vdsm-0:4.30.51-1.el7ev.x86_64", "7Server-RHEV-4-Agents-7:vdsm-api-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-client-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-common-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-gluster-0:4.30.51-1.el7ev.ppc64le", "7Server-RHEV-4-Agents-7:vdsm-gluster-0:4.30.51-1.el7ev.x86_64", "7Server-RHEV-4-Agents-7:vdsm-hook-checkips-0:4.30.51-1.el7ev.ppc64le", "7Server-RHEV-4-Agents-7:vdsm-hook-checkips-0:4.30.51-1.el7ev.x86_64", "7Server-RHEV-4-Agents-7:vdsm-hook-cpuflags-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-ethtool-options-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-extra-ipv4-addrs-0:4.30.51-1.el7ev.ppc64le", "7Server-RHEV-4-Agents-7:vdsm-hook-extra-ipv4-addrs-0:4.30.51-1.el7ev.x86_64", "7Server-RHEV-4-Agents-7:vdsm-hook-fcoe-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-localdisk-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-macspoof-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-nestedvt-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-openstacknet-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-vhostmd-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-vmfex-dev-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-http-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-jsonrpc-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-network-0:4.30.51-1.el7ev.ppc64le", "7Server-RHEV-4-Agents-7:vdsm-network-0:4.30.51-1.el7ev.x86_64", "7Server-RHEV-4-Agents-7:vdsm-python-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-yajsonrpc-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.13-20210127.0.el7_9.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.13-20210127.0.el7_9.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.13-2.el7ev.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.13-2.el7ev.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.13-20210127.0.el7_9.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.13-20210127.0.el7_9.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.13-2.el7ev.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N", "version": "3.1" }, "products": [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.13-20210127.0.el7_9.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.13-20210127.0.el7_9.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.13-20210127.0.el7_9.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.13-20210127.0.el7_9.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "dnsmasq: loose address/port check in reply_query() makes forging replies easier for an off-path attacker" }, { "acknowledgments": [ { "names": [ "Moshe Kol", "Shlomi Oberman" ], "organization": "JSOF" } ], "cve": "CVE-2020-25685", "cwe": { "id": "CWE-326", "name": "Inadequate Encryption Strength" }, "discovery_date": "2020-09-03T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RHEV-4-Agents-7:vdsm-0:4.30.51-1.el7ev.ppc64le", "7Server-RHEV-4-Agents-7:vdsm-0:4.30.51-1.el7ev.src", "7Server-RHEV-4-Agents-7:vdsm-0:4.30.51-1.el7ev.x86_64", "7Server-RHEV-4-Agents-7:vdsm-api-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-client-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-common-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-gluster-0:4.30.51-1.el7ev.ppc64le", "7Server-RHEV-4-Agents-7:vdsm-gluster-0:4.30.51-1.el7ev.x86_64", "7Server-RHEV-4-Agents-7:vdsm-hook-checkips-0:4.30.51-1.el7ev.ppc64le", "7Server-RHEV-4-Agents-7:vdsm-hook-checkips-0:4.30.51-1.el7ev.x86_64", "7Server-RHEV-4-Agents-7:vdsm-hook-cpuflags-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-ethtool-options-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-extra-ipv4-addrs-0:4.30.51-1.el7ev.ppc64le", "7Server-RHEV-4-Agents-7:vdsm-hook-extra-ipv4-addrs-0:4.30.51-1.el7ev.x86_64", "7Server-RHEV-4-Agents-7:vdsm-hook-fcoe-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-localdisk-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-macspoof-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-nestedvt-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-openstacknet-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-vhostmd-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-vmfex-dev-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-http-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-jsonrpc-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-network-0:4.30.51-1.el7ev.ppc64le", "7Server-RHEV-4-Agents-7:vdsm-network-0:4.30.51-1.el7ev.x86_64", "7Server-RHEV-4-Agents-7:vdsm-python-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-yajsonrpc-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.13-2.el7ev.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.13-2.el7ev.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.13-2.el7ev.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1889688" } ], "notes": [ { "category": "description", "text": "A flaw was found in dnsmasq. When getting a reply from a forwarded query, dnsmasq checks in forward.c:reply_query(), which is the forwarded query that matches the reply, by only using a weak hash of the query name. Due to the weak hash (CRC32 when dnsmasq is compiled without DNSSEC, SHA-1 when it is) this flaw allows an off-path attacker to find several different domains all having the same hash, substantially reducing the number of attempts they would have to perform to forge a reply and get it accepted by dnsmasq. This is in contrast with RFC5452, which specifies that the query name is one of the attributes of a query that must be used to match a reply. This flaw could be abused to perform a DNS Cache Poisoning attack. If chained with CVE-2020-25684 the attack complexity of a successful attack is reduced. The highest threat from this vulnerability is to data integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "dnsmasq: loose query name check in reply_query() makes forging replies easier for an off-path attacker", "title": "Vulnerability summary" }, { "category": "other", "text": "Dnsmasq may be run by libvirt and/or NetworkManager. libvirt uses dnsmasq by default to provide DNS service to its guests. NetworkManager may be configured to use dnsmasq to provide DNS service to the system, if a line `dns=dnsmasq` is present in the `[main]` section of the configuration file /etc/NetworkManager/NetworkManager.conf.\n\nIn Red Hat OpenStack Platform (RHOSP) and Red Hat Virtualization (RHV), the dnsmasq package is provided by the underlying Red Hat Enterprise Linux (RHEL) product. RHOSP and RHV are therefore indirectly affected, so please ensure that the underlying RHEL dnsmasq package is updated.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.13-20210127.0.el7_9.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.13-20210127.0.el7_9.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.13-20210127.0.el7_9.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.13-20210127.0.el7_9.noarch" ], "known_not_affected": [ "7Server-RHEV-4-Agents-7:vdsm-0:4.30.51-1.el7ev.ppc64le", "7Server-RHEV-4-Agents-7:vdsm-0:4.30.51-1.el7ev.src", "7Server-RHEV-4-Agents-7:vdsm-0:4.30.51-1.el7ev.x86_64", "7Server-RHEV-4-Agents-7:vdsm-api-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-client-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-common-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-gluster-0:4.30.51-1.el7ev.ppc64le", "7Server-RHEV-4-Agents-7:vdsm-gluster-0:4.30.51-1.el7ev.x86_64", "7Server-RHEV-4-Agents-7:vdsm-hook-checkips-0:4.30.51-1.el7ev.ppc64le", "7Server-RHEV-4-Agents-7:vdsm-hook-checkips-0:4.30.51-1.el7ev.x86_64", "7Server-RHEV-4-Agents-7:vdsm-hook-cpuflags-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-ethtool-options-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-extra-ipv4-addrs-0:4.30.51-1.el7ev.ppc64le", "7Server-RHEV-4-Agents-7:vdsm-hook-extra-ipv4-addrs-0:4.30.51-1.el7ev.x86_64", "7Server-RHEV-4-Agents-7:vdsm-hook-fcoe-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-localdisk-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-macspoof-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-nestedvt-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-openstacknet-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-vhostmd-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-vmfex-dev-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-http-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-jsonrpc-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-network-0:4.30.51-1.el7ev.ppc64le", "7Server-RHEV-4-Agents-7:vdsm-network-0:4.30.51-1.el7ev.x86_64", "7Server-RHEV-4-Agents-7:vdsm-python-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-yajsonrpc-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.13-2.el7ev.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.13-2.el7ev.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.13-2.el7ev.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-25685" }, { "category": "external", "summary": "RHBZ#1889688", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889688" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-25685", "url": "https://www.cve.org/CVERecord?id=CVE-2020-25685" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25685", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25685" }, { "category": "external", "summary": "https://www.jsof-tech.com/disclosures/dnspooq/", "url": "https://www.jsof-tech.com/disclosures/dnspooq/" } ], "release_date": "2021-01-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891", "product_ids": [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.13-20210127.0.el7_9.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.13-20210127.0.el7_9.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.13-20210127.0.el7_9.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.13-20210127.0.el7_9.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0395" }, { "category": "workaround", "details": "The impact of this flaw can be reduced by disabling the dnsmasq cache by adding `--cache-size=0` when calling dnsmasq or by adding a line with `cache-size=0` to the dnsmasq configuration file (/etc/dnsmasq.conf by default). \n\nWhen using Red Hat Enterprise Linux 8.3 with libvirt through a virt:rhel module, use `virsh net-edit \u003cnetwork-name\u003e` and reference https://libvirt.org/formatnetwork.html#elementsNamespaces to add the suggested option `cache-size=0`. \n\nThere is no way to customize the dnsmasq configuration generated by libvirt, when using versions of Red Hat Enterprise Linux prior to version 8.3. If dnsmasq is being run through NetworkManager, create a new file in /etc/NetworkManager/dnsmasq.d/ and add `cache-size=0` to it.\n\nIn all cases, by disabling the cache, you may experience a performance loss in your environment due to all DNS queries being forwarded to the upstream servers. Please evaluate if the mitigation is appropriate for the system\u2019s environment before applying.", "product_ids": [ "7Server-RHEV-4-Agents-7:vdsm-0:4.30.51-1.el7ev.ppc64le", "7Server-RHEV-4-Agents-7:vdsm-0:4.30.51-1.el7ev.src", "7Server-RHEV-4-Agents-7:vdsm-0:4.30.51-1.el7ev.x86_64", "7Server-RHEV-4-Agents-7:vdsm-api-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-client-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-common-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-gluster-0:4.30.51-1.el7ev.ppc64le", "7Server-RHEV-4-Agents-7:vdsm-gluster-0:4.30.51-1.el7ev.x86_64", "7Server-RHEV-4-Agents-7:vdsm-hook-checkips-0:4.30.51-1.el7ev.ppc64le", "7Server-RHEV-4-Agents-7:vdsm-hook-checkips-0:4.30.51-1.el7ev.x86_64", "7Server-RHEV-4-Agents-7:vdsm-hook-cpuflags-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-ethtool-options-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-extra-ipv4-addrs-0:4.30.51-1.el7ev.ppc64le", "7Server-RHEV-4-Agents-7:vdsm-hook-extra-ipv4-addrs-0:4.30.51-1.el7ev.x86_64", "7Server-RHEV-4-Agents-7:vdsm-hook-fcoe-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-localdisk-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-macspoof-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-nestedvt-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-openstacknet-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-vhostmd-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-vmfex-dev-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-http-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-jsonrpc-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-network-0:4.30.51-1.el7ev.ppc64le", "7Server-RHEV-4-Agents-7:vdsm-network-0:4.30.51-1.el7ev.x86_64", "7Server-RHEV-4-Agents-7:vdsm-python-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-yajsonrpc-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.13-20210127.0.el7_9.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.13-20210127.0.el7_9.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.13-2.el7ev.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.13-2.el7ev.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.13-20210127.0.el7_9.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.13-20210127.0.el7_9.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.13-2.el7ev.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N", "version": "3.1" }, "products": [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.13-20210127.0.el7_9.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.13-20210127.0.el7_9.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.13-20210127.0.el7_9.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.13-20210127.0.el7_9.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "dnsmasq: loose query name check in reply_query() makes forging replies easier for an off-path attacker" }, { "acknowledgments": [ { "names": [ "Moshe Kol", "Shlomi Oberman" ], "organization": "JSOF" } ], "cve": "CVE-2020-25686", "cwe": { "id": "CWE-290", "name": "Authentication Bypass by Spoofing" }, "discovery_date": "2020-09-03T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RHEV-4-Agents-7:vdsm-0:4.30.51-1.el7ev.ppc64le", "7Server-RHEV-4-Agents-7:vdsm-0:4.30.51-1.el7ev.src", "7Server-RHEV-4-Agents-7:vdsm-0:4.30.51-1.el7ev.x86_64", "7Server-RHEV-4-Agents-7:vdsm-api-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-client-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-common-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-gluster-0:4.30.51-1.el7ev.ppc64le", "7Server-RHEV-4-Agents-7:vdsm-gluster-0:4.30.51-1.el7ev.x86_64", "7Server-RHEV-4-Agents-7:vdsm-hook-checkips-0:4.30.51-1.el7ev.ppc64le", "7Server-RHEV-4-Agents-7:vdsm-hook-checkips-0:4.30.51-1.el7ev.x86_64", "7Server-RHEV-4-Agents-7:vdsm-hook-cpuflags-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-ethtool-options-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-extra-ipv4-addrs-0:4.30.51-1.el7ev.ppc64le", "7Server-RHEV-4-Agents-7:vdsm-hook-extra-ipv4-addrs-0:4.30.51-1.el7ev.x86_64", "7Server-RHEV-4-Agents-7:vdsm-hook-fcoe-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-localdisk-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-macspoof-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-nestedvt-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-openstacknet-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-vhostmd-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-vmfex-dev-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-http-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-jsonrpc-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-network-0:4.30.51-1.el7ev.ppc64le", "7Server-RHEV-4-Agents-7:vdsm-network-0:4.30.51-1.el7ev.x86_64", "7Server-RHEV-4-Agents-7:vdsm-python-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-yajsonrpc-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.13-2.el7ev.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.13-2.el7ev.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.13-2.el7ev.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1890125" } ], "notes": [ { "category": "description", "text": "A flaw was found in dnsmasq. When receiving a query, dnsmasq does not check for an existing pending request for the same name and forwards a new request. By default, a maximum of 150 pending queries can be sent to upstream servers, so there can be at most 150 queries for the same name. This flaw allows an off-path attacker on the network to substantially reduce the number of attempts that it would have to perform to forge a reply and have it accepted by dnsmasq. This issue is mentioned in the \"Birthday Attacks\" section of RFC5452. If chained with CVE-2020-25684, the attack complexity of a successful attack is reduced. The highest threat from this vulnerability is to data integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "dnsmasq: multiple queries forwarded for the same name makes forging replies easier for an off-path attacker", "title": "Vulnerability summary" }, { "category": "other", "text": "Dnsmasq may be run by libvirt and/or NetworkManager. libvirt uses dnsmasq by default to provide DNS service to its guests. NetworkManager may be configured to use dnsmasq to provide DNS service to the system, if a line `dns=dnsmasq` is present in the `[main]` section of the configuration file /etc/NetworkManager/NetworkManager.conf.\n\nIn Red Hat OpenStack Platform (RHOSP) and Red Hat Virtualization (RHV), the dnsmasq package is provided by the underlying Red Hat Enterprise Linux (RHEL) product. RHOSP and RHV are therefore indirectly affected, so please ensure that the underlying RHEL dnsmasq package is updated.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.13-20210127.0.el7_9.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.13-20210127.0.el7_9.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.13-20210127.0.el7_9.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.13-20210127.0.el7_9.noarch" ], "known_not_affected": [ "7Server-RHEV-4-Agents-7:vdsm-0:4.30.51-1.el7ev.ppc64le", "7Server-RHEV-4-Agents-7:vdsm-0:4.30.51-1.el7ev.src", "7Server-RHEV-4-Agents-7:vdsm-0:4.30.51-1.el7ev.x86_64", "7Server-RHEV-4-Agents-7:vdsm-api-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-client-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-common-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-gluster-0:4.30.51-1.el7ev.ppc64le", "7Server-RHEV-4-Agents-7:vdsm-gluster-0:4.30.51-1.el7ev.x86_64", "7Server-RHEV-4-Agents-7:vdsm-hook-checkips-0:4.30.51-1.el7ev.ppc64le", "7Server-RHEV-4-Agents-7:vdsm-hook-checkips-0:4.30.51-1.el7ev.x86_64", "7Server-RHEV-4-Agents-7:vdsm-hook-cpuflags-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-ethtool-options-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-extra-ipv4-addrs-0:4.30.51-1.el7ev.ppc64le", "7Server-RHEV-4-Agents-7:vdsm-hook-extra-ipv4-addrs-0:4.30.51-1.el7ev.x86_64", "7Server-RHEV-4-Agents-7:vdsm-hook-fcoe-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-localdisk-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-macspoof-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-nestedvt-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-openstacknet-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-vhostmd-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-vmfex-dev-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-http-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-jsonrpc-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-network-0:4.30.51-1.el7ev.ppc64le", "7Server-RHEV-4-Agents-7:vdsm-network-0:4.30.51-1.el7ev.x86_64", "7Server-RHEV-4-Agents-7:vdsm-python-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-yajsonrpc-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.13-2.el7ev.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.13-2.el7ev.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.13-2.el7ev.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-25686" }, { "category": "external", "summary": "RHBZ#1890125", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890125" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-25686", "url": "https://www.cve.org/CVERecord?id=CVE-2020-25686" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25686", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25686" }, { "category": "external", "summary": "https://www.jsof-tech.com/disclosures/dnspooq/", "url": "https://www.jsof-tech.com/disclosures/dnspooq/" } ], "release_date": "2021-01-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891", "product_ids": [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.13-20210127.0.el7_9.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.13-20210127.0.el7_9.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.13-20210127.0.el7_9.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.13-20210127.0.el7_9.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0395" }, { "category": "workaround", "details": "The impact of this flaw can be reduced by disabling the dnsmasq cache by adding `--cache-size=0` when calling dnsmasq or by adding a line with `cache-size=0` to the dnsmasq configuration file (/etc/dnsmasq.conf by default). \n\nWhen using Red Hat Enterprise Linux 8.3 with libvirt through a virt:rhel module, use `virsh net-edit \u003cnetwork-name\u003e` and reference https://libvirt.org/formatnetwork.html#elementsNamespaces to add the suggested option `cache-size=0`. \n\nThere is no way to customize the dnsmasq configuration generated by libvirt, when using versions of Red Hat Enterprise Linux prior to version 8.3. If dnsmasq is being run through NetworkManager, create a new file in /etc/NetworkManager/dnsmasq.d/ and add `cache-size=0` to it.\n\nIn all cases, by disabling the cache, you may experience a performance loss in your environment due to all DNS queries being forwarded to the upstream servers. Please evaluate if the mitigation is appropriate for the system\u2019s environment before applying.", "product_ids": [ "7Server-RHEV-4-Agents-7:vdsm-0:4.30.51-1.el7ev.ppc64le", "7Server-RHEV-4-Agents-7:vdsm-0:4.30.51-1.el7ev.src", "7Server-RHEV-4-Agents-7:vdsm-0:4.30.51-1.el7ev.x86_64", "7Server-RHEV-4-Agents-7:vdsm-api-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-client-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-common-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-gluster-0:4.30.51-1.el7ev.ppc64le", "7Server-RHEV-4-Agents-7:vdsm-gluster-0:4.30.51-1.el7ev.x86_64", "7Server-RHEV-4-Agents-7:vdsm-hook-checkips-0:4.30.51-1.el7ev.ppc64le", "7Server-RHEV-4-Agents-7:vdsm-hook-checkips-0:4.30.51-1.el7ev.x86_64", "7Server-RHEV-4-Agents-7:vdsm-hook-cpuflags-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-ethtool-options-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-extra-ipv4-addrs-0:4.30.51-1.el7ev.ppc64le", "7Server-RHEV-4-Agents-7:vdsm-hook-extra-ipv4-addrs-0:4.30.51-1.el7ev.x86_64", "7Server-RHEV-4-Agents-7:vdsm-hook-fcoe-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-localdisk-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-macspoof-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-nestedvt-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-openstacknet-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-vhostmd-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-vmfex-dev-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-http-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-jsonrpc-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-network-0:4.30.51-1.el7ev.ppc64le", "7Server-RHEV-4-Agents-7:vdsm-network-0:4.30.51-1.el7ev.x86_64", "7Server-RHEV-4-Agents-7:vdsm-python-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-yajsonrpc-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.13-20210127.0.el7_9.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.13-20210127.0.el7_9.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.13-2.el7ev.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.13-2.el7ev.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.13-20210127.0.el7_9.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.13-20210127.0.el7_9.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.13-2.el7ev.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N", "version": "3.1" }, "products": [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.13-20210127.0.el7_9.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.13-20210127.0.el7_9.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.13-20210127.0.el7_9.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.13-20210127.0.el7_9.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "dnsmasq: multiple queries forwarded for the same name makes forging replies easier for an off-path attacker" }, { "cve": "CVE-2021-3156", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2021-01-19T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RHEV-4-Agents-7:vdsm-0:4.30.51-1.el7ev.ppc64le", "7Server-RHEV-4-Agents-7:vdsm-0:4.30.51-1.el7ev.src", "7Server-RHEV-4-Agents-7:vdsm-0:4.30.51-1.el7ev.x86_64", "7Server-RHEV-4-Agents-7:vdsm-api-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-client-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-common-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-gluster-0:4.30.51-1.el7ev.ppc64le", "7Server-RHEV-4-Agents-7:vdsm-gluster-0:4.30.51-1.el7ev.x86_64", "7Server-RHEV-4-Agents-7:vdsm-hook-checkips-0:4.30.51-1.el7ev.ppc64le", "7Server-RHEV-4-Agents-7:vdsm-hook-checkips-0:4.30.51-1.el7ev.x86_64", "7Server-RHEV-4-Agents-7:vdsm-hook-cpuflags-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-ethtool-options-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-extra-ipv4-addrs-0:4.30.51-1.el7ev.ppc64le", "7Server-RHEV-4-Agents-7:vdsm-hook-extra-ipv4-addrs-0:4.30.51-1.el7ev.x86_64", "7Server-RHEV-4-Agents-7:vdsm-hook-fcoe-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-localdisk-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-macspoof-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-nestedvt-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-openstacknet-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-vhostmd-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-vmfex-dev-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-http-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-jsonrpc-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-network-0:4.30.51-1.el7ev.ppc64le", "7Server-RHEV-4-Agents-7:vdsm-network-0:4.30.51-1.el7ev.x86_64", "7Server-RHEV-4-Agents-7:vdsm-python-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-yajsonrpc-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.13-2.el7ev.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.13-2.el7ev.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.13-2.el7ev.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1917684" } ], "notes": [ { "category": "description", "text": "A flaw was found in sudo. A heap-based buffer overflow was found in the way sudo parses command line arguments. This flaw is exploitable by any local user who can execute the sudo command (by default, any local user can execute sudo) without authentication. Successful exploitation of this flaw could lead to privilege escalation. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "sudo: Heap buffer overflow in argument parsing", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw does not affect the versions of sudo shipped with Red Hat Enterprise Linux 5, because the vulnerable code was not present in these versions.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.13-20210127.0.el7_9.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.13-20210127.0.el7_9.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.13-20210127.0.el7_9.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.13-20210127.0.el7_9.noarch" ], "known_not_affected": [ "7Server-RHEV-4-Agents-7:vdsm-0:4.30.51-1.el7ev.ppc64le", "7Server-RHEV-4-Agents-7:vdsm-0:4.30.51-1.el7ev.src", "7Server-RHEV-4-Agents-7:vdsm-0:4.30.51-1.el7ev.x86_64", "7Server-RHEV-4-Agents-7:vdsm-api-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-client-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-common-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-gluster-0:4.30.51-1.el7ev.ppc64le", "7Server-RHEV-4-Agents-7:vdsm-gluster-0:4.30.51-1.el7ev.x86_64", "7Server-RHEV-4-Agents-7:vdsm-hook-checkips-0:4.30.51-1.el7ev.ppc64le", "7Server-RHEV-4-Agents-7:vdsm-hook-checkips-0:4.30.51-1.el7ev.x86_64", "7Server-RHEV-4-Agents-7:vdsm-hook-cpuflags-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-ethtool-options-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-extra-ipv4-addrs-0:4.30.51-1.el7ev.ppc64le", "7Server-RHEV-4-Agents-7:vdsm-hook-extra-ipv4-addrs-0:4.30.51-1.el7ev.x86_64", "7Server-RHEV-4-Agents-7:vdsm-hook-fcoe-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-localdisk-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-macspoof-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-nestedvt-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-openstacknet-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-vhostmd-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-vmfex-dev-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-http-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-jsonrpc-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-network-0:4.30.51-1.el7ev.ppc64le", "7Server-RHEV-4-Agents-7:vdsm-network-0:4.30.51-1.el7ev.x86_64", "7Server-RHEV-4-Agents-7:vdsm-python-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-yajsonrpc-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.13-2.el7ev.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.13-2.el7ev.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.13-2.el7ev.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3156" }, { "category": "external", "summary": "RHBZ#1917684", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1917684" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3156", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3156" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3156", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3156" }, { "category": "external", "summary": "https://www.qualys.com/2021/01/26/cve-2021-3156/baron-samedit-heap-based-overflow-sudo.txt", "url": "https://www.qualys.com/2021/01/26/cve-2021-3156/baron-samedit-heap-based-overflow-sudo.txt" }, { "category": "external", "summary": "https://www.sudo.ws/alerts/unescape_overflow.html", "url": "https://www.sudo.ws/alerts/unescape_overflow.html" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2021-01-26T18:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891", "product_ids": [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.13-20210127.0.el7_9.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.13-20210127.0.el7_9.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.13-20210127.0.el7_9.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.13-20210127.0.el7_9.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0395" }, { "category": "workaround", "details": "Red Hat Product Security strongly recommends customers to update to fixed sudo packages once they are available. For customers who cannot update immediately, the following interim partial mitigation using systemtap is suggested:\n\n1. Install required systemtap packages and dependencies: \n```\nsystemtap yum-utils kernel-devel-\"$(uname -r)\"\n```\n\nThen for RHEL 7 install kernel debuginfo, using:\n```\ndebuginfo-install -y kernel-\"$(uname -r)\" \n```\nThen for RHEL 8 \u0026 6 install sudo debuginfo, using:\n```\ndebuginfo-install sudo\n```\n \n2. Create the following systemtap script: (call the file as sudoedit-block.stap)\n```\nprobe process(\"/usr/bin/sudo\").function(\"main\") {\n command = cmdline_args(0,0,\"\");\n if (isinstr(command, \"edit\")) {\n raise(9);\n }\n}\n```\n3. Install the script using the following command: (using root)\n```\n# nohup stap -g sudoedit-block.stap \u0026\n```\n(This should output the PID number of the systemtap script)\n\nThis script will cause the vulnerable sudoedit binary to stop working. The sudo command will still work as usual.\nThe above change does not persist across reboots and must be applied after each reboot.\n\nPlease consult How to make a systemtap kernel module load persistently across reboots? (https://access.redhat.com/solutions/5752521) to learn how to\nturn this into a service managed by initd. \n\n4. Once the new fixed packages are installed, the systemtap script can be removed by killing the systemtap process. For example, by using:\n```\n# kill -s SIGTERM 7590\n```\n(where 7590 is the PID of the systemtap process)", "product_ids": [ "7Server-RHEV-4-Agents-7:vdsm-0:4.30.51-1.el7ev.ppc64le", "7Server-RHEV-4-Agents-7:vdsm-0:4.30.51-1.el7ev.src", "7Server-RHEV-4-Agents-7:vdsm-0:4.30.51-1.el7ev.x86_64", "7Server-RHEV-4-Agents-7:vdsm-api-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-client-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-common-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-gluster-0:4.30.51-1.el7ev.ppc64le", "7Server-RHEV-4-Agents-7:vdsm-gluster-0:4.30.51-1.el7ev.x86_64", "7Server-RHEV-4-Agents-7:vdsm-hook-checkips-0:4.30.51-1.el7ev.ppc64le", "7Server-RHEV-4-Agents-7:vdsm-hook-checkips-0:4.30.51-1.el7ev.x86_64", "7Server-RHEV-4-Agents-7:vdsm-hook-cpuflags-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-ethtool-options-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-extra-ipv4-addrs-0:4.30.51-1.el7ev.ppc64le", "7Server-RHEV-4-Agents-7:vdsm-hook-extra-ipv4-addrs-0:4.30.51-1.el7ev.x86_64", "7Server-RHEV-4-Agents-7:vdsm-hook-fcoe-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-localdisk-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-macspoof-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-nestedvt-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-openstacknet-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-vhostmd-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-hook-vmfex-dev-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-http-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-jsonrpc-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-network-0:4.30.51-1.el7ev.ppc64le", "7Server-RHEV-4-Agents-7:vdsm-network-0:4.30.51-1.el7ev.x86_64", "7Server-RHEV-4-Agents-7:vdsm-python-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Agents-7:vdsm-yajsonrpc-0:4.30.51-1.el7ev.noarch", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.13-20210127.0.el7_9.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.13-20210127.0.el7_9.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.13-2.el7ev.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.13-2.el7ev.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.13-20210127.0.el7_9.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.13-20210127.0.el7_9.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.13-2.el7ev.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.13-20210127.0.el7_9.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.13-20210127.0.el7_9.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.13-20210127.0.el7_9.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.13-20210127.0.el7_9.noarch" ] } ], "threats": [ { "category": "exploit_status", "date": "2022-04-06T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Important" } ], "title": "sudo: Heap buffer overflow in argument parsing" } ] }
rhsa-2021_0240
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_vex", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for dnsmasq is now available for Red Hat Enterprise Linux 7.2 Advanced Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The dnsmasq packages contain Dnsmasq, a lightweight DNS (Domain Name Server) forwarder and DHCP (Dynamic Host Configuration Protocol) server.\n\nSecurity Fix(es):\n\n* dnsmasq: loose address/port check in reply_query() makes forging replies easier for an off-path attacker (CVE-2020-25684)\n\n* dnsmasq: loose query name check in reply_query() makes forging replies easier for an off-path attacker (CVE-2020-25685)\n\n* dnsmasq: multiple queries forwarded for the same name makes forging replies easier for an off-path attacker (CVE-2020-25686)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat offerings.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:0240", "url": "https://access.redhat.com/errata/RHSA-2021:0240" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-001", "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-001" }, { "category": "external", "summary": "1889686", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889686" }, { "category": "external", "summary": "1889688", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889688" }, { "category": "external", "summary": "1890125", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890125" }, { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/data/csaf/v2/advisories/2021/rhsa-2021_0240.json" } ], "title": "Red Hat Security Advisory: dnsmasq security update", "tracking": { "current_release_date": "2024-09-13T18:16:37+00:00", "generator": { "date": "2024-09-13T18:16:37+00:00", "engine": { "name": "Red Hat SDEngine", "version": "3.33.3" } }, "id": "RHSA-2021:0240", "initial_release_date": "2021-01-25T14:29:59+00:00", "revision_history": [ { "date": "2021-01-25T14:29:59+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-01-25T14:29:59+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-09-13T18:16:37+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Server AUS (v. 7.2)", "product": { "name": "Red Hat Enterprise Linux Server AUS (v. 7.2)", "product_id": "7Server-7.2.AUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_aus:7.2::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.2)", "product": { "name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.2)", "product_id": "7Server-optional-7.2.AUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_aus:7.2::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "dnsmasq-0:2.66-14.el7_2.3.src", "product": { "name": "dnsmasq-0:2.66-14.el7_2.3.src", "product_id": "dnsmasq-0:2.66-14.el7_2.3.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq@2.66-14.el7_2.3?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "dnsmasq-0:2.66-14.el7_2.3.x86_64", "product": { "name": "dnsmasq-0:2.66-14.el7_2.3.x86_64", "product_id": "dnsmasq-0:2.66-14.el7_2.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq@2.66-14.el7_2.3?arch=x86_64" } } }, { "category": "product_version", "name": "dnsmasq-debuginfo-0:2.66-14.el7_2.3.x86_64", "product": { "name": "dnsmasq-debuginfo-0:2.66-14.el7_2.3.x86_64", "product_id": "dnsmasq-debuginfo-0:2.66-14.el7_2.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-debuginfo@2.66-14.el7_2.3?arch=x86_64" } } }, { "category": "product_version", "name": "dnsmasq-utils-0:2.66-14.el7_2.3.x86_64", "product": { "name": "dnsmasq-utils-0:2.66-14.el7_2.3.x86_64", "product_id": "dnsmasq-utils-0:2.66-14.el7_2.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-utils@2.66-14.el7_2.3?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.66-14.el7_2.3.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)", "product_id": "7Server-7.2.AUS:dnsmasq-0:2.66-14.el7_2.3.src" }, "product_reference": "dnsmasq-0:2.66-14.el7_2.3.src", "relates_to_product_reference": "7Server-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.66-14.el7_2.3.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)", "product_id": "7Server-7.2.AUS:dnsmasq-0:2.66-14.el7_2.3.x86_64" }, "product_reference": "dnsmasq-0:2.66-14.el7_2.3.x86_64", "relates_to_product_reference": "7Server-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.66-14.el7_2.3.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)", "product_id": "7Server-7.2.AUS:dnsmasq-debuginfo-0:2.66-14.el7_2.3.x86_64" }, "product_reference": "dnsmasq-debuginfo-0:2.66-14.el7_2.3.x86_64", "relates_to_product_reference": "7Server-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.66-14.el7_2.3.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)", "product_id": "7Server-7.2.AUS:dnsmasq-utils-0:2.66-14.el7_2.3.x86_64" }, "product_reference": "dnsmasq-utils-0:2.66-14.el7_2.3.x86_64", "relates_to_product_reference": "7Server-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.66-14.el7_2.3.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)", "product_id": "7Server-optional-7.2.AUS:dnsmasq-0:2.66-14.el7_2.3.src" }, "product_reference": "dnsmasq-0:2.66-14.el7_2.3.src", "relates_to_product_reference": "7Server-optional-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.66-14.el7_2.3.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)", "product_id": "7Server-optional-7.2.AUS:dnsmasq-0:2.66-14.el7_2.3.x86_64" }, "product_reference": "dnsmasq-0:2.66-14.el7_2.3.x86_64", "relates_to_product_reference": "7Server-optional-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.66-14.el7_2.3.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)", "product_id": "7Server-optional-7.2.AUS:dnsmasq-debuginfo-0:2.66-14.el7_2.3.x86_64" }, "product_reference": "dnsmasq-debuginfo-0:2.66-14.el7_2.3.x86_64", "relates_to_product_reference": "7Server-optional-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.66-14.el7_2.3.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)", "product_id": "7Server-optional-7.2.AUS:dnsmasq-utils-0:2.66-14.el7_2.3.x86_64" }, "product_reference": "dnsmasq-utils-0:2.66-14.el7_2.3.x86_64", "relates_to_product_reference": "7Server-optional-7.2.AUS" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Moshe Kol", "Shlomi Oberman" ], "organization": "JSOF" } ], "cve": "CVE-2020-25684", "cwe": { "id": "CWE-358", "name": "Improperly Implemented Security Check for Standard" }, "discovery_date": "2020-09-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1889686" } ], "notes": [ { "category": "description", "text": "A flaw was found in dnsmasq. When getting a reply from a forwarded query, dnsmasq checks in the forward.c:reply_query() if the reply destination address/port is used by the pending forwarded queries. However, it does not use the address/port to retrieve the exact forwarded query, substantially reducing the number of attempts an attacker on the network would have to perform to forge a reply and get it accepted by dnsmasq. This issue contrasts with RFC5452, which specifies a query\u0027s attributes that all must be used to match a reply. This flaw allows an attacker to perform a DNS Cache Poisoning attack. If chained with CVE-2020-25685 or CVE-2020-25686, the attack complexity of a successful attack is reduced. The highest threat from this vulnerability is to data integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "dnsmasq: loose address/port check in reply_query() makes forging replies easier for an off-path attacker", "title": "Vulnerability summary" }, { "category": "other", "text": "Dnsmasq may be run by libvirt and/or NetworkManager. libvirt uses dnsmasq by default to provide DNS service to its guests. NetworkManager may be configured to use dnsmasq to provide DNS service to the system, if a line `dns=dnsmasq` is present in the `[main]` section of the configuration file /etc/NetworkManager/NetworkManager.conf.\n\nIn Red Hat OpenStack Platform (RHOSP) and Red Hat Virtualization (RHV), the dnsmasq package is provided by the underlying Red Hat Enterprise Linux (RHEL) product. RHOSP and RHV are therefore indirectly affected, so please ensure that the underlying RHEL dnsmasq package is updated.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.2.AUS:dnsmasq-0:2.66-14.el7_2.3.src", "7Server-7.2.AUS:dnsmasq-0:2.66-14.el7_2.3.x86_64", "7Server-7.2.AUS:dnsmasq-debuginfo-0:2.66-14.el7_2.3.x86_64", "7Server-7.2.AUS:dnsmasq-utils-0:2.66-14.el7_2.3.x86_64", "7Server-optional-7.2.AUS:dnsmasq-0:2.66-14.el7_2.3.src", "7Server-optional-7.2.AUS:dnsmasq-0:2.66-14.el7_2.3.x86_64", "7Server-optional-7.2.AUS:dnsmasq-debuginfo-0:2.66-14.el7_2.3.x86_64", "7Server-optional-7.2.AUS:dnsmasq-utils-0:2.66-14.el7_2.3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-25684" }, { "category": "external", "summary": "RHBZ#1889686", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889686" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-25684", "url": "https://www.cve.org/CVERecord?id=CVE-2020-25684" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25684", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25684" }, { "category": "external", "summary": "https://www.jsof-tech.com/disclosures/dnspooq/", "url": "https://www.jsof-tech.com/disclosures/dnspooq/" } ], "release_date": "2021-01-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-7.2.AUS:dnsmasq-0:2.66-14.el7_2.3.src", "7Server-7.2.AUS:dnsmasq-0:2.66-14.el7_2.3.x86_64", "7Server-7.2.AUS:dnsmasq-debuginfo-0:2.66-14.el7_2.3.x86_64", "7Server-7.2.AUS:dnsmasq-utils-0:2.66-14.el7_2.3.x86_64", "7Server-optional-7.2.AUS:dnsmasq-0:2.66-14.el7_2.3.src", "7Server-optional-7.2.AUS:dnsmasq-0:2.66-14.el7_2.3.x86_64", "7Server-optional-7.2.AUS:dnsmasq-debuginfo-0:2.66-14.el7_2.3.x86_64", "7Server-optional-7.2.AUS:dnsmasq-utils-0:2.66-14.el7_2.3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0240" }, { "category": "workaround", "details": "The impact of this flaw can be reduced by disabling the dnsmasq cache by adding `--cache-size=0` when calling dnsmasq or by adding a line with `cache-size=0` to the dnsmasq configuration file (/etc/dnsmasq.conf by default).\n\nWhen using Red Hat Enterprise Linux 8.3 with libvirt through a virt:rhel module, use `virsh net-edit \u003cnetwork-name\u003e` and reference https://libvirt.org/formatnetwork.html#elementsNamespaces to add the suggested option `cache-size=0`. \n\nThere is no way to customize the dnsmasq configuration generated by libvirt, when using versions of Red Hat Enterprise Linux prior to version 8.3. If dnsmasq is being run through NetworkManager, create a new file in /etc/NetworkManager/dnsmasq.d/ and add `cache-size=0` to it.\n\nIn all cases, by disabling the cache, you may experience a performance loss in your environment due to all DNS queries being forwarded to the upstream servers. Please evaluate if the mitigation is appropriate for the system\u2019s environment before applying.", "product_ids": [ "7Server-7.2.AUS:dnsmasq-0:2.66-14.el7_2.3.src", "7Server-7.2.AUS:dnsmasq-0:2.66-14.el7_2.3.x86_64", "7Server-7.2.AUS:dnsmasq-debuginfo-0:2.66-14.el7_2.3.x86_64", "7Server-7.2.AUS:dnsmasq-utils-0:2.66-14.el7_2.3.x86_64", "7Server-optional-7.2.AUS:dnsmasq-0:2.66-14.el7_2.3.src", "7Server-optional-7.2.AUS:dnsmasq-0:2.66-14.el7_2.3.x86_64", "7Server-optional-7.2.AUS:dnsmasq-debuginfo-0:2.66-14.el7_2.3.x86_64", "7Server-optional-7.2.AUS:dnsmasq-utils-0:2.66-14.el7_2.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N", "version": "3.1" }, "products": [ "7Server-7.2.AUS:dnsmasq-0:2.66-14.el7_2.3.src", "7Server-7.2.AUS:dnsmasq-0:2.66-14.el7_2.3.x86_64", "7Server-7.2.AUS:dnsmasq-debuginfo-0:2.66-14.el7_2.3.x86_64", "7Server-7.2.AUS:dnsmasq-utils-0:2.66-14.el7_2.3.x86_64", "7Server-optional-7.2.AUS:dnsmasq-0:2.66-14.el7_2.3.src", "7Server-optional-7.2.AUS:dnsmasq-0:2.66-14.el7_2.3.x86_64", "7Server-optional-7.2.AUS:dnsmasq-debuginfo-0:2.66-14.el7_2.3.x86_64", "7Server-optional-7.2.AUS:dnsmasq-utils-0:2.66-14.el7_2.3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "dnsmasq: loose address/port check in reply_query() makes forging replies easier for an off-path attacker" }, { "acknowledgments": [ { "names": [ "Moshe Kol", "Shlomi Oberman" ], "organization": "JSOF" } ], "cve": "CVE-2020-25685", "cwe": { "id": "CWE-326", "name": "Inadequate Encryption Strength" }, "discovery_date": "2020-09-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1889688" } ], "notes": [ { "category": "description", "text": "A flaw was found in dnsmasq. When getting a reply from a forwarded query, dnsmasq checks in forward.c:reply_query(), which is the forwarded query that matches the reply, by only using a weak hash of the query name. Due to the weak hash (CRC32 when dnsmasq is compiled without DNSSEC, SHA-1 when it is) this flaw allows an off-path attacker to find several different domains all having the same hash, substantially reducing the number of attempts they would have to perform to forge a reply and get it accepted by dnsmasq. This is in contrast with RFC5452, which specifies that the query name is one of the attributes of a query that must be used to match a reply. This flaw could be abused to perform a DNS Cache Poisoning attack. If chained with CVE-2020-25684 the attack complexity of a successful attack is reduced. The highest threat from this vulnerability is to data integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "dnsmasq: loose query name check in reply_query() makes forging replies easier for an off-path attacker", "title": "Vulnerability summary" }, { "category": "other", "text": "Dnsmasq may be run by libvirt and/or NetworkManager. libvirt uses dnsmasq by default to provide DNS service to its guests. NetworkManager may be configured to use dnsmasq to provide DNS service to the system, if a line `dns=dnsmasq` is present in the `[main]` section of the configuration file /etc/NetworkManager/NetworkManager.conf.\n\nIn Red Hat OpenStack Platform (RHOSP) and Red Hat Virtualization (RHV), the dnsmasq package is provided by the underlying Red Hat Enterprise Linux (RHEL) product. RHOSP and RHV are therefore indirectly affected, so please ensure that the underlying RHEL dnsmasq package is updated.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.2.AUS:dnsmasq-0:2.66-14.el7_2.3.src", "7Server-7.2.AUS:dnsmasq-0:2.66-14.el7_2.3.x86_64", "7Server-7.2.AUS:dnsmasq-debuginfo-0:2.66-14.el7_2.3.x86_64", "7Server-7.2.AUS:dnsmasq-utils-0:2.66-14.el7_2.3.x86_64", "7Server-optional-7.2.AUS:dnsmasq-0:2.66-14.el7_2.3.src", "7Server-optional-7.2.AUS:dnsmasq-0:2.66-14.el7_2.3.x86_64", "7Server-optional-7.2.AUS:dnsmasq-debuginfo-0:2.66-14.el7_2.3.x86_64", "7Server-optional-7.2.AUS:dnsmasq-utils-0:2.66-14.el7_2.3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-25685" }, { "category": "external", "summary": "RHBZ#1889688", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889688" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-25685", "url": "https://www.cve.org/CVERecord?id=CVE-2020-25685" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25685", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25685" }, { "category": "external", "summary": "https://www.jsof-tech.com/disclosures/dnspooq/", "url": "https://www.jsof-tech.com/disclosures/dnspooq/" } ], "release_date": "2021-01-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-7.2.AUS:dnsmasq-0:2.66-14.el7_2.3.src", "7Server-7.2.AUS:dnsmasq-0:2.66-14.el7_2.3.x86_64", "7Server-7.2.AUS:dnsmasq-debuginfo-0:2.66-14.el7_2.3.x86_64", "7Server-7.2.AUS:dnsmasq-utils-0:2.66-14.el7_2.3.x86_64", "7Server-optional-7.2.AUS:dnsmasq-0:2.66-14.el7_2.3.src", "7Server-optional-7.2.AUS:dnsmasq-0:2.66-14.el7_2.3.x86_64", "7Server-optional-7.2.AUS:dnsmasq-debuginfo-0:2.66-14.el7_2.3.x86_64", "7Server-optional-7.2.AUS:dnsmasq-utils-0:2.66-14.el7_2.3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0240" }, { "category": "workaround", "details": "The impact of this flaw can be reduced by disabling the dnsmasq cache by adding `--cache-size=0` when calling dnsmasq or by adding a line with `cache-size=0` to the dnsmasq configuration file (/etc/dnsmasq.conf by default). \n\nWhen using Red Hat Enterprise Linux 8.3 with libvirt through a virt:rhel module, use `virsh net-edit \u003cnetwork-name\u003e` and reference https://libvirt.org/formatnetwork.html#elementsNamespaces to add the suggested option `cache-size=0`. \n\nThere is no way to customize the dnsmasq configuration generated by libvirt, when using versions of Red Hat Enterprise Linux prior to version 8.3. If dnsmasq is being run through NetworkManager, create a new file in /etc/NetworkManager/dnsmasq.d/ and add `cache-size=0` to it.\n\nIn all cases, by disabling the cache, you may experience a performance loss in your environment due to all DNS queries being forwarded to the upstream servers. Please evaluate if the mitigation is appropriate for the system\u2019s environment before applying.", "product_ids": [ "7Server-7.2.AUS:dnsmasq-0:2.66-14.el7_2.3.src", "7Server-7.2.AUS:dnsmasq-0:2.66-14.el7_2.3.x86_64", "7Server-7.2.AUS:dnsmasq-debuginfo-0:2.66-14.el7_2.3.x86_64", "7Server-7.2.AUS:dnsmasq-utils-0:2.66-14.el7_2.3.x86_64", "7Server-optional-7.2.AUS:dnsmasq-0:2.66-14.el7_2.3.src", "7Server-optional-7.2.AUS:dnsmasq-0:2.66-14.el7_2.3.x86_64", "7Server-optional-7.2.AUS:dnsmasq-debuginfo-0:2.66-14.el7_2.3.x86_64", "7Server-optional-7.2.AUS:dnsmasq-utils-0:2.66-14.el7_2.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N", "version": "3.1" }, "products": [ "7Server-7.2.AUS:dnsmasq-0:2.66-14.el7_2.3.src", "7Server-7.2.AUS:dnsmasq-0:2.66-14.el7_2.3.x86_64", "7Server-7.2.AUS:dnsmasq-debuginfo-0:2.66-14.el7_2.3.x86_64", "7Server-7.2.AUS:dnsmasq-utils-0:2.66-14.el7_2.3.x86_64", "7Server-optional-7.2.AUS:dnsmasq-0:2.66-14.el7_2.3.src", "7Server-optional-7.2.AUS:dnsmasq-0:2.66-14.el7_2.3.x86_64", "7Server-optional-7.2.AUS:dnsmasq-debuginfo-0:2.66-14.el7_2.3.x86_64", "7Server-optional-7.2.AUS:dnsmasq-utils-0:2.66-14.el7_2.3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "dnsmasq: loose query name check in reply_query() makes forging replies easier for an off-path attacker" }, { "acknowledgments": [ { "names": [ "Moshe Kol", "Shlomi Oberman" ], "organization": "JSOF" } ], "cve": "CVE-2020-25686", "cwe": { "id": "CWE-290", "name": "Authentication Bypass by Spoofing" }, "discovery_date": "2020-09-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1890125" } ], "notes": [ { "category": "description", "text": "A flaw was found in dnsmasq. When receiving a query, dnsmasq does not check for an existing pending request for the same name and forwards a new request. By default, a maximum of 150 pending queries can be sent to upstream servers, so there can be at most 150 queries for the same name. This flaw allows an off-path attacker on the network to substantially reduce the number of attempts that it would have to perform to forge a reply and have it accepted by dnsmasq. This issue is mentioned in the \"Birthday Attacks\" section of RFC5452. If chained with CVE-2020-25684, the attack complexity of a successful attack is reduced. The highest threat from this vulnerability is to data integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "dnsmasq: multiple queries forwarded for the same name makes forging replies easier for an off-path attacker", "title": "Vulnerability summary" }, { "category": "other", "text": "Dnsmasq may be run by libvirt and/or NetworkManager. libvirt uses dnsmasq by default to provide DNS service to its guests. NetworkManager may be configured to use dnsmasq to provide DNS service to the system, if a line `dns=dnsmasq` is present in the `[main]` section of the configuration file /etc/NetworkManager/NetworkManager.conf.\n\nIn Red Hat OpenStack Platform (RHOSP) and Red Hat Virtualization (RHV), the dnsmasq package is provided by the underlying Red Hat Enterprise Linux (RHEL) product. RHOSP and RHV are therefore indirectly affected, so please ensure that the underlying RHEL dnsmasq package is updated.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.2.AUS:dnsmasq-0:2.66-14.el7_2.3.src", "7Server-7.2.AUS:dnsmasq-0:2.66-14.el7_2.3.x86_64", "7Server-7.2.AUS:dnsmasq-debuginfo-0:2.66-14.el7_2.3.x86_64", "7Server-7.2.AUS:dnsmasq-utils-0:2.66-14.el7_2.3.x86_64", "7Server-optional-7.2.AUS:dnsmasq-0:2.66-14.el7_2.3.src", "7Server-optional-7.2.AUS:dnsmasq-0:2.66-14.el7_2.3.x86_64", "7Server-optional-7.2.AUS:dnsmasq-debuginfo-0:2.66-14.el7_2.3.x86_64", "7Server-optional-7.2.AUS:dnsmasq-utils-0:2.66-14.el7_2.3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-25686" }, { "category": "external", "summary": "RHBZ#1890125", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890125" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-25686", "url": "https://www.cve.org/CVERecord?id=CVE-2020-25686" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25686", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25686" }, { "category": "external", "summary": "https://www.jsof-tech.com/disclosures/dnspooq/", "url": "https://www.jsof-tech.com/disclosures/dnspooq/" } ], "release_date": "2021-01-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-7.2.AUS:dnsmasq-0:2.66-14.el7_2.3.src", "7Server-7.2.AUS:dnsmasq-0:2.66-14.el7_2.3.x86_64", "7Server-7.2.AUS:dnsmasq-debuginfo-0:2.66-14.el7_2.3.x86_64", "7Server-7.2.AUS:dnsmasq-utils-0:2.66-14.el7_2.3.x86_64", "7Server-optional-7.2.AUS:dnsmasq-0:2.66-14.el7_2.3.src", "7Server-optional-7.2.AUS:dnsmasq-0:2.66-14.el7_2.3.x86_64", "7Server-optional-7.2.AUS:dnsmasq-debuginfo-0:2.66-14.el7_2.3.x86_64", "7Server-optional-7.2.AUS:dnsmasq-utils-0:2.66-14.el7_2.3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0240" }, { "category": "workaround", "details": "The impact of this flaw can be reduced by disabling the dnsmasq cache by adding `--cache-size=0` when calling dnsmasq or by adding a line with `cache-size=0` to the dnsmasq configuration file (/etc/dnsmasq.conf by default). \n\nWhen using Red Hat Enterprise Linux 8.3 with libvirt through a virt:rhel module, use `virsh net-edit \u003cnetwork-name\u003e` and reference https://libvirt.org/formatnetwork.html#elementsNamespaces to add the suggested option `cache-size=0`. \n\nThere is no way to customize the dnsmasq configuration generated by libvirt, when using versions of Red Hat Enterprise Linux prior to version 8.3. If dnsmasq is being run through NetworkManager, create a new file in /etc/NetworkManager/dnsmasq.d/ and add `cache-size=0` to it.\n\nIn all cases, by disabling the cache, you may experience a performance loss in your environment due to all DNS queries being forwarded to the upstream servers. Please evaluate if the mitigation is appropriate for the system\u2019s environment before applying.", "product_ids": [ "7Server-7.2.AUS:dnsmasq-0:2.66-14.el7_2.3.src", "7Server-7.2.AUS:dnsmasq-0:2.66-14.el7_2.3.x86_64", "7Server-7.2.AUS:dnsmasq-debuginfo-0:2.66-14.el7_2.3.x86_64", "7Server-7.2.AUS:dnsmasq-utils-0:2.66-14.el7_2.3.x86_64", "7Server-optional-7.2.AUS:dnsmasq-0:2.66-14.el7_2.3.src", "7Server-optional-7.2.AUS:dnsmasq-0:2.66-14.el7_2.3.x86_64", "7Server-optional-7.2.AUS:dnsmasq-debuginfo-0:2.66-14.el7_2.3.x86_64", "7Server-optional-7.2.AUS:dnsmasq-utils-0:2.66-14.el7_2.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N", "version": "3.1" }, "products": [ "7Server-7.2.AUS:dnsmasq-0:2.66-14.el7_2.3.src", "7Server-7.2.AUS:dnsmasq-0:2.66-14.el7_2.3.x86_64", "7Server-7.2.AUS:dnsmasq-debuginfo-0:2.66-14.el7_2.3.x86_64", "7Server-7.2.AUS:dnsmasq-utils-0:2.66-14.el7_2.3.x86_64", "7Server-optional-7.2.AUS:dnsmasq-0:2.66-14.el7_2.3.src", "7Server-optional-7.2.AUS:dnsmasq-0:2.66-14.el7_2.3.x86_64", "7Server-optional-7.2.AUS:dnsmasq-debuginfo-0:2.66-14.el7_2.3.x86_64", "7Server-optional-7.2.AUS:dnsmasq-utils-0:2.66-14.el7_2.3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "dnsmasq: multiple queries forwarded for the same name makes forging replies easier for an off-path attacker" } ] }
rhsa-2021_0151
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_vex", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for dnsmasq is now available for Red Hat Enterprise Linux 8.2 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The dnsmasq packages contain Dnsmasq, a lightweight DNS (Domain Name Server) forwarder and DHCP (Dynamic Host Configuration Protocol) server.\n\nSecurity Fix(es):\n\n* dnsmasq: heap-based buffer overflow in sort_rrset() when DNSSEC is enabled (CVE-2020-25681)\n\n* dnsmasq: buffer overflow in extract_name() due to missing length check when DNSSEC is enabled (CVE-2020-25682)\n\n* dnsmasq: heap-based buffer overflow with large memcpy in get_rdata() when DNSSEC is enabled (CVE-2020-25683)\n\n* dnsmasq: loose address/port check in reply_query() makes forging replies easier for an off-path attacker (CVE-2020-25684)\n\n* dnsmasq: loose query name check in reply_query() makes forging replies easier for an off-path attacker (CVE-2020-25685)\n\n* dnsmasq: multiple queries forwarded for the same name makes forging replies easier for an off-path attacker (CVE-2020-25686)\n\n* dnsmasq: heap-based buffer overflow with large memcpy in sort_rrset() when DNSSEC is enabled (CVE-2020-25687)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat offerings.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:0151", "url": "https://access.redhat.com/errata/RHSA-2021:0151" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-001", "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-001" }, { "category": "external", "summary": "1881875", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1881875" }, { "category": "external", "summary": "1882014", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1882014" }, { "category": "external", "summary": "1882018", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1882018" }, { "category": "external", "summary": "1889686", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889686" }, { "category": "external", "summary": "1889688", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889688" }, { "category": "external", "summary": "1890125", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890125" }, { "category": "external", "summary": "1891568", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1891568" }, { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/data/csaf/v2/advisories/2021/rhsa-2021_0151.json" } ], "title": "Red Hat Security Advisory: dnsmasq security update", "tracking": { "current_release_date": "2024-09-16T05:15:33+00:00", "generator": { "date": "2024-09-16T05:15:33+00:00", "engine": { "name": "Red Hat SDEngine", "version": "3.33.3" } }, "id": "RHSA-2021:0151", "initial_release_date": "2021-01-19T13:37:11+00:00", "revision_history": [ { "date": "2021-01-19T13:37:11+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-01-19T13:37:11+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-09-16T05:15:33+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product": { "name": "Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_eus:8.2::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "dnsmasq-0:2.79-11.el8_2.2.src", "product": { "name": "dnsmasq-0:2.79-11.el8_2.2.src", "product_id": "dnsmasq-0:2.79-11.el8_2.2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq@2.79-11.el8_2.2?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "dnsmasq-0:2.79-11.el8_2.2.aarch64", "product": { "name": "dnsmasq-0:2.79-11.el8_2.2.aarch64", "product_id": "dnsmasq-0:2.79-11.el8_2.2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq@2.79-11.el8_2.2?arch=aarch64" } } }, { "category": "product_version", "name": "dnsmasq-utils-0:2.79-11.el8_2.2.aarch64", "product": { "name": "dnsmasq-utils-0:2.79-11.el8_2.2.aarch64", "product_id": "dnsmasq-utils-0:2.79-11.el8_2.2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-utils@2.79-11.el8_2.2?arch=aarch64" } } }, { "category": "product_version", "name": "dnsmasq-debugsource-0:2.79-11.el8_2.2.aarch64", "product": { "name": "dnsmasq-debugsource-0:2.79-11.el8_2.2.aarch64", "product_id": "dnsmasq-debugsource-0:2.79-11.el8_2.2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-debugsource@2.79-11.el8_2.2?arch=aarch64" } } }, { "category": "product_version", "name": "dnsmasq-debuginfo-0:2.79-11.el8_2.2.aarch64", "product": { "name": "dnsmasq-debuginfo-0:2.79-11.el8_2.2.aarch64", "product_id": "dnsmasq-debuginfo-0:2.79-11.el8_2.2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-debuginfo@2.79-11.el8_2.2?arch=aarch64" } } }, { "category": "product_version", "name": "dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.aarch64", "product": { "name": "dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.aarch64", "product_id": "dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-utils-debuginfo@2.79-11.el8_2.2?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "dnsmasq-0:2.79-11.el8_2.2.ppc64le", "product": { "name": "dnsmasq-0:2.79-11.el8_2.2.ppc64le", "product_id": "dnsmasq-0:2.79-11.el8_2.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq@2.79-11.el8_2.2?arch=ppc64le" } } }, { "category": "product_version", "name": "dnsmasq-utils-0:2.79-11.el8_2.2.ppc64le", "product": { "name": "dnsmasq-utils-0:2.79-11.el8_2.2.ppc64le", "product_id": "dnsmasq-utils-0:2.79-11.el8_2.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-utils@2.79-11.el8_2.2?arch=ppc64le" } } }, { "category": "product_version", "name": "dnsmasq-debugsource-0:2.79-11.el8_2.2.ppc64le", "product": { "name": "dnsmasq-debugsource-0:2.79-11.el8_2.2.ppc64le", "product_id": "dnsmasq-debugsource-0:2.79-11.el8_2.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-debugsource@2.79-11.el8_2.2?arch=ppc64le" } } }, { "category": "product_version", "name": "dnsmasq-debuginfo-0:2.79-11.el8_2.2.ppc64le", "product": { "name": "dnsmasq-debuginfo-0:2.79-11.el8_2.2.ppc64le", "product_id": "dnsmasq-debuginfo-0:2.79-11.el8_2.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-debuginfo@2.79-11.el8_2.2?arch=ppc64le" } } }, { "category": "product_version", "name": "dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.ppc64le", "product": { "name": "dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.ppc64le", "product_id": "dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-utils-debuginfo@2.79-11.el8_2.2?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "dnsmasq-0:2.79-11.el8_2.2.x86_64", "product": { "name": "dnsmasq-0:2.79-11.el8_2.2.x86_64", "product_id": "dnsmasq-0:2.79-11.el8_2.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq@2.79-11.el8_2.2?arch=x86_64" } } }, { "category": "product_version", "name": "dnsmasq-utils-0:2.79-11.el8_2.2.x86_64", "product": { "name": "dnsmasq-utils-0:2.79-11.el8_2.2.x86_64", "product_id": "dnsmasq-utils-0:2.79-11.el8_2.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-utils@2.79-11.el8_2.2?arch=x86_64" } } }, { "category": "product_version", "name": "dnsmasq-debugsource-0:2.79-11.el8_2.2.x86_64", "product": { "name": "dnsmasq-debugsource-0:2.79-11.el8_2.2.x86_64", "product_id": "dnsmasq-debugsource-0:2.79-11.el8_2.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-debugsource@2.79-11.el8_2.2?arch=x86_64" } } }, { "category": "product_version", "name": "dnsmasq-debuginfo-0:2.79-11.el8_2.2.x86_64", "product": { "name": "dnsmasq-debuginfo-0:2.79-11.el8_2.2.x86_64", "product_id": "dnsmasq-debuginfo-0:2.79-11.el8_2.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-debuginfo@2.79-11.el8_2.2?arch=x86_64" } } }, { "category": "product_version", "name": "dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.x86_64", "product": { "name": "dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.x86_64", "product_id": "dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-utils-debuginfo@2.79-11.el8_2.2?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "dnsmasq-0:2.79-11.el8_2.2.s390x", "product": { "name": "dnsmasq-0:2.79-11.el8_2.2.s390x", "product_id": "dnsmasq-0:2.79-11.el8_2.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq@2.79-11.el8_2.2?arch=s390x" } } }, { "category": "product_version", "name": "dnsmasq-utils-0:2.79-11.el8_2.2.s390x", "product": { "name": "dnsmasq-utils-0:2.79-11.el8_2.2.s390x", "product_id": "dnsmasq-utils-0:2.79-11.el8_2.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-utils@2.79-11.el8_2.2?arch=s390x" } } }, { "category": "product_version", "name": "dnsmasq-debugsource-0:2.79-11.el8_2.2.s390x", "product": { "name": "dnsmasq-debugsource-0:2.79-11.el8_2.2.s390x", "product_id": "dnsmasq-debugsource-0:2.79-11.el8_2.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-debugsource@2.79-11.el8_2.2?arch=s390x" } } }, { "category": "product_version", "name": "dnsmasq-debuginfo-0:2.79-11.el8_2.2.s390x", "product": { "name": "dnsmasq-debuginfo-0:2.79-11.el8_2.2.s390x", "product_id": "dnsmasq-debuginfo-0:2.79-11.el8_2.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-debuginfo@2.79-11.el8_2.2?arch=s390x" } } }, { "category": "product_version", "name": "dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.s390x", "product": { "name": "dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.s390x", "product_id": "dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-utils-debuginfo@2.79-11.el8_2.2?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.79-11.el8_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.aarch64" }, "product_reference": "dnsmasq-0:2.79-11.el8_2.2.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.79-11.el8_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.ppc64le" }, "product_reference": "dnsmasq-0:2.79-11.el8_2.2.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.79-11.el8_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.s390x" }, "product_reference": "dnsmasq-0:2.79-11.el8_2.2.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.79-11.el8_2.2.src as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.src" }, "product_reference": "dnsmasq-0:2.79-11.el8_2.2.src", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.79-11.el8_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.x86_64" }, "product_reference": "dnsmasq-0:2.79-11.el8_2.2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.79-11.el8_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.aarch64" }, "product_reference": "dnsmasq-debuginfo-0:2.79-11.el8_2.2.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.79-11.el8_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.ppc64le" }, "product_reference": "dnsmasq-debuginfo-0:2.79-11.el8_2.2.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.79-11.el8_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.s390x" }, "product_reference": "dnsmasq-debuginfo-0:2.79-11.el8_2.2.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.79-11.el8_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.x86_64" }, "product_reference": "dnsmasq-debuginfo-0:2.79-11.el8_2.2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debugsource-0:2.79-11.el8_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.aarch64" }, "product_reference": "dnsmasq-debugsource-0:2.79-11.el8_2.2.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debugsource-0:2.79-11.el8_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.ppc64le" }, "product_reference": "dnsmasq-debugsource-0:2.79-11.el8_2.2.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debugsource-0:2.79-11.el8_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.s390x" }, "product_reference": "dnsmasq-debugsource-0:2.79-11.el8_2.2.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debugsource-0:2.79-11.el8_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.x86_64" }, "product_reference": "dnsmasq-debugsource-0:2.79-11.el8_2.2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.79-11.el8_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.aarch64" }, "product_reference": "dnsmasq-utils-0:2.79-11.el8_2.2.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.79-11.el8_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.ppc64le" }, "product_reference": "dnsmasq-utils-0:2.79-11.el8_2.2.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.79-11.el8_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.s390x" }, "product_reference": "dnsmasq-utils-0:2.79-11.el8_2.2.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.79-11.el8_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.x86_64" }, "product_reference": "dnsmasq-utils-0:2.79-11.el8_2.2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.aarch64" }, "product_reference": "dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.ppc64le" }, "product_reference": "dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.s390x" }, "product_reference": "dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.x86_64" }, "product_reference": "dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Moshe Kol", "Shlomi Oberman" ], "organization": "JSOF" } ], "cve": "CVE-2020-25681", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2020-09-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1881875" } ], "notes": [ { "category": "description", "text": "A flaw was found in dnsmasq. A heap-based buffer overflow was discovered in the way RRSets are sorted before validating with DNSSEC data. An attacker on the network, who can forge DNS replies such as that they are accepted as valid, could use this flaw to cause a buffer overflow with arbitrary data in a heap memory segment, possibly executing code on the machine. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "dnsmasq: heap-based buffer overflow in sort_rrset() when DNSSEC is enabled", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the versions of dnsmasq as shipped with Red Hat Enterprise Linux 5, 6, and 7 as they are not compiled with DNSSEC support.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.src", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-25681" }, { "category": "external", "summary": "RHBZ#1881875", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1881875" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-25681", "url": "https://www.cve.org/CVERecord?id=CVE-2020-25681" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25681", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25681" }, { "category": "external", "summary": "https://www.jsof-tech.com/disclosures/dnspooq/", "url": "https://www.jsof-tech.com/disclosures/dnspooq/" } ], "release_date": "2021-01-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.src", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0151" }, { "category": "workaround", "details": "The only known way to mitigate this flaw is to disable DNSSEC altogether, by removing the `--dnssec` command line option or the `dnssec` option from dnsmasq configuration file.", "product_ids": [ "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.src", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.src", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "dnsmasq: heap-based buffer overflow in sort_rrset() when DNSSEC is enabled" }, { "acknowledgments": [ { "names": [ "Moshe Kol", "Shlomi Oberman" ], "organization": "JSOF" } ], "cve": "CVE-2020-25682", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2020-09-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1882014" } ], "notes": [ { "category": "description", "text": "A flaw was found in dnsmasq. A buffer overflow vulnerability was discovered in the way dnsmasq extract names from DNS packets before validating them with DNSSEC data. An attacker on the network, who can create valid DNS replies, could use this flaw to cause an overflow with arbitrary data in a heap-allocated memory, possibly executing code on the machine. The flaw is in the rfc1035.c:extract_name() function, which writes data to the memory pointed by name assuming MAXDNAME*2 bytes are available in the buffer. However, in some code execution paths, it is possible extract_name() gets passed an offset from the base buffer, thus reducing, in practice, the number of available bytes that can be written in the buffer. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "dnsmasq: buffer overflow in extract_name() due to missing length check when DNSSEC is enabled", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the versions of dnsmasq as shipped with Red Hat Enterprise Linux 5, 6, and 7 as they are not compiled with DNSSEC support.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.src", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-25682" }, { "category": "external", "summary": "RHBZ#1882014", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1882014" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-25682", "url": "https://www.cve.org/CVERecord?id=CVE-2020-25682" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25682", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25682" }, { "category": "external", "summary": "https://www.jsof-tech.com/disclosures/dnspooq/", "url": "https://www.jsof-tech.com/disclosures/dnspooq/" } ], "release_date": "2021-01-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.src", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0151" }, { "category": "workaround", "details": "The only known way to mitigate this flaw is to disable DNSSEC altogether, by removing the `--dnssec` command line option or the `dnssec` option from dnsmasq configuration file.", "product_ids": [ "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.src", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.src", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "dnsmasq: buffer overflow in extract_name() due to missing length check when DNSSEC is enabled" }, { "acknowledgments": [ { "names": [ "Moshe Kol", "Shlomi Oberman" ], "organization": "JSOF" } ], "cve": "CVE-2020-25683", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2020-09-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1882018" } ], "notes": [ { "category": "description", "text": "A flaw was found in dnsmasq. A heap-based buffer overflow was discovered in dnsmasq when DNSSEC is enabled and before it validates the received DNS entries. A remote attacker, who can create valid DNS replies, could use this flaw to cause an overflow in a heap-allocated memory. This flaw is caused by the lack of length checks in rfc1035.c:extract_name(), which could be abused to make the code execute memcpy() with a negative size in get_rdata() and cause a crash in dnsmasq, resulting in a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "dnsmasq: heap-based buffer overflow with large memcpy in get_rdata() when DNSSEC is enabled", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the versions of dnsmasq as shipped with Red Hat Enterprise Linux 5, 6, and 7 as they are not compiled with DNSSEC support.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.src", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-25683" }, { "category": "external", "summary": "RHBZ#1882018", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1882018" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-25683", "url": "https://www.cve.org/CVERecord?id=CVE-2020-25683" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25683", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25683" }, { "category": "external", "summary": "https://www.jsof-tech.com/disclosures/dnspooq/", "url": "https://www.jsof-tech.com/disclosures/dnspooq/" } ], "release_date": "2021-01-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.src", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0151" }, { "category": "workaround", "details": "The only known way to mitigate this flaw is to disable DNSSEC altogether, by removing the `--dnssec` command line option or the `dnssec` option from dnsmasq configuration file.", "product_ids": [ "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.src", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.src", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "dnsmasq: heap-based buffer overflow with large memcpy in get_rdata() when DNSSEC is enabled" }, { "acknowledgments": [ { "names": [ "Moshe Kol", "Shlomi Oberman" ], "organization": "JSOF" } ], "cve": "CVE-2020-25684", "cwe": { "id": "CWE-358", "name": "Improperly Implemented Security Check for Standard" }, "discovery_date": "2020-09-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1889686" } ], "notes": [ { "category": "description", "text": "A flaw was found in dnsmasq. When getting a reply from a forwarded query, dnsmasq checks in the forward.c:reply_query() if the reply destination address/port is used by the pending forwarded queries. However, it does not use the address/port to retrieve the exact forwarded query, substantially reducing the number of attempts an attacker on the network would have to perform to forge a reply and get it accepted by dnsmasq. This issue contrasts with RFC5452, which specifies a query\u0027s attributes that all must be used to match a reply. This flaw allows an attacker to perform a DNS Cache Poisoning attack. If chained with CVE-2020-25685 or CVE-2020-25686, the attack complexity of a successful attack is reduced. The highest threat from this vulnerability is to data integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "dnsmasq: loose address/port check in reply_query() makes forging replies easier for an off-path attacker", "title": "Vulnerability summary" }, { "category": "other", "text": "Dnsmasq may be run by libvirt and/or NetworkManager. libvirt uses dnsmasq by default to provide DNS service to its guests. NetworkManager may be configured to use dnsmasq to provide DNS service to the system, if a line `dns=dnsmasq` is present in the `[main]` section of the configuration file /etc/NetworkManager/NetworkManager.conf.\n\nIn Red Hat OpenStack Platform (RHOSP) and Red Hat Virtualization (RHV), the dnsmasq package is provided by the underlying Red Hat Enterprise Linux (RHEL) product. RHOSP and RHV are therefore indirectly affected, so please ensure that the underlying RHEL dnsmasq package is updated.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.src", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-25684" }, { "category": "external", "summary": "RHBZ#1889686", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889686" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-25684", "url": "https://www.cve.org/CVERecord?id=CVE-2020-25684" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25684", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25684" }, { "category": "external", "summary": "https://www.jsof-tech.com/disclosures/dnspooq/", "url": "https://www.jsof-tech.com/disclosures/dnspooq/" } ], "release_date": "2021-01-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.src", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0151" }, { "category": "workaround", "details": "The impact of this flaw can be reduced by disabling the dnsmasq cache by adding `--cache-size=0` when calling dnsmasq or by adding a line with `cache-size=0` to the dnsmasq configuration file (/etc/dnsmasq.conf by default).\n\nWhen using Red Hat Enterprise Linux 8.3 with libvirt through a virt:rhel module, use `virsh net-edit \u003cnetwork-name\u003e` and reference https://libvirt.org/formatnetwork.html#elementsNamespaces to add the suggested option `cache-size=0`. \n\nThere is no way to customize the dnsmasq configuration generated by libvirt, when using versions of Red Hat Enterprise Linux prior to version 8.3. If dnsmasq is being run through NetworkManager, create a new file in /etc/NetworkManager/dnsmasq.d/ and add `cache-size=0` to it.\n\nIn all cases, by disabling the cache, you may experience a performance loss in your environment due to all DNS queries being forwarded to the upstream servers. Please evaluate if the mitigation is appropriate for the system\u2019s environment before applying.", "product_ids": [ "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.src", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N", "version": "3.1" }, "products": [ "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.src", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "dnsmasq: loose address/port check in reply_query() makes forging replies easier for an off-path attacker" }, { "acknowledgments": [ { "names": [ "Moshe Kol", "Shlomi Oberman" ], "organization": "JSOF" } ], "cve": "CVE-2020-25685", "cwe": { "id": "CWE-326", "name": "Inadequate Encryption Strength" }, "discovery_date": "2020-09-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1889688" } ], "notes": [ { "category": "description", "text": "A flaw was found in dnsmasq. When getting a reply from a forwarded query, dnsmasq checks in forward.c:reply_query(), which is the forwarded query that matches the reply, by only using a weak hash of the query name. Due to the weak hash (CRC32 when dnsmasq is compiled without DNSSEC, SHA-1 when it is) this flaw allows an off-path attacker to find several different domains all having the same hash, substantially reducing the number of attempts they would have to perform to forge a reply and get it accepted by dnsmasq. This is in contrast with RFC5452, which specifies that the query name is one of the attributes of a query that must be used to match a reply. This flaw could be abused to perform a DNS Cache Poisoning attack. If chained with CVE-2020-25684 the attack complexity of a successful attack is reduced. The highest threat from this vulnerability is to data integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "dnsmasq: loose query name check in reply_query() makes forging replies easier for an off-path attacker", "title": "Vulnerability summary" }, { "category": "other", "text": "Dnsmasq may be run by libvirt and/or NetworkManager. libvirt uses dnsmasq by default to provide DNS service to its guests. NetworkManager may be configured to use dnsmasq to provide DNS service to the system, if a line `dns=dnsmasq` is present in the `[main]` section of the configuration file /etc/NetworkManager/NetworkManager.conf.\n\nIn Red Hat OpenStack Platform (RHOSP) and Red Hat Virtualization (RHV), the dnsmasq package is provided by the underlying Red Hat Enterprise Linux (RHEL) product. RHOSP and RHV are therefore indirectly affected, so please ensure that the underlying RHEL dnsmasq package is updated.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.src", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-25685" }, { "category": "external", "summary": "RHBZ#1889688", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889688" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-25685", "url": "https://www.cve.org/CVERecord?id=CVE-2020-25685" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25685", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25685" }, { "category": "external", "summary": "https://www.jsof-tech.com/disclosures/dnspooq/", "url": "https://www.jsof-tech.com/disclosures/dnspooq/" } ], "release_date": "2021-01-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.src", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0151" }, { "category": "workaround", "details": "The impact of this flaw can be reduced by disabling the dnsmasq cache by adding `--cache-size=0` when calling dnsmasq or by adding a line with `cache-size=0` to the dnsmasq configuration file (/etc/dnsmasq.conf by default). \n\nWhen using Red Hat Enterprise Linux 8.3 with libvirt through a virt:rhel module, use `virsh net-edit \u003cnetwork-name\u003e` and reference https://libvirt.org/formatnetwork.html#elementsNamespaces to add the suggested option `cache-size=0`. \n\nThere is no way to customize the dnsmasq configuration generated by libvirt, when using versions of Red Hat Enterprise Linux prior to version 8.3. If dnsmasq is being run through NetworkManager, create a new file in /etc/NetworkManager/dnsmasq.d/ and add `cache-size=0` to it.\n\nIn all cases, by disabling the cache, you may experience a performance loss in your environment due to all DNS queries being forwarded to the upstream servers. Please evaluate if the mitigation is appropriate for the system\u2019s environment before applying.", "product_ids": [ "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.src", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N", "version": "3.1" }, "products": [ "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.src", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "dnsmasq: loose query name check in reply_query() makes forging replies easier for an off-path attacker" }, { "acknowledgments": [ { "names": [ "Moshe Kol", "Shlomi Oberman" ], "organization": "JSOF" } ], "cve": "CVE-2020-25686", "cwe": { "id": "CWE-290", "name": "Authentication Bypass by Spoofing" }, "discovery_date": "2020-09-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1890125" } ], "notes": [ { "category": "description", "text": "A flaw was found in dnsmasq. When receiving a query, dnsmasq does not check for an existing pending request for the same name and forwards a new request. By default, a maximum of 150 pending queries can be sent to upstream servers, so there can be at most 150 queries for the same name. This flaw allows an off-path attacker on the network to substantially reduce the number of attempts that it would have to perform to forge a reply and have it accepted by dnsmasq. This issue is mentioned in the \"Birthday Attacks\" section of RFC5452. If chained with CVE-2020-25684, the attack complexity of a successful attack is reduced. The highest threat from this vulnerability is to data integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "dnsmasq: multiple queries forwarded for the same name makes forging replies easier for an off-path attacker", "title": "Vulnerability summary" }, { "category": "other", "text": "Dnsmasq may be run by libvirt and/or NetworkManager. libvirt uses dnsmasq by default to provide DNS service to its guests. NetworkManager may be configured to use dnsmasq to provide DNS service to the system, if a line `dns=dnsmasq` is present in the `[main]` section of the configuration file /etc/NetworkManager/NetworkManager.conf.\n\nIn Red Hat OpenStack Platform (RHOSP) and Red Hat Virtualization (RHV), the dnsmasq package is provided by the underlying Red Hat Enterprise Linux (RHEL) product. RHOSP and RHV are therefore indirectly affected, so please ensure that the underlying RHEL dnsmasq package is updated.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.src", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-25686" }, { "category": "external", "summary": "RHBZ#1890125", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890125" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-25686", "url": "https://www.cve.org/CVERecord?id=CVE-2020-25686" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25686", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25686" }, { "category": "external", "summary": "https://www.jsof-tech.com/disclosures/dnspooq/", "url": "https://www.jsof-tech.com/disclosures/dnspooq/" } ], "release_date": "2021-01-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.src", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0151" }, { "category": "workaround", "details": "The impact of this flaw can be reduced by disabling the dnsmasq cache by adding `--cache-size=0` when calling dnsmasq or by adding a line with `cache-size=0` to the dnsmasq configuration file (/etc/dnsmasq.conf by default). \n\nWhen using Red Hat Enterprise Linux 8.3 with libvirt through a virt:rhel module, use `virsh net-edit \u003cnetwork-name\u003e` and reference https://libvirt.org/formatnetwork.html#elementsNamespaces to add the suggested option `cache-size=0`. \n\nThere is no way to customize the dnsmasq configuration generated by libvirt, when using versions of Red Hat Enterprise Linux prior to version 8.3. If dnsmasq is being run through NetworkManager, create a new file in /etc/NetworkManager/dnsmasq.d/ and add `cache-size=0` to it.\n\nIn all cases, by disabling the cache, you may experience a performance loss in your environment due to all DNS queries being forwarded to the upstream servers. Please evaluate if the mitigation is appropriate for the system\u2019s environment before applying.", "product_ids": [ "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.src", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N", "version": "3.1" }, "products": [ "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.src", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "dnsmasq: multiple queries forwarded for the same name makes forging replies easier for an off-path attacker" }, { "acknowledgments": [ { "names": [ "Moshe Kol", "Shlomi Oberman" ], "organization": "JSOF" } ], "cve": "CVE-2020-25687", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2020-09-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1891568" } ], "notes": [ { "category": "description", "text": "A flaw was found in dnsmasq. A heap-based buffer overflow was discovered in dnsmasq when DNSSEC is enabled and before it validates the received DNS entries. This flaw allows a remote attacker, who can create valid DNS replies, to cause an overflow in a heap-allocated memory. This flaw is caused by the lack of length checks in rfc1035.c:extract_name(), which could be abused to make the code execute memcpy() with a negative size in sort_rrset() and cause a crash in dnsmasq, resulting in a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "dnsmasq: heap-based buffer overflow with large memcpy in sort_rrset() when DNSSEC is enabled", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the versions of dnsmasq as shipped with Red Hat Enterprise Linux 5, 6, and 7 as they are not compiled with DNSSEC support.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.src", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-25687" }, { "category": "external", "summary": "RHBZ#1891568", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1891568" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-25687", "url": "https://www.cve.org/CVERecord?id=CVE-2020-25687" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25687", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25687" }, { "category": "external", "summary": "https://www.jsof-tech.com/disclosures/dnspooq/", "url": "https://www.jsof-tech.com/disclosures/dnspooq/" } ], "release_date": "2021-01-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.src", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0151" }, { "category": "workaround", "details": "The only known way to mitigate this flaw is to disable DNSSEC altogether, by removing the `--dnssec` command line option or the `dnssec` option from dnsmasq configuration file.", "product_ids": [ "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.src", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.src", "AppStream-8.2.0.Z.EUS:dnsmasq-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-debuginfo-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-debugsource-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-0:2.79-11.el8_2.2.x86_64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.aarch64", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.ppc64le", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.s390x", "AppStream-8.2.0.Z.EUS:dnsmasq-utils-debuginfo-0:2.79-11.el8_2.2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "dnsmasq: heap-based buffer overflow with large memcpy in sort_rrset() when DNSSEC is enabled" } ] }
rhsa-2021_0153
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_vex", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for dnsmasq is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The dnsmasq packages contain Dnsmasq, a lightweight DNS (Domain Name Server) forwarder and DHCP (Dynamic Host Configuration Protocol) server.\n\nSecurity Fix(es):\n\n* dnsmasq: loose address/port check in reply_query() makes forging replies easier for an off-path attacker (CVE-2020-25684)\n\n* dnsmasq: loose query name check in reply_query() makes forging replies easier for an off-path attacker (CVE-2020-25685)\n\n* dnsmasq: multiple queries forwarded for the same name makes forging replies easier for an off-path attacker (CVE-2020-25686)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat offerings.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:0153", "url": "https://access.redhat.com/errata/RHSA-2021:0153" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-001", "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-001" }, { "category": "external", "summary": "1889686", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889686" }, { "category": "external", "summary": "1889688", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889688" }, { "category": "external", "summary": "1890125", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890125" }, { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/data/csaf/v2/advisories/2021/rhsa-2021_0153.json" } ], "title": "Red Hat Security Advisory: dnsmasq security update", "tracking": { "current_release_date": "2024-09-13T18:15:54+00:00", "generator": { "date": "2024-09-13T18:15:54+00:00", "engine": { "name": "Red Hat SDEngine", "version": "3.33.3" } }, "id": "RHSA-2021:0153", "initial_release_date": "2021-01-19T18:02:16+00:00", "revision_history": [ { "date": "2021-01-19T18:02:16+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-01-19T18:02:16+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-09-13T18:15:54+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Client (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Client Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "dnsmasq-0:2.76-16.el7_9.1.src", "product": { "name": "dnsmasq-0:2.76-16.el7_9.1.src", "product_id": "dnsmasq-0:2.76-16.el7_9.1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq@2.76-16.el7_9.1?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "dnsmasq-0:2.76-16.el7_9.1.x86_64", "product": { "name": "dnsmasq-0:2.76-16.el7_9.1.x86_64", "product_id": "dnsmasq-0:2.76-16.el7_9.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq@2.76-16.el7_9.1?arch=x86_64" } } }, { "category": "product_version", "name": "dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "product": { "name": "dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "product_id": "dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-debuginfo@2.76-16.el7_9.1?arch=x86_64" } } }, { "category": "product_version", "name": "dnsmasq-utils-0:2.76-16.el7_9.1.x86_64", "product": { "name": "dnsmasq-utils-0:2.76-16.el7_9.1.x86_64", "product_id": "dnsmasq-utils-0:2.76-16.el7_9.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-utils@2.76-16.el7_9.1?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "dnsmasq-0:2.76-16.el7_9.1.ppc64le", "product": { "name": "dnsmasq-0:2.76-16.el7_9.1.ppc64le", "product_id": "dnsmasq-0:2.76-16.el7_9.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq@2.76-16.el7_9.1?arch=ppc64le" } } }, { "category": "product_version", "name": "dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "product": { "name": "dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "product_id": "dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-debuginfo@2.76-16.el7_9.1?arch=ppc64le" } } }, { "category": "product_version", "name": "dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "product": { "name": "dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "product_id": "dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-utils@2.76-16.el7_9.1?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "dnsmasq-0:2.76-16.el7_9.1.ppc64", "product": { "name": "dnsmasq-0:2.76-16.el7_9.1.ppc64", "product_id": "dnsmasq-0:2.76-16.el7_9.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq@2.76-16.el7_9.1?arch=ppc64" } } }, { "category": "product_version", "name": "dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "product": { "name": "dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "product_id": "dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-debuginfo@2.76-16.el7_9.1?arch=ppc64" } } }, { "category": "product_version", "name": "dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "product": { "name": "dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "product_id": "dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-utils@2.76-16.el7_9.1?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "dnsmasq-0:2.76-16.el7_9.1.s390x", "product": { "name": "dnsmasq-0:2.76-16.el7_9.1.s390x", "product_id": "dnsmasq-0:2.76-16.el7_9.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq@2.76-16.el7_9.1?arch=s390x" } } }, { "category": "product_version", "name": "dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "product": { "name": "dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "product_id": "dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-debuginfo@2.76-16.el7_9.1?arch=s390x" } } }, { "category": "product_version", "name": "dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "product": { "name": "dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "product_id": "dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-utils@2.76-16.el7_9.1?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-16.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64" }, "product_reference": "dnsmasq-0:2.76-16.el7_9.1.ppc64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-16.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le" }, "product_reference": "dnsmasq-0:2.76-16.el7_9.1.ppc64le", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-16.el7_9.1.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x" }, "product_reference": "dnsmasq-0:2.76-16.el7_9.1.s390x", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-16.el7_9.1.src as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src" }, "product_reference": "dnsmasq-0:2.76-16.el7_9.1.src", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-16.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64" }, "product_reference": "dnsmasq-0:2.76-16.el7_9.1.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64" }, "product_reference": "dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le" }, "product_reference": "dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x" }, "product_reference": "dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64" }, "product_reference": "dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-16.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64" }, "product_reference": "dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le" }, "product_reference": "dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-16.el7_9.1.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x" }, "product_reference": "dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-16.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64" }, "product_reference": "dnsmasq-utils-0:2.76-16.el7_9.1.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-16.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64" }, "product_reference": "dnsmasq-0:2.76-16.el7_9.1.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-16.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le" }, "product_reference": "dnsmasq-0:2.76-16.el7_9.1.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-16.el7_9.1.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x" }, "product_reference": "dnsmasq-0:2.76-16.el7_9.1.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-16.el7_9.1.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src" }, "product_reference": "dnsmasq-0:2.76-16.el7_9.1.src", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-16.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64" }, "product_reference": "dnsmasq-0:2.76-16.el7_9.1.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64" }, "product_reference": "dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le" }, "product_reference": "dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x" }, "product_reference": "dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64" }, "product_reference": "dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-16.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64" }, "product_reference": "dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le" }, "product_reference": "dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-16.el7_9.1.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x" }, "product_reference": "dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-16.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64" }, "product_reference": "dnsmasq-utils-0:2.76-16.el7_9.1.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-16.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64" }, "product_reference": "dnsmasq-0:2.76-16.el7_9.1.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-16.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le" }, "product_reference": "dnsmasq-0:2.76-16.el7_9.1.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-16.el7_9.1.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x" }, "product_reference": "dnsmasq-0:2.76-16.el7_9.1.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-16.el7_9.1.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src" }, "product_reference": "dnsmasq-0:2.76-16.el7_9.1.src", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-16.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64" }, "product_reference": "dnsmasq-0:2.76-16.el7_9.1.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64" }, "product_reference": "dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le" }, "product_reference": "dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x" }, "product_reference": "dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64" }, "product_reference": "dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-16.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64" }, "product_reference": "dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le" }, "product_reference": "dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-16.el7_9.1.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x" }, "product_reference": "dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-16.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64" }, "product_reference": "dnsmasq-utils-0:2.76-16.el7_9.1.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-16.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64" }, "product_reference": "dnsmasq-0:2.76-16.el7_9.1.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-16.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le" }, "product_reference": "dnsmasq-0:2.76-16.el7_9.1.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-16.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x" }, "product_reference": "dnsmasq-0:2.76-16.el7_9.1.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-16.el7_9.1.src as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src" }, "product_reference": "dnsmasq-0:2.76-16.el7_9.1.src", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-16.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64" }, "product_reference": "dnsmasq-0:2.76-16.el7_9.1.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64" }, "product_reference": "dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le" }, "product_reference": "dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x" }, "product_reference": "dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64" }, "product_reference": "dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-16.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64" }, "product_reference": "dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le" }, "product_reference": "dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-16.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x" }, "product_reference": "dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-16.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64" }, "product_reference": "dnsmasq-utils-0:2.76-16.el7_9.1.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-16.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64" }, "product_reference": "dnsmasq-0:2.76-16.el7_9.1.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-16.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le" }, "product_reference": "dnsmasq-0:2.76-16.el7_9.1.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-16.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x" }, "product_reference": "dnsmasq-0:2.76-16.el7_9.1.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-16.el7_9.1.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src" }, "product_reference": "dnsmasq-0:2.76-16.el7_9.1.src", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-16.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64" }, "product_reference": "dnsmasq-0:2.76-16.el7_9.1.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64" }, "product_reference": "dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le" }, "product_reference": "dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x" }, "product_reference": "dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64" }, "product_reference": "dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-16.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64" }, "product_reference": "dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le" }, "product_reference": "dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-16.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x" }, "product_reference": "dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-16.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64" }, "product_reference": "dnsmasq-utils-0:2.76-16.el7_9.1.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-16.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64" }, "product_reference": "dnsmasq-0:2.76-16.el7_9.1.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-16.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le" }, "product_reference": "dnsmasq-0:2.76-16.el7_9.1.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-16.el7_9.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x" }, "product_reference": "dnsmasq-0:2.76-16.el7_9.1.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-16.el7_9.1.src as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src" }, "product_reference": "dnsmasq-0:2.76-16.el7_9.1.src", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-16.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64" }, "product_reference": "dnsmasq-0:2.76-16.el7_9.1.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64" }, "product_reference": "dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le" }, "product_reference": "dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x" }, "product_reference": "dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64" }, "product_reference": "dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-16.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64" }, "product_reference": "dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le" }, "product_reference": "dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-16.el7_9.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x" }, "product_reference": "dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-16.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64" }, "product_reference": "dnsmasq-utils-0:2.76-16.el7_9.1.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-16.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64" }, "product_reference": "dnsmasq-0:2.76-16.el7_9.1.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-16.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le" }, "product_reference": "dnsmasq-0:2.76-16.el7_9.1.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-16.el7_9.1.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x" }, "product_reference": "dnsmasq-0:2.76-16.el7_9.1.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-16.el7_9.1.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src" }, "product_reference": "dnsmasq-0:2.76-16.el7_9.1.src", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-16.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64" }, "product_reference": "dnsmasq-0:2.76-16.el7_9.1.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64" }, "product_reference": "dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le" }, "product_reference": "dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x" }, "product_reference": "dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64" }, "product_reference": "dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-16.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64" }, "product_reference": "dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le" }, "product_reference": "dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-16.el7_9.1.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x" }, "product_reference": "dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-16.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64" }, "product_reference": "dnsmasq-utils-0:2.76-16.el7_9.1.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Moshe Kol", "Shlomi Oberman" ], "organization": "JSOF" } ], "cve": "CVE-2020-25684", "cwe": { "id": "CWE-358", "name": "Improperly Implemented Security Check for Standard" }, "discovery_date": "2020-09-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1889686" } ], "notes": [ { "category": "description", "text": "A flaw was found in dnsmasq. When getting a reply from a forwarded query, dnsmasq checks in the forward.c:reply_query() if the reply destination address/port is used by the pending forwarded queries. However, it does not use the address/port to retrieve the exact forwarded query, substantially reducing the number of attempts an attacker on the network would have to perform to forge a reply and get it accepted by dnsmasq. This issue contrasts with RFC5452, which specifies a query\u0027s attributes that all must be used to match a reply. This flaw allows an attacker to perform a DNS Cache Poisoning attack. If chained with CVE-2020-25685 or CVE-2020-25686, the attack complexity of a successful attack is reduced. The highest threat from this vulnerability is to data integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "dnsmasq: loose address/port check in reply_query() makes forging replies easier for an off-path attacker", "title": "Vulnerability summary" }, { "category": "other", "text": "Dnsmasq may be run by libvirt and/or NetworkManager. libvirt uses dnsmasq by default to provide DNS service to its guests. NetworkManager may be configured to use dnsmasq to provide DNS service to the system, if a line `dns=dnsmasq` is present in the `[main]` section of the configuration file /etc/NetworkManager/NetworkManager.conf.\n\nIn Red Hat OpenStack Platform (RHOSP) and Red Hat Virtualization (RHV), the dnsmasq package is provided by the underlying Red Hat Enterprise Linux (RHEL) product. RHOSP and RHV are therefore indirectly affected, so please ensure that the underlying RHEL dnsmasq package is updated.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7Client-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7Client-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7Client-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7Client-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7Client-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7Client-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7Client-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7Client-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7Client-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7Client-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7Client-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7Client-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64", "7Client-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7Client-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7Client-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7Client-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7Client-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7Client-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7Client-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7Client-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7Client-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7Client-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7Client-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7Client-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7Client-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64", "7ComputeNode-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7ComputeNode-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7ComputeNode-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7ComputeNode-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7ComputeNode-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7ComputeNode-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7ComputeNode-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7ComputeNode-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7ComputeNode-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7ComputeNode-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7ComputeNode-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7ComputeNode-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7ComputeNode-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64", "7Server-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7Server-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7Server-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7Server-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7Server-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7Server-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7Server-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7Server-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7Server-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7Server-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7Server-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7Server-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7Server-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64", "7Server-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7Server-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7Server-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7Server-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7Server-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7Server-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7Server-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7Server-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7Server-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7Server-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7Server-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7Server-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7Server-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64", "7Workstation-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7Workstation-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7Workstation-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7Workstation-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7Workstation-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7Workstation-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7Workstation-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7Workstation-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7Workstation-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7Workstation-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7Workstation-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7Workstation-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7Workstation-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64", "7Workstation-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7Workstation-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7Workstation-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7Workstation-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7Workstation-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7Workstation-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7Workstation-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7Workstation-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7Workstation-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7Workstation-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7Workstation-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7Workstation-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7Workstation-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-25684" }, { "category": "external", "summary": "RHBZ#1889686", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889686" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-25684", "url": "https://www.cve.org/CVERecord?id=CVE-2020-25684" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25684", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25684" }, { "category": "external", "summary": "https://www.jsof-tech.com/disclosures/dnspooq/", "url": "https://www.jsof-tech.com/disclosures/dnspooq/" } ], "release_date": "2021-01-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Client-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7Client-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7Client-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7Client-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7Client-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7Client-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7Client-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7Client-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7Client-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7Client-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7Client-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7Client-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7Client-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64", "7Client-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7Client-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7Client-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7Client-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7Client-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7Client-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7Client-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7Client-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7Client-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7Client-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7Client-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7Client-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7Client-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64", "7ComputeNode-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7ComputeNode-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7ComputeNode-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7ComputeNode-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7ComputeNode-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7ComputeNode-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7ComputeNode-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7ComputeNode-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7ComputeNode-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7ComputeNode-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7ComputeNode-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7ComputeNode-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7ComputeNode-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64", "7Server-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7Server-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7Server-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7Server-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7Server-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7Server-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7Server-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7Server-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7Server-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7Server-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7Server-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7Server-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7Server-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64", "7Server-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7Server-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7Server-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7Server-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7Server-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7Server-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7Server-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7Server-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7Server-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7Server-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7Server-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7Server-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7Server-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64", "7Workstation-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7Workstation-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7Workstation-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7Workstation-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7Workstation-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7Workstation-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7Workstation-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7Workstation-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7Workstation-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7Workstation-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7Workstation-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7Workstation-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7Workstation-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64", "7Workstation-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7Workstation-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7Workstation-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7Workstation-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7Workstation-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7Workstation-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7Workstation-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7Workstation-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7Workstation-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7Workstation-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7Workstation-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7Workstation-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7Workstation-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0153" }, { "category": "workaround", "details": "The impact of this flaw can be reduced by disabling the dnsmasq cache by adding `--cache-size=0` when calling dnsmasq or by adding a line with `cache-size=0` to the dnsmasq configuration file (/etc/dnsmasq.conf by default).\n\nWhen using Red Hat Enterprise Linux 8.3 with libvirt through a virt:rhel module, use `virsh net-edit \u003cnetwork-name\u003e` and reference https://libvirt.org/formatnetwork.html#elementsNamespaces to add the suggested option `cache-size=0`. \n\nThere is no way to customize the dnsmasq configuration generated by libvirt, when using versions of Red Hat Enterprise Linux prior to version 8.3. If dnsmasq is being run through NetworkManager, create a new file in /etc/NetworkManager/dnsmasq.d/ and add `cache-size=0` to it.\n\nIn all cases, by disabling the cache, you may experience a performance loss in your environment due to all DNS queries being forwarded to the upstream servers. Please evaluate if the mitigation is appropriate for the system\u2019s environment before applying.", "product_ids": [ "7Client-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7Client-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7Client-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7Client-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7Client-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7Client-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7Client-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7Client-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7Client-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7Client-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7Client-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7Client-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7Client-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64", "7Client-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7Client-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7Client-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7Client-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7Client-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7Client-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7Client-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7Client-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7Client-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7Client-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7Client-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7Client-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7Client-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64", "7ComputeNode-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7ComputeNode-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7ComputeNode-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7ComputeNode-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7ComputeNode-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7ComputeNode-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7ComputeNode-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7ComputeNode-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7ComputeNode-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7ComputeNode-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7ComputeNode-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7ComputeNode-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7ComputeNode-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64", "7Server-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7Server-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7Server-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7Server-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7Server-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7Server-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7Server-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7Server-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7Server-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7Server-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7Server-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7Server-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7Server-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64", "7Server-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7Server-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7Server-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7Server-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7Server-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7Server-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7Server-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7Server-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7Server-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7Server-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7Server-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7Server-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7Server-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64", "7Workstation-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7Workstation-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7Workstation-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7Workstation-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7Workstation-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7Workstation-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7Workstation-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7Workstation-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7Workstation-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7Workstation-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7Workstation-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7Workstation-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7Workstation-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64", "7Workstation-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7Workstation-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7Workstation-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7Workstation-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7Workstation-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7Workstation-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7Workstation-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7Workstation-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7Workstation-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7Workstation-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7Workstation-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7Workstation-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7Workstation-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N", "version": "3.1" }, "products": [ "7Client-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7Client-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7Client-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7Client-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7Client-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7Client-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7Client-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7Client-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7Client-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7Client-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7Client-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7Client-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7Client-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64", "7Client-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7Client-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7Client-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7Client-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7Client-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7Client-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7Client-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7Client-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7Client-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7Client-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7Client-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7Client-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7Client-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64", "7ComputeNode-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7ComputeNode-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7ComputeNode-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7ComputeNode-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7ComputeNode-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7ComputeNode-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7ComputeNode-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7ComputeNode-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7ComputeNode-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7ComputeNode-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7ComputeNode-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7ComputeNode-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7ComputeNode-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64", "7Server-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7Server-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7Server-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7Server-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7Server-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7Server-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7Server-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7Server-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7Server-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7Server-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7Server-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7Server-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7Server-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64", "7Server-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7Server-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7Server-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7Server-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7Server-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7Server-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7Server-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7Server-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7Server-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7Server-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7Server-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7Server-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7Server-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64", "7Workstation-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7Workstation-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7Workstation-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7Workstation-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7Workstation-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7Workstation-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7Workstation-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7Workstation-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7Workstation-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7Workstation-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7Workstation-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7Workstation-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7Workstation-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64", "7Workstation-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7Workstation-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7Workstation-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7Workstation-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7Workstation-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7Workstation-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7Workstation-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7Workstation-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7Workstation-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7Workstation-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7Workstation-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7Workstation-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7Workstation-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "dnsmasq: loose address/port check in reply_query() makes forging replies easier for an off-path attacker" }, { "acknowledgments": [ { "names": [ "Moshe Kol", "Shlomi Oberman" ], "organization": "JSOF" } ], "cve": "CVE-2020-25685", "cwe": { "id": "CWE-326", "name": "Inadequate Encryption Strength" }, "discovery_date": "2020-09-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1889688" } ], "notes": [ { "category": "description", "text": "A flaw was found in dnsmasq. When getting a reply from a forwarded query, dnsmasq checks in forward.c:reply_query(), which is the forwarded query that matches the reply, by only using a weak hash of the query name. Due to the weak hash (CRC32 when dnsmasq is compiled without DNSSEC, SHA-1 when it is) this flaw allows an off-path attacker to find several different domains all having the same hash, substantially reducing the number of attempts they would have to perform to forge a reply and get it accepted by dnsmasq. This is in contrast with RFC5452, which specifies that the query name is one of the attributes of a query that must be used to match a reply. This flaw could be abused to perform a DNS Cache Poisoning attack. If chained with CVE-2020-25684 the attack complexity of a successful attack is reduced. The highest threat from this vulnerability is to data integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "dnsmasq: loose query name check in reply_query() makes forging replies easier for an off-path attacker", "title": "Vulnerability summary" }, { "category": "other", "text": "Dnsmasq may be run by libvirt and/or NetworkManager. libvirt uses dnsmasq by default to provide DNS service to its guests. NetworkManager may be configured to use dnsmasq to provide DNS service to the system, if a line `dns=dnsmasq` is present in the `[main]` section of the configuration file /etc/NetworkManager/NetworkManager.conf.\n\nIn Red Hat OpenStack Platform (RHOSP) and Red Hat Virtualization (RHV), the dnsmasq package is provided by the underlying Red Hat Enterprise Linux (RHEL) product. RHOSP and RHV are therefore indirectly affected, so please ensure that the underlying RHEL dnsmasq package is updated.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7Client-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7Client-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7Client-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7Client-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7Client-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7Client-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7Client-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7Client-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7Client-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7Client-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7Client-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7Client-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64", "7Client-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7Client-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7Client-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7Client-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7Client-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7Client-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7Client-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7Client-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7Client-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7Client-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7Client-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7Client-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7Client-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64", "7ComputeNode-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7ComputeNode-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7ComputeNode-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7ComputeNode-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7ComputeNode-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7ComputeNode-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7ComputeNode-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7ComputeNode-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7ComputeNode-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7ComputeNode-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7ComputeNode-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7ComputeNode-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7ComputeNode-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64", "7Server-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7Server-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7Server-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7Server-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7Server-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7Server-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7Server-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7Server-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7Server-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7Server-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7Server-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7Server-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7Server-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64", "7Server-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7Server-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7Server-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7Server-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7Server-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7Server-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7Server-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7Server-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7Server-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7Server-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7Server-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7Server-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7Server-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64", "7Workstation-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7Workstation-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7Workstation-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7Workstation-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7Workstation-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7Workstation-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7Workstation-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7Workstation-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7Workstation-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7Workstation-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7Workstation-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7Workstation-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7Workstation-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64", "7Workstation-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7Workstation-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7Workstation-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7Workstation-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7Workstation-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7Workstation-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7Workstation-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7Workstation-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7Workstation-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7Workstation-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7Workstation-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7Workstation-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7Workstation-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-25685" }, { "category": "external", "summary": "RHBZ#1889688", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889688" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-25685", "url": "https://www.cve.org/CVERecord?id=CVE-2020-25685" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25685", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25685" }, { "category": "external", "summary": "https://www.jsof-tech.com/disclosures/dnspooq/", "url": "https://www.jsof-tech.com/disclosures/dnspooq/" } ], "release_date": "2021-01-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Client-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7Client-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7Client-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7Client-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7Client-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7Client-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7Client-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7Client-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7Client-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7Client-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7Client-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7Client-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7Client-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64", "7Client-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7Client-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7Client-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7Client-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7Client-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7Client-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7Client-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7Client-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7Client-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7Client-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7Client-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7Client-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7Client-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64", "7ComputeNode-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7ComputeNode-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7ComputeNode-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7ComputeNode-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7ComputeNode-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7ComputeNode-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7ComputeNode-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7ComputeNode-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7ComputeNode-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7ComputeNode-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7ComputeNode-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7ComputeNode-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7ComputeNode-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64", "7Server-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7Server-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7Server-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7Server-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7Server-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7Server-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7Server-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7Server-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7Server-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7Server-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7Server-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7Server-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7Server-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64", "7Server-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7Server-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7Server-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7Server-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7Server-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7Server-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7Server-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7Server-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7Server-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7Server-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7Server-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7Server-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7Server-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64", "7Workstation-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7Workstation-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7Workstation-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7Workstation-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7Workstation-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7Workstation-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7Workstation-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7Workstation-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7Workstation-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7Workstation-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7Workstation-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7Workstation-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7Workstation-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64", "7Workstation-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7Workstation-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7Workstation-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7Workstation-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7Workstation-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7Workstation-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7Workstation-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7Workstation-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7Workstation-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7Workstation-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7Workstation-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7Workstation-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7Workstation-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0153" }, { "category": "workaround", "details": "The impact of this flaw can be reduced by disabling the dnsmasq cache by adding `--cache-size=0` when calling dnsmasq or by adding a line with `cache-size=0` to the dnsmasq configuration file (/etc/dnsmasq.conf by default). \n\nWhen using Red Hat Enterprise Linux 8.3 with libvirt through a virt:rhel module, use `virsh net-edit \u003cnetwork-name\u003e` and reference https://libvirt.org/formatnetwork.html#elementsNamespaces to add the suggested option `cache-size=0`. \n\nThere is no way to customize the dnsmasq configuration generated by libvirt, when using versions of Red Hat Enterprise Linux prior to version 8.3. If dnsmasq is being run through NetworkManager, create a new file in /etc/NetworkManager/dnsmasq.d/ and add `cache-size=0` to it.\n\nIn all cases, by disabling the cache, you may experience a performance loss in your environment due to all DNS queries being forwarded to the upstream servers. Please evaluate if the mitigation is appropriate for the system\u2019s environment before applying.", "product_ids": [ "7Client-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7Client-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7Client-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7Client-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7Client-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7Client-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7Client-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7Client-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7Client-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7Client-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7Client-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7Client-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7Client-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64", "7Client-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7Client-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7Client-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7Client-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7Client-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7Client-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7Client-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7Client-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7Client-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7Client-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7Client-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7Client-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7Client-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64", "7ComputeNode-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7ComputeNode-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7ComputeNode-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7ComputeNode-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7ComputeNode-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7ComputeNode-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7ComputeNode-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7ComputeNode-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7ComputeNode-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7ComputeNode-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7ComputeNode-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7ComputeNode-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7ComputeNode-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64", "7Server-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7Server-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7Server-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7Server-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7Server-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7Server-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7Server-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7Server-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7Server-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7Server-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7Server-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7Server-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7Server-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64", "7Server-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7Server-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7Server-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7Server-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7Server-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7Server-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7Server-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7Server-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7Server-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7Server-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7Server-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7Server-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7Server-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64", "7Workstation-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7Workstation-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7Workstation-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7Workstation-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7Workstation-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7Workstation-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7Workstation-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7Workstation-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7Workstation-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7Workstation-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7Workstation-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7Workstation-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7Workstation-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64", "7Workstation-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7Workstation-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7Workstation-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7Workstation-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7Workstation-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7Workstation-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7Workstation-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7Workstation-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7Workstation-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7Workstation-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7Workstation-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7Workstation-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7Workstation-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N", "version": "3.1" }, "products": [ "7Client-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7Client-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7Client-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7Client-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7Client-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7Client-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7Client-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7Client-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7Client-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7Client-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7Client-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7Client-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7Client-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64", "7Client-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7Client-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7Client-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7Client-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7Client-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7Client-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7Client-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7Client-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7Client-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7Client-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7Client-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7Client-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7Client-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64", "7ComputeNode-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7ComputeNode-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7ComputeNode-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7ComputeNode-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7ComputeNode-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7ComputeNode-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7ComputeNode-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7ComputeNode-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7ComputeNode-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7ComputeNode-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7ComputeNode-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7ComputeNode-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7ComputeNode-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64", "7Server-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7Server-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7Server-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7Server-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7Server-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7Server-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7Server-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7Server-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7Server-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7Server-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7Server-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7Server-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7Server-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64", "7Server-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7Server-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7Server-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7Server-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7Server-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7Server-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7Server-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7Server-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7Server-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7Server-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7Server-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7Server-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7Server-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64", "7Workstation-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7Workstation-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7Workstation-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7Workstation-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7Workstation-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7Workstation-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7Workstation-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7Workstation-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7Workstation-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7Workstation-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7Workstation-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7Workstation-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7Workstation-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64", "7Workstation-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7Workstation-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7Workstation-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7Workstation-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7Workstation-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7Workstation-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7Workstation-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7Workstation-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7Workstation-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7Workstation-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7Workstation-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7Workstation-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7Workstation-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "dnsmasq: loose query name check in reply_query() makes forging replies easier for an off-path attacker" }, { "acknowledgments": [ { "names": [ "Moshe Kol", "Shlomi Oberman" ], "organization": "JSOF" } ], "cve": "CVE-2020-25686", "cwe": { "id": "CWE-290", "name": "Authentication Bypass by Spoofing" }, "discovery_date": "2020-09-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1890125" } ], "notes": [ { "category": "description", "text": "A flaw was found in dnsmasq. When receiving a query, dnsmasq does not check for an existing pending request for the same name and forwards a new request. By default, a maximum of 150 pending queries can be sent to upstream servers, so there can be at most 150 queries for the same name. This flaw allows an off-path attacker on the network to substantially reduce the number of attempts that it would have to perform to forge a reply and have it accepted by dnsmasq. This issue is mentioned in the \"Birthday Attacks\" section of RFC5452. If chained with CVE-2020-25684, the attack complexity of a successful attack is reduced. The highest threat from this vulnerability is to data integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "dnsmasq: multiple queries forwarded for the same name makes forging replies easier for an off-path attacker", "title": "Vulnerability summary" }, { "category": "other", "text": "Dnsmasq may be run by libvirt and/or NetworkManager. libvirt uses dnsmasq by default to provide DNS service to its guests. NetworkManager may be configured to use dnsmasq to provide DNS service to the system, if a line `dns=dnsmasq` is present in the `[main]` section of the configuration file /etc/NetworkManager/NetworkManager.conf.\n\nIn Red Hat OpenStack Platform (RHOSP) and Red Hat Virtualization (RHV), the dnsmasq package is provided by the underlying Red Hat Enterprise Linux (RHEL) product. RHOSP and RHV are therefore indirectly affected, so please ensure that the underlying RHEL dnsmasq package is updated.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7Client-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7Client-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7Client-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7Client-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7Client-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7Client-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7Client-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7Client-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7Client-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7Client-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7Client-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7Client-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64", "7Client-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7Client-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7Client-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7Client-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7Client-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7Client-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7Client-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7Client-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7Client-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7Client-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7Client-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7Client-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7Client-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64", "7ComputeNode-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7ComputeNode-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7ComputeNode-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7ComputeNode-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7ComputeNode-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7ComputeNode-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7ComputeNode-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7ComputeNode-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7ComputeNode-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7ComputeNode-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7ComputeNode-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7ComputeNode-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7ComputeNode-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64", "7Server-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7Server-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7Server-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7Server-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7Server-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7Server-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7Server-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7Server-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7Server-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7Server-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7Server-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7Server-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7Server-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64", "7Server-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7Server-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7Server-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7Server-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7Server-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7Server-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7Server-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7Server-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7Server-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7Server-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7Server-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7Server-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7Server-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64", "7Workstation-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7Workstation-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7Workstation-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7Workstation-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7Workstation-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7Workstation-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7Workstation-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7Workstation-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7Workstation-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7Workstation-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7Workstation-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7Workstation-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7Workstation-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64", "7Workstation-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7Workstation-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7Workstation-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7Workstation-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7Workstation-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7Workstation-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7Workstation-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7Workstation-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7Workstation-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7Workstation-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7Workstation-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7Workstation-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7Workstation-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-25686" }, { "category": "external", "summary": "RHBZ#1890125", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890125" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-25686", "url": "https://www.cve.org/CVERecord?id=CVE-2020-25686" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25686", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25686" }, { "category": "external", "summary": "https://www.jsof-tech.com/disclosures/dnspooq/", "url": "https://www.jsof-tech.com/disclosures/dnspooq/" } ], "release_date": "2021-01-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Client-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7Client-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7Client-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7Client-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7Client-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7Client-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7Client-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7Client-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7Client-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7Client-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7Client-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7Client-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7Client-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64", "7Client-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7Client-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7Client-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7Client-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7Client-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7Client-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7Client-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7Client-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7Client-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7Client-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7Client-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7Client-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7Client-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64", "7ComputeNode-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7ComputeNode-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7ComputeNode-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7ComputeNode-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7ComputeNode-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7ComputeNode-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7ComputeNode-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7ComputeNode-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7ComputeNode-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7ComputeNode-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7ComputeNode-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7ComputeNode-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7ComputeNode-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64", "7Server-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7Server-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7Server-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7Server-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7Server-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7Server-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7Server-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7Server-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7Server-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7Server-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7Server-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7Server-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7Server-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64", "7Server-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7Server-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7Server-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7Server-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7Server-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7Server-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7Server-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7Server-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7Server-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7Server-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7Server-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7Server-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7Server-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64", "7Workstation-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7Workstation-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7Workstation-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7Workstation-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7Workstation-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7Workstation-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7Workstation-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7Workstation-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7Workstation-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7Workstation-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7Workstation-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7Workstation-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7Workstation-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64", "7Workstation-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7Workstation-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7Workstation-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7Workstation-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7Workstation-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7Workstation-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7Workstation-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7Workstation-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7Workstation-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7Workstation-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7Workstation-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7Workstation-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7Workstation-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0153" }, { "category": "workaround", "details": "The impact of this flaw can be reduced by disabling the dnsmasq cache by adding `--cache-size=0` when calling dnsmasq or by adding a line with `cache-size=0` to the dnsmasq configuration file (/etc/dnsmasq.conf by default). \n\nWhen using Red Hat Enterprise Linux 8.3 with libvirt through a virt:rhel module, use `virsh net-edit \u003cnetwork-name\u003e` and reference https://libvirt.org/formatnetwork.html#elementsNamespaces to add the suggested option `cache-size=0`. \n\nThere is no way to customize the dnsmasq configuration generated by libvirt, when using versions of Red Hat Enterprise Linux prior to version 8.3. If dnsmasq is being run through NetworkManager, create a new file in /etc/NetworkManager/dnsmasq.d/ and add `cache-size=0` to it.\n\nIn all cases, by disabling the cache, you may experience a performance loss in your environment due to all DNS queries being forwarded to the upstream servers. Please evaluate if the mitigation is appropriate for the system\u2019s environment before applying.", "product_ids": [ "7Client-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7Client-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7Client-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7Client-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7Client-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7Client-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7Client-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7Client-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7Client-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7Client-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7Client-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7Client-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7Client-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64", "7Client-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7Client-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7Client-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7Client-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7Client-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7Client-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7Client-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7Client-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7Client-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7Client-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7Client-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7Client-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7Client-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64", "7ComputeNode-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7ComputeNode-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7ComputeNode-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7ComputeNode-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7ComputeNode-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7ComputeNode-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7ComputeNode-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7ComputeNode-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7ComputeNode-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7ComputeNode-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7ComputeNode-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7ComputeNode-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7ComputeNode-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64", "7Server-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7Server-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7Server-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7Server-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7Server-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7Server-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7Server-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7Server-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7Server-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7Server-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7Server-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7Server-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7Server-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64", "7Server-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7Server-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7Server-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7Server-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7Server-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7Server-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7Server-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7Server-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7Server-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7Server-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7Server-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7Server-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7Server-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64", "7Workstation-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7Workstation-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7Workstation-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7Workstation-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7Workstation-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7Workstation-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7Workstation-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7Workstation-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7Workstation-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7Workstation-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7Workstation-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7Workstation-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7Workstation-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64", "7Workstation-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7Workstation-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7Workstation-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7Workstation-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7Workstation-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7Workstation-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7Workstation-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7Workstation-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7Workstation-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7Workstation-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7Workstation-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7Workstation-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7Workstation-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N", "version": "3.1" }, "products": [ "7Client-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7Client-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7Client-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7Client-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7Client-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7Client-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7Client-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7Client-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7Client-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7Client-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7Client-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7Client-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7Client-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64", "7Client-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7Client-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7Client-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7Client-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7Client-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7Client-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7Client-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7Client-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7Client-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7Client-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7Client-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7Client-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7Client-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64", "7ComputeNode-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7ComputeNode-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7ComputeNode-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7ComputeNode-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7ComputeNode-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7ComputeNode-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7ComputeNode-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7ComputeNode-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7ComputeNode-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7ComputeNode-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7ComputeNode-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7ComputeNode-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7ComputeNode-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64", "7Server-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7Server-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7Server-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7Server-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7Server-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7Server-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7Server-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7Server-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7Server-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7Server-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7Server-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7Server-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7Server-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64", "7Server-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7Server-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7Server-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7Server-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7Server-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7Server-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7Server-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7Server-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7Server-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7Server-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7Server-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7Server-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7Server-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64", "7Workstation-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7Workstation-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7Workstation-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7Workstation-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7Workstation-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7Workstation-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7Workstation-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7Workstation-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7Workstation-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7Workstation-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7Workstation-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7Workstation-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7Workstation-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64", "7Workstation-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64", "7Workstation-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.ppc64le", "7Workstation-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.s390x", "7Workstation-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.src", "7Workstation-optional-7.9.Z:dnsmasq-0:2.76-16.el7_9.1.x86_64", "7Workstation-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64", "7Workstation-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.ppc64le", "7Workstation-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.s390x", "7Workstation-optional-7.9.Z:dnsmasq-debuginfo-0:2.76-16.el7_9.1.x86_64", "7Workstation-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64", "7Workstation-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.ppc64le", "7Workstation-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.s390x", "7Workstation-optional-7.9.Z:dnsmasq-utils-0:2.76-16.el7_9.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "dnsmasq: multiple queries forwarded for the same name makes forging replies easier for an off-path attacker" } ] }
rhsa-2021_0154
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_vex", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for dnsmasq is now available for Red Hat Enterprise Linux 7.7 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The dnsmasq packages contain Dnsmasq, a lightweight DNS (Domain Name Server) forwarder and DHCP (Dynamic Host Configuration Protocol) server.\n\nSecurity Fix(es):\n\n* dnsmasq: loose address/port check in reply_query() makes forging replies easier for an off-path attacker (CVE-2020-25684)\n\n* dnsmasq: loose query name check in reply_query() makes forging replies easier for an off-path attacker (CVE-2020-25685)\n\n* dnsmasq: multiple queries forwarded for the same name makes forging replies easier for an off-path attacker (CVE-2020-25686)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat offerings.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:0154", "url": "https://access.redhat.com/errata/RHSA-2021:0154" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-001", "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-001" }, { "category": "external", "summary": "1889686", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889686" }, { "category": "external", "summary": "1889688", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889688" }, { "category": "external", "summary": "1890125", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890125" }, { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/data/csaf/v2/advisories/2021/rhsa-2021_0154.json" } ], "title": "Red Hat Security Advisory: dnsmasq security update", "tracking": { "current_release_date": "2024-09-13T18:15:29+00:00", "generator": { "date": "2024-09-13T18:15:29+00:00", "engine": { "name": "Red Hat SDEngine", "version": "3.33.3" } }, "id": "RHSA-2021:0154", "initial_release_date": "2021-01-19T14:11:04+00:00", "revision_history": [ { "date": "2021-01-19T14:11:04+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-01-19T14:11:04+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-09-13T18:15:29+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)", "product": { "name": "Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)", "product_id": "7ComputeNode-optional-7.7.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:7.7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)", "product": { "name": "Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)", "product_id": "7ComputeNode-7.7.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:7.7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server EUS (v. 7.7)", "product": { "name": "Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-7.7.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:7.7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional EUS (v. 7.7)", "product": { "name": "Red Hat Enterprise Linux Server Optional EUS (v. 7.7)", "product_id": "7Server-optional-7.7.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:7.7::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "dnsmasq-0:2.76-10.el7_7.2.src", "product": { "name": "dnsmasq-0:2.76-10.el7_7.2.src", "product_id": "dnsmasq-0:2.76-10.el7_7.2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq@2.76-10.el7_7.2?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "dnsmasq-0:2.76-10.el7_7.2.x86_64", "product": { "name": "dnsmasq-0:2.76-10.el7_7.2.x86_64", "product_id": "dnsmasq-0:2.76-10.el7_7.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq@2.76-10.el7_7.2?arch=x86_64" } } }, { "category": "product_version", "name": "dnsmasq-debuginfo-0:2.76-10.el7_7.2.x86_64", "product": { "name": "dnsmasq-debuginfo-0:2.76-10.el7_7.2.x86_64", "product_id": "dnsmasq-debuginfo-0:2.76-10.el7_7.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-debuginfo@2.76-10.el7_7.2?arch=x86_64" } } }, { "category": "product_version", "name": "dnsmasq-utils-0:2.76-10.el7_7.2.x86_64", "product": { "name": "dnsmasq-utils-0:2.76-10.el7_7.2.x86_64", "product_id": "dnsmasq-utils-0:2.76-10.el7_7.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-utils@2.76-10.el7_7.2?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "dnsmasq-0:2.76-10.el7_7.2.ppc64le", "product": { "name": "dnsmasq-0:2.76-10.el7_7.2.ppc64le", "product_id": "dnsmasq-0:2.76-10.el7_7.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq@2.76-10.el7_7.2?arch=ppc64le" } } }, { "category": "product_version", "name": "dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64le", "product": { "name": "dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64le", "product_id": "dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-debuginfo@2.76-10.el7_7.2?arch=ppc64le" } } }, { "category": "product_version", "name": "dnsmasq-utils-0:2.76-10.el7_7.2.ppc64le", "product": { "name": "dnsmasq-utils-0:2.76-10.el7_7.2.ppc64le", "product_id": "dnsmasq-utils-0:2.76-10.el7_7.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-utils@2.76-10.el7_7.2?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "dnsmasq-0:2.76-10.el7_7.2.ppc64", "product": { "name": "dnsmasq-0:2.76-10.el7_7.2.ppc64", "product_id": "dnsmasq-0:2.76-10.el7_7.2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq@2.76-10.el7_7.2?arch=ppc64" } } }, { "category": "product_version", "name": "dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64", "product": { "name": "dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64", "product_id": "dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-debuginfo@2.76-10.el7_7.2?arch=ppc64" } } }, { "category": "product_version", "name": "dnsmasq-utils-0:2.76-10.el7_7.2.ppc64", "product": { "name": "dnsmasq-utils-0:2.76-10.el7_7.2.ppc64", "product_id": "dnsmasq-utils-0:2.76-10.el7_7.2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-utils@2.76-10.el7_7.2?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "dnsmasq-0:2.76-10.el7_7.2.s390x", "product": { "name": "dnsmasq-0:2.76-10.el7_7.2.s390x", "product_id": "dnsmasq-0:2.76-10.el7_7.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq@2.76-10.el7_7.2?arch=s390x" } } }, { "category": "product_version", "name": "dnsmasq-debuginfo-0:2.76-10.el7_7.2.s390x", "product": { "name": "dnsmasq-debuginfo-0:2.76-10.el7_7.2.s390x", "product_id": "dnsmasq-debuginfo-0:2.76-10.el7_7.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-debuginfo@2.76-10.el7_7.2?arch=s390x" } } }, { "category": "product_version", "name": "dnsmasq-utils-0:2.76-10.el7_7.2.s390x", "product": { "name": "dnsmasq-utils-0:2.76-10.el7_7.2.s390x", "product_id": "dnsmasq-utils-0:2.76-10.el7_7.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-utils@2.76-10.el7_7.2?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-10.el7_7.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)", "product_id": "7ComputeNode-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64" }, "product_reference": "dnsmasq-0:2.76-10.el7_7.2.ppc64", "relates_to_product_reference": "7ComputeNode-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-10.el7_7.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)", "product_id": "7ComputeNode-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64le" }, "product_reference": "dnsmasq-0:2.76-10.el7_7.2.ppc64le", "relates_to_product_reference": "7ComputeNode-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-10.el7_7.2.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)", "product_id": "7ComputeNode-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.s390x" }, "product_reference": "dnsmasq-0:2.76-10.el7_7.2.s390x", "relates_to_product_reference": "7ComputeNode-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-10.el7_7.2.src as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)", "product_id": "7ComputeNode-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.src" }, "product_reference": "dnsmasq-0:2.76-10.el7_7.2.src", "relates_to_product_reference": "7ComputeNode-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-10.el7_7.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)", "product_id": "7ComputeNode-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.x86_64" }, "product_reference": "dnsmasq-0:2.76-10.el7_7.2.x86_64", "relates_to_product_reference": "7ComputeNode-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)", "product_id": "7ComputeNode-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64" }, "product_reference": "dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64", "relates_to_product_reference": "7ComputeNode-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)", "product_id": "7ComputeNode-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64le" }, "product_reference": "dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64le", "relates_to_product_reference": "7ComputeNode-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-10.el7_7.2.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)", "product_id": "7ComputeNode-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.s390x" }, "product_reference": "dnsmasq-debuginfo-0:2.76-10.el7_7.2.s390x", "relates_to_product_reference": "7ComputeNode-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-10.el7_7.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)", "product_id": "7ComputeNode-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.x86_64" }, "product_reference": "dnsmasq-debuginfo-0:2.76-10.el7_7.2.x86_64", "relates_to_product_reference": "7ComputeNode-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-10.el7_7.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)", "product_id": "7ComputeNode-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64" }, "product_reference": "dnsmasq-utils-0:2.76-10.el7_7.2.ppc64", "relates_to_product_reference": "7ComputeNode-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-10.el7_7.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)", "product_id": "7ComputeNode-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64le" }, "product_reference": "dnsmasq-utils-0:2.76-10.el7_7.2.ppc64le", "relates_to_product_reference": "7ComputeNode-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-10.el7_7.2.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)", "product_id": "7ComputeNode-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.s390x" }, "product_reference": "dnsmasq-utils-0:2.76-10.el7_7.2.s390x", "relates_to_product_reference": "7ComputeNode-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-10.el7_7.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)", "product_id": "7ComputeNode-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.x86_64" }, "product_reference": "dnsmasq-utils-0:2.76-10.el7_7.2.x86_64", "relates_to_product_reference": "7ComputeNode-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-10.el7_7.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)", "product_id": "7ComputeNode-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64" }, "product_reference": "dnsmasq-0:2.76-10.el7_7.2.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-10.el7_7.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)", "product_id": "7ComputeNode-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64le" }, "product_reference": "dnsmasq-0:2.76-10.el7_7.2.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-10.el7_7.2.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)", "product_id": "7ComputeNode-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.s390x" }, "product_reference": "dnsmasq-0:2.76-10.el7_7.2.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-10.el7_7.2.src as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)", "product_id": "7ComputeNode-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.src" }, "product_reference": "dnsmasq-0:2.76-10.el7_7.2.src", "relates_to_product_reference": "7ComputeNode-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-10.el7_7.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)", "product_id": "7ComputeNode-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.x86_64" }, "product_reference": "dnsmasq-0:2.76-10.el7_7.2.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)", "product_id": "7ComputeNode-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64" }, "product_reference": "dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)", "product_id": "7ComputeNode-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64le" }, "product_reference": "dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-10.el7_7.2.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)", "product_id": "7ComputeNode-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.s390x" }, "product_reference": "dnsmasq-debuginfo-0:2.76-10.el7_7.2.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-10.el7_7.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)", "product_id": "7ComputeNode-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.x86_64" }, "product_reference": "dnsmasq-debuginfo-0:2.76-10.el7_7.2.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-10.el7_7.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)", "product_id": "7ComputeNode-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64" }, "product_reference": "dnsmasq-utils-0:2.76-10.el7_7.2.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-10.el7_7.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)", "product_id": "7ComputeNode-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64le" }, "product_reference": "dnsmasq-utils-0:2.76-10.el7_7.2.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-10.el7_7.2.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)", "product_id": "7ComputeNode-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.s390x" }, "product_reference": "dnsmasq-utils-0:2.76-10.el7_7.2.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-10.el7_7.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)", "product_id": "7ComputeNode-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.x86_64" }, "product_reference": "dnsmasq-utils-0:2.76-10.el7_7.2.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-10.el7_7.2.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64" }, "product_reference": "dnsmasq-0:2.76-10.el7_7.2.ppc64", "relates_to_product_reference": "7Server-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-10.el7_7.2.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64le" }, "product_reference": "dnsmasq-0:2.76-10.el7_7.2.ppc64le", "relates_to_product_reference": "7Server-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-10.el7_7.2.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.s390x" }, "product_reference": "dnsmasq-0:2.76-10.el7_7.2.s390x", "relates_to_product_reference": "7Server-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-10.el7_7.2.src as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.src" }, "product_reference": "dnsmasq-0:2.76-10.el7_7.2.src", "relates_to_product_reference": "7Server-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-10.el7_7.2.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.x86_64" }, "product_reference": "dnsmasq-0:2.76-10.el7_7.2.x86_64", "relates_to_product_reference": "7Server-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64" }, "product_reference": "dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64", "relates_to_product_reference": "7Server-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64le" }, "product_reference": "dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64le", "relates_to_product_reference": "7Server-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-10.el7_7.2.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.s390x" }, "product_reference": "dnsmasq-debuginfo-0:2.76-10.el7_7.2.s390x", "relates_to_product_reference": "7Server-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-10.el7_7.2.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.x86_64" }, "product_reference": "dnsmasq-debuginfo-0:2.76-10.el7_7.2.x86_64", "relates_to_product_reference": "7Server-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-10.el7_7.2.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64" }, "product_reference": "dnsmasq-utils-0:2.76-10.el7_7.2.ppc64", "relates_to_product_reference": "7Server-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-10.el7_7.2.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64le" }, "product_reference": "dnsmasq-utils-0:2.76-10.el7_7.2.ppc64le", "relates_to_product_reference": "7Server-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-10.el7_7.2.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.s390x" }, "product_reference": "dnsmasq-utils-0:2.76-10.el7_7.2.s390x", "relates_to_product_reference": "7Server-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-10.el7_7.2.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.x86_64" }, "product_reference": "dnsmasq-utils-0:2.76-10.el7_7.2.x86_64", "relates_to_product_reference": "7Server-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-10.el7_7.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)", "product_id": "7Server-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64" }, "product_reference": "dnsmasq-0:2.76-10.el7_7.2.ppc64", "relates_to_product_reference": "7Server-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-10.el7_7.2.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)", "product_id": "7Server-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64le" }, "product_reference": "dnsmasq-0:2.76-10.el7_7.2.ppc64le", "relates_to_product_reference": "7Server-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-10.el7_7.2.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)", "product_id": "7Server-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.s390x" }, "product_reference": "dnsmasq-0:2.76-10.el7_7.2.s390x", "relates_to_product_reference": "7Server-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-10.el7_7.2.src as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)", "product_id": "7Server-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.src" }, "product_reference": "dnsmasq-0:2.76-10.el7_7.2.src", "relates_to_product_reference": "7Server-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-10.el7_7.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)", "product_id": "7Server-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.x86_64" }, "product_reference": "dnsmasq-0:2.76-10.el7_7.2.x86_64", "relates_to_product_reference": "7Server-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)", "product_id": "7Server-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64" }, "product_reference": "dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64", "relates_to_product_reference": "7Server-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)", "product_id": "7Server-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64le" }, "product_reference": "dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64le", "relates_to_product_reference": "7Server-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-10.el7_7.2.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)", "product_id": "7Server-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.s390x" }, "product_reference": "dnsmasq-debuginfo-0:2.76-10.el7_7.2.s390x", "relates_to_product_reference": "7Server-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-10.el7_7.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)", "product_id": "7Server-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.x86_64" }, "product_reference": "dnsmasq-debuginfo-0:2.76-10.el7_7.2.x86_64", "relates_to_product_reference": "7Server-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-10.el7_7.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)", "product_id": "7Server-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64" }, "product_reference": "dnsmasq-utils-0:2.76-10.el7_7.2.ppc64", "relates_to_product_reference": "7Server-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-10.el7_7.2.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)", "product_id": "7Server-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64le" }, "product_reference": "dnsmasq-utils-0:2.76-10.el7_7.2.ppc64le", "relates_to_product_reference": "7Server-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-10.el7_7.2.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)", "product_id": "7Server-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.s390x" }, "product_reference": "dnsmasq-utils-0:2.76-10.el7_7.2.s390x", "relates_to_product_reference": "7Server-optional-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-10.el7_7.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)", "product_id": "7Server-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.x86_64" }, "product_reference": "dnsmasq-utils-0:2.76-10.el7_7.2.x86_64", "relates_to_product_reference": "7Server-optional-7.7.EUS" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Moshe Kol", "Shlomi Oberman" ], "organization": "JSOF" } ], "cve": "CVE-2020-25684", "cwe": { "id": "CWE-358", "name": "Improperly Implemented Security Check for Standard" }, "discovery_date": "2020-09-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1889686" } ], "notes": [ { "category": "description", "text": "A flaw was found in dnsmasq. When getting a reply from a forwarded query, dnsmasq checks in the forward.c:reply_query() if the reply destination address/port is used by the pending forwarded queries. However, it does not use the address/port to retrieve the exact forwarded query, substantially reducing the number of attempts an attacker on the network would have to perform to forge a reply and get it accepted by dnsmasq. This issue contrasts with RFC5452, which specifies a query\u0027s attributes that all must be used to match a reply. This flaw allows an attacker to perform a DNS Cache Poisoning attack. If chained with CVE-2020-25685 or CVE-2020-25686, the attack complexity of a successful attack is reduced. The highest threat from this vulnerability is to data integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "dnsmasq: loose address/port check in reply_query() makes forging replies easier for an off-path attacker", "title": "Vulnerability summary" }, { "category": "other", "text": "Dnsmasq may be run by libvirt and/or NetworkManager. libvirt uses dnsmasq by default to provide DNS service to its guests. NetworkManager may be configured to use dnsmasq to provide DNS service to the system, if a line `dns=dnsmasq` is present in the `[main]` section of the configuration file /etc/NetworkManager/NetworkManager.conf.\n\nIn Red Hat OpenStack Platform (RHOSP) and Red Hat Virtualization (RHV), the dnsmasq package is provided by the underlying Red Hat Enterprise Linux (RHEL) product. RHOSP and RHV are therefore indirectly affected, so please ensure that the underlying RHEL dnsmasq package is updated.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7ComputeNode-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64", "7ComputeNode-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64le", "7ComputeNode-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.s390x", "7ComputeNode-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.src", "7ComputeNode-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.x86_64", "7ComputeNode-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64", "7ComputeNode-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64le", "7ComputeNode-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.s390x", "7ComputeNode-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.x86_64", "7ComputeNode-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64", "7ComputeNode-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64le", "7ComputeNode-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.s390x", "7ComputeNode-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.x86_64", "7ComputeNode-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64", "7ComputeNode-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64le", "7ComputeNode-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.s390x", "7ComputeNode-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.src", "7ComputeNode-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.x86_64", "7ComputeNode-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64", "7ComputeNode-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64le", "7ComputeNode-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.s390x", "7ComputeNode-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.x86_64", "7ComputeNode-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64", "7ComputeNode-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64le", "7ComputeNode-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.s390x", "7ComputeNode-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.x86_64", "7Server-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64", "7Server-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64le", "7Server-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.s390x", "7Server-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.src", "7Server-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.x86_64", "7Server-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64", "7Server-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64le", "7Server-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.s390x", "7Server-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.x86_64", "7Server-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64", "7Server-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64le", "7Server-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.s390x", "7Server-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.x86_64", "7Server-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64", "7Server-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64le", "7Server-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.s390x", "7Server-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.src", "7Server-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.x86_64", "7Server-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64", "7Server-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64le", "7Server-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.s390x", "7Server-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.x86_64", "7Server-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64", "7Server-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64le", "7Server-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.s390x", "7Server-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-25684" }, { "category": "external", "summary": "RHBZ#1889686", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889686" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-25684", "url": "https://www.cve.org/CVERecord?id=CVE-2020-25684" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25684", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25684" }, { "category": "external", "summary": "https://www.jsof-tech.com/disclosures/dnspooq/", "url": "https://www.jsof-tech.com/disclosures/dnspooq/" } ], "release_date": "2021-01-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7ComputeNode-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64", "7ComputeNode-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64le", "7ComputeNode-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.s390x", "7ComputeNode-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.src", "7ComputeNode-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.x86_64", "7ComputeNode-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64", "7ComputeNode-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64le", "7ComputeNode-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.s390x", "7ComputeNode-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.x86_64", "7ComputeNode-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64", "7ComputeNode-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64le", "7ComputeNode-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.s390x", "7ComputeNode-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.x86_64", "7ComputeNode-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64", "7ComputeNode-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64le", "7ComputeNode-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.s390x", "7ComputeNode-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.src", "7ComputeNode-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.x86_64", "7ComputeNode-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64", "7ComputeNode-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64le", "7ComputeNode-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.s390x", "7ComputeNode-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.x86_64", "7ComputeNode-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64", "7ComputeNode-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64le", "7ComputeNode-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.s390x", "7ComputeNode-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.x86_64", "7Server-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64", "7Server-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64le", "7Server-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.s390x", "7Server-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.src", "7Server-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.x86_64", "7Server-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64", "7Server-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64le", "7Server-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.s390x", "7Server-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.x86_64", "7Server-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64", "7Server-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64le", "7Server-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.s390x", "7Server-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.x86_64", "7Server-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64", "7Server-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64le", "7Server-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.s390x", "7Server-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.src", "7Server-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.x86_64", "7Server-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64", "7Server-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64le", "7Server-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.s390x", "7Server-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.x86_64", "7Server-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64", "7Server-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64le", "7Server-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.s390x", "7Server-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0154" }, { "category": "workaround", "details": "The impact of this flaw can be reduced by disabling the dnsmasq cache by adding `--cache-size=0` when calling dnsmasq or by adding a line with `cache-size=0` to the dnsmasq configuration file (/etc/dnsmasq.conf by default).\n\nWhen using Red Hat Enterprise Linux 8.3 with libvirt through a virt:rhel module, use `virsh net-edit \u003cnetwork-name\u003e` and reference https://libvirt.org/formatnetwork.html#elementsNamespaces to add the suggested option `cache-size=0`. \n\nThere is no way to customize the dnsmasq configuration generated by libvirt, when using versions of Red Hat Enterprise Linux prior to version 8.3. If dnsmasq is being run through NetworkManager, create a new file in /etc/NetworkManager/dnsmasq.d/ and add `cache-size=0` to it.\n\nIn all cases, by disabling the cache, you may experience a performance loss in your environment due to all DNS queries being forwarded to the upstream servers. Please evaluate if the mitigation is appropriate for the system\u2019s environment before applying.", "product_ids": [ "7ComputeNode-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64", "7ComputeNode-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64le", "7ComputeNode-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.s390x", "7ComputeNode-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.src", "7ComputeNode-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.x86_64", "7ComputeNode-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64", "7ComputeNode-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64le", "7ComputeNode-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.s390x", "7ComputeNode-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.x86_64", "7ComputeNode-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64", "7ComputeNode-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64le", "7ComputeNode-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.s390x", "7ComputeNode-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.x86_64", "7ComputeNode-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64", "7ComputeNode-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64le", "7ComputeNode-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.s390x", "7ComputeNode-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.src", "7ComputeNode-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.x86_64", "7ComputeNode-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64", "7ComputeNode-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64le", "7ComputeNode-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.s390x", "7ComputeNode-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.x86_64", "7ComputeNode-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64", "7ComputeNode-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64le", "7ComputeNode-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.s390x", "7ComputeNode-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.x86_64", "7Server-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64", "7Server-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64le", "7Server-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.s390x", "7Server-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.src", "7Server-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.x86_64", "7Server-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64", "7Server-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64le", "7Server-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.s390x", "7Server-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.x86_64", "7Server-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64", "7Server-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64le", "7Server-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.s390x", "7Server-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.x86_64", "7Server-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64", "7Server-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64le", "7Server-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.s390x", "7Server-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.src", "7Server-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.x86_64", "7Server-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64", "7Server-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64le", "7Server-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.s390x", "7Server-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.x86_64", "7Server-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64", "7Server-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64le", "7Server-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.s390x", "7Server-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N", "version": "3.1" }, "products": [ "7ComputeNode-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64", "7ComputeNode-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64le", "7ComputeNode-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.s390x", "7ComputeNode-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.src", "7ComputeNode-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.x86_64", "7ComputeNode-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64", "7ComputeNode-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64le", "7ComputeNode-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.s390x", "7ComputeNode-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.x86_64", "7ComputeNode-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64", "7ComputeNode-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64le", "7ComputeNode-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.s390x", "7ComputeNode-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.x86_64", "7ComputeNode-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64", "7ComputeNode-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64le", "7ComputeNode-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.s390x", "7ComputeNode-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.src", "7ComputeNode-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.x86_64", "7ComputeNode-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64", "7ComputeNode-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64le", "7ComputeNode-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.s390x", "7ComputeNode-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.x86_64", "7ComputeNode-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64", "7ComputeNode-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64le", "7ComputeNode-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.s390x", "7ComputeNode-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.x86_64", "7Server-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64", "7Server-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64le", "7Server-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.s390x", "7Server-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.src", "7Server-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.x86_64", "7Server-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64", "7Server-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64le", "7Server-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.s390x", "7Server-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.x86_64", "7Server-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64", "7Server-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64le", "7Server-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.s390x", "7Server-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.x86_64", "7Server-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64", "7Server-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64le", "7Server-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.s390x", "7Server-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.src", "7Server-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.x86_64", "7Server-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64", "7Server-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64le", "7Server-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.s390x", "7Server-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.x86_64", "7Server-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64", "7Server-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64le", "7Server-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.s390x", "7Server-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "dnsmasq: loose address/port check in reply_query() makes forging replies easier for an off-path attacker" }, { "acknowledgments": [ { "names": [ "Moshe Kol", "Shlomi Oberman" ], "organization": "JSOF" } ], "cve": "CVE-2020-25685", "cwe": { "id": "CWE-326", "name": "Inadequate Encryption Strength" }, "discovery_date": "2020-09-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1889688" } ], "notes": [ { "category": "description", "text": "A flaw was found in dnsmasq. When getting a reply from a forwarded query, dnsmasq checks in forward.c:reply_query(), which is the forwarded query that matches the reply, by only using a weak hash of the query name. Due to the weak hash (CRC32 when dnsmasq is compiled without DNSSEC, SHA-1 when it is) this flaw allows an off-path attacker to find several different domains all having the same hash, substantially reducing the number of attempts they would have to perform to forge a reply and get it accepted by dnsmasq. This is in contrast with RFC5452, which specifies that the query name is one of the attributes of a query that must be used to match a reply. This flaw could be abused to perform a DNS Cache Poisoning attack. If chained with CVE-2020-25684 the attack complexity of a successful attack is reduced. The highest threat from this vulnerability is to data integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "dnsmasq: loose query name check in reply_query() makes forging replies easier for an off-path attacker", "title": "Vulnerability summary" }, { "category": "other", "text": "Dnsmasq may be run by libvirt and/or NetworkManager. libvirt uses dnsmasq by default to provide DNS service to its guests. NetworkManager may be configured to use dnsmasq to provide DNS service to the system, if a line `dns=dnsmasq` is present in the `[main]` section of the configuration file /etc/NetworkManager/NetworkManager.conf.\n\nIn Red Hat OpenStack Platform (RHOSP) and Red Hat Virtualization (RHV), the dnsmasq package is provided by the underlying Red Hat Enterprise Linux (RHEL) product. RHOSP and RHV are therefore indirectly affected, so please ensure that the underlying RHEL dnsmasq package is updated.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7ComputeNode-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64", "7ComputeNode-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64le", "7ComputeNode-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.s390x", "7ComputeNode-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.src", "7ComputeNode-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.x86_64", "7ComputeNode-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64", "7ComputeNode-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64le", "7ComputeNode-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.s390x", "7ComputeNode-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.x86_64", "7ComputeNode-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64", "7ComputeNode-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64le", "7ComputeNode-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.s390x", "7ComputeNode-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.x86_64", "7ComputeNode-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64", "7ComputeNode-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64le", "7ComputeNode-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.s390x", "7ComputeNode-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.src", "7ComputeNode-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.x86_64", "7ComputeNode-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64", "7ComputeNode-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64le", "7ComputeNode-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.s390x", "7ComputeNode-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.x86_64", "7ComputeNode-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64", "7ComputeNode-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64le", "7ComputeNode-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.s390x", "7ComputeNode-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.x86_64", "7Server-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64", "7Server-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64le", "7Server-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.s390x", "7Server-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.src", "7Server-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.x86_64", "7Server-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64", "7Server-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64le", "7Server-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.s390x", "7Server-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.x86_64", "7Server-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64", "7Server-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64le", "7Server-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.s390x", "7Server-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.x86_64", "7Server-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64", "7Server-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64le", "7Server-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.s390x", "7Server-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.src", "7Server-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.x86_64", "7Server-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64", "7Server-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64le", "7Server-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.s390x", "7Server-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.x86_64", "7Server-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64", "7Server-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64le", "7Server-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.s390x", "7Server-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-25685" }, { "category": "external", "summary": "RHBZ#1889688", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889688" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-25685", "url": "https://www.cve.org/CVERecord?id=CVE-2020-25685" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25685", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25685" }, { "category": "external", "summary": "https://www.jsof-tech.com/disclosures/dnspooq/", "url": "https://www.jsof-tech.com/disclosures/dnspooq/" } ], "release_date": "2021-01-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7ComputeNode-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64", "7ComputeNode-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64le", "7ComputeNode-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.s390x", "7ComputeNode-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.src", "7ComputeNode-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.x86_64", "7ComputeNode-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64", "7ComputeNode-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64le", "7ComputeNode-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.s390x", "7ComputeNode-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.x86_64", "7ComputeNode-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64", "7ComputeNode-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64le", "7ComputeNode-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.s390x", "7ComputeNode-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.x86_64", "7ComputeNode-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64", "7ComputeNode-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64le", "7ComputeNode-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.s390x", "7ComputeNode-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.src", "7ComputeNode-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.x86_64", "7ComputeNode-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64", "7ComputeNode-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64le", "7ComputeNode-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.s390x", "7ComputeNode-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.x86_64", "7ComputeNode-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64", "7ComputeNode-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64le", "7ComputeNode-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.s390x", "7ComputeNode-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.x86_64", "7Server-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64", "7Server-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64le", "7Server-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.s390x", "7Server-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.src", "7Server-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.x86_64", "7Server-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64", "7Server-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64le", "7Server-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.s390x", "7Server-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.x86_64", "7Server-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64", "7Server-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64le", "7Server-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.s390x", "7Server-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.x86_64", "7Server-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64", "7Server-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64le", "7Server-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.s390x", "7Server-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.src", "7Server-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.x86_64", "7Server-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64", "7Server-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64le", "7Server-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.s390x", "7Server-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.x86_64", "7Server-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64", "7Server-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64le", "7Server-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.s390x", "7Server-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0154" }, { "category": "workaround", "details": "The impact of this flaw can be reduced by disabling the dnsmasq cache by adding `--cache-size=0` when calling dnsmasq or by adding a line with `cache-size=0` to the dnsmasq configuration file (/etc/dnsmasq.conf by default). \n\nWhen using Red Hat Enterprise Linux 8.3 with libvirt through a virt:rhel module, use `virsh net-edit \u003cnetwork-name\u003e` and reference https://libvirt.org/formatnetwork.html#elementsNamespaces to add the suggested option `cache-size=0`. \n\nThere is no way to customize the dnsmasq configuration generated by libvirt, when using versions of Red Hat Enterprise Linux prior to version 8.3. If dnsmasq is being run through NetworkManager, create a new file in /etc/NetworkManager/dnsmasq.d/ and add `cache-size=0` to it.\n\nIn all cases, by disabling the cache, you may experience a performance loss in your environment due to all DNS queries being forwarded to the upstream servers. Please evaluate if the mitigation is appropriate for the system\u2019s environment before applying.", "product_ids": [ "7ComputeNode-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64", "7ComputeNode-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64le", "7ComputeNode-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.s390x", "7ComputeNode-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.src", "7ComputeNode-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.x86_64", "7ComputeNode-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64", "7ComputeNode-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64le", "7ComputeNode-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.s390x", "7ComputeNode-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.x86_64", "7ComputeNode-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64", "7ComputeNode-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64le", "7ComputeNode-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.s390x", "7ComputeNode-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.x86_64", "7ComputeNode-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64", "7ComputeNode-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64le", "7ComputeNode-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.s390x", "7ComputeNode-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.src", "7ComputeNode-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.x86_64", "7ComputeNode-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64", "7ComputeNode-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64le", "7ComputeNode-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.s390x", "7ComputeNode-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.x86_64", "7ComputeNode-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64", "7ComputeNode-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64le", "7ComputeNode-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.s390x", "7ComputeNode-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.x86_64", "7Server-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64", "7Server-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64le", "7Server-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.s390x", "7Server-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.src", "7Server-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.x86_64", "7Server-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64", "7Server-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64le", "7Server-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.s390x", "7Server-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.x86_64", "7Server-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64", "7Server-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64le", "7Server-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.s390x", "7Server-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.x86_64", "7Server-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64", "7Server-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64le", "7Server-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.s390x", "7Server-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.src", "7Server-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.x86_64", "7Server-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64", "7Server-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64le", "7Server-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.s390x", "7Server-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.x86_64", "7Server-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64", "7Server-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64le", "7Server-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.s390x", "7Server-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N", "version": "3.1" }, "products": [ "7ComputeNode-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64", "7ComputeNode-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64le", "7ComputeNode-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.s390x", "7ComputeNode-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.src", "7ComputeNode-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.x86_64", "7ComputeNode-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64", "7ComputeNode-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64le", "7ComputeNode-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.s390x", "7ComputeNode-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.x86_64", "7ComputeNode-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64", "7ComputeNode-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64le", "7ComputeNode-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.s390x", "7ComputeNode-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.x86_64", "7ComputeNode-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64", "7ComputeNode-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64le", "7ComputeNode-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.s390x", "7ComputeNode-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.src", "7ComputeNode-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.x86_64", "7ComputeNode-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64", "7ComputeNode-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64le", "7ComputeNode-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.s390x", "7ComputeNode-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.x86_64", "7ComputeNode-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64", "7ComputeNode-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64le", "7ComputeNode-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.s390x", "7ComputeNode-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.x86_64", "7Server-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64", "7Server-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64le", "7Server-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.s390x", "7Server-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.src", "7Server-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.x86_64", "7Server-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64", "7Server-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64le", "7Server-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.s390x", "7Server-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.x86_64", "7Server-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64", "7Server-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64le", "7Server-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.s390x", "7Server-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.x86_64", "7Server-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64", "7Server-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64le", "7Server-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.s390x", "7Server-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.src", "7Server-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.x86_64", "7Server-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64", "7Server-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64le", "7Server-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.s390x", "7Server-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.x86_64", "7Server-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64", "7Server-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64le", "7Server-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.s390x", "7Server-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "dnsmasq: loose query name check in reply_query() makes forging replies easier for an off-path attacker" }, { "acknowledgments": [ { "names": [ "Moshe Kol", "Shlomi Oberman" ], "organization": "JSOF" } ], "cve": "CVE-2020-25686", "cwe": { "id": "CWE-290", "name": "Authentication Bypass by Spoofing" }, "discovery_date": "2020-09-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1890125" } ], "notes": [ { "category": "description", "text": "A flaw was found in dnsmasq. When receiving a query, dnsmasq does not check for an existing pending request for the same name and forwards a new request. By default, a maximum of 150 pending queries can be sent to upstream servers, so there can be at most 150 queries for the same name. This flaw allows an off-path attacker on the network to substantially reduce the number of attempts that it would have to perform to forge a reply and have it accepted by dnsmasq. This issue is mentioned in the \"Birthday Attacks\" section of RFC5452. If chained with CVE-2020-25684, the attack complexity of a successful attack is reduced. The highest threat from this vulnerability is to data integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "dnsmasq: multiple queries forwarded for the same name makes forging replies easier for an off-path attacker", "title": "Vulnerability summary" }, { "category": "other", "text": "Dnsmasq may be run by libvirt and/or NetworkManager. libvirt uses dnsmasq by default to provide DNS service to its guests. NetworkManager may be configured to use dnsmasq to provide DNS service to the system, if a line `dns=dnsmasq` is present in the `[main]` section of the configuration file /etc/NetworkManager/NetworkManager.conf.\n\nIn Red Hat OpenStack Platform (RHOSP) and Red Hat Virtualization (RHV), the dnsmasq package is provided by the underlying Red Hat Enterprise Linux (RHEL) product. RHOSP and RHV are therefore indirectly affected, so please ensure that the underlying RHEL dnsmasq package is updated.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7ComputeNode-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64", "7ComputeNode-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64le", "7ComputeNode-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.s390x", "7ComputeNode-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.src", "7ComputeNode-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.x86_64", "7ComputeNode-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64", "7ComputeNode-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64le", "7ComputeNode-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.s390x", "7ComputeNode-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.x86_64", "7ComputeNode-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64", "7ComputeNode-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64le", "7ComputeNode-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.s390x", "7ComputeNode-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.x86_64", "7ComputeNode-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64", "7ComputeNode-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64le", "7ComputeNode-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.s390x", "7ComputeNode-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.src", "7ComputeNode-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.x86_64", "7ComputeNode-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64", "7ComputeNode-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64le", "7ComputeNode-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.s390x", "7ComputeNode-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.x86_64", "7ComputeNode-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64", "7ComputeNode-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64le", "7ComputeNode-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.s390x", "7ComputeNode-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.x86_64", "7Server-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64", "7Server-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64le", "7Server-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.s390x", "7Server-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.src", "7Server-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.x86_64", "7Server-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64", "7Server-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64le", "7Server-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.s390x", "7Server-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.x86_64", "7Server-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64", "7Server-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64le", "7Server-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.s390x", "7Server-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.x86_64", "7Server-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64", "7Server-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64le", "7Server-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.s390x", "7Server-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.src", "7Server-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.x86_64", "7Server-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64", "7Server-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64le", "7Server-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.s390x", "7Server-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.x86_64", "7Server-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64", "7Server-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64le", "7Server-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.s390x", "7Server-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-25686" }, { "category": "external", "summary": "RHBZ#1890125", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890125" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-25686", "url": "https://www.cve.org/CVERecord?id=CVE-2020-25686" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25686", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25686" }, { "category": "external", "summary": "https://www.jsof-tech.com/disclosures/dnspooq/", "url": "https://www.jsof-tech.com/disclosures/dnspooq/" } ], "release_date": "2021-01-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7ComputeNode-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64", "7ComputeNode-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64le", "7ComputeNode-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.s390x", "7ComputeNode-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.src", "7ComputeNode-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.x86_64", "7ComputeNode-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64", "7ComputeNode-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64le", "7ComputeNode-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.s390x", "7ComputeNode-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.x86_64", "7ComputeNode-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64", "7ComputeNode-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64le", "7ComputeNode-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.s390x", "7ComputeNode-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.x86_64", "7ComputeNode-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64", "7ComputeNode-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64le", "7ComputeNode-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.s390x", "7ComputeNode-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.src", "7ComputeNode-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.x86_64", "7ComputeNode-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64", "7ComputeNode-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64le", "7ComputeNode-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.s390x", "7ComputeNode-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.x86_64", "7ComputeNode-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64", "7ComputeNode-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64le", "7ComputeNode-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.s390x", "7ComputeNode-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.x86_64", "7Server-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64", "7Server-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64le", "7Server-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.s390x", "7Server-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.src", "7Server-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.x86_64", "7Server-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64", "7Server-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64le", "7Server-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.s390x", "7Server-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.x86_64", "7Server-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64", "7Server-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64le", "7Server-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.s390x", "7Server-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.x86_64", "7Server-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64", "7Server-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64le", "7Server-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.s390x", "7Server-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.src", "7Server-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.x86_64", "7Server-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64", "7Server-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64le", "7Server-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.s390x", "7Server-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.x86_64", "7Server-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64", "7Server-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64le", "7Server-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.s390x", "7Server-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0154" }, { "category": "workaround", "details": "The impact of this flaw can be reduced by disabling the dnsmasq cache by adding `--cache-size=0` when calling dnsmasq or by adding a line with `cache-size=0` to the dnsmasq configuration file (/etc/dnsmasq.conf by default). \n\nWhen using Red Hat Enterprise Linux 8.3 with libvirt through a virt:rhel module, use `virsh net-edit \u003cnetwork-name\u003e` and reference https://libvirt.org/formatnetwork.html#elementsNamespaces to add the suggested option `cache-size=0`. \n\nThere is no way to customize the dnsmasq configuration generated by libvirt, when using versions of Red Hat Enterprise Linux prior to version 8.3. If dnsmasq is being run through NetworkManager, create a new file in /etc/NetworkManager/dnsmasq.d/ and add `cache-size=0` to it.\n\nIn all cases, by disabling the cache, you may experience a performance loss in your environment due to all DNS queries being forwarded to the upstream servers. Please evaluate if the mitigation is appropriate for the system\u2019s environment before applying.", "product_ids": [ "7ComputeNode-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64", "7ComputeNode-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64le", "7ComputeNode-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.s390x", "7ComputeNode-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.src", "7ComputeNode-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.x86_64", "7ComputeNode-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64", "7ComputeNode-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64le", "7ComputeNode-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.s390x", "7ComputeNode-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.x86_64", "7ComputeNode-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64", "7ComputeNode-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64le", "7ComputeNode-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.s390x", "7ComputeNode-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.x86_64", "7ComputeNode-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64", "7ComputeNode-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64le", "7ComputeNode-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.s390x", "7ComputeNode-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.src", "7ComputeNode-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.x86_64", "7ComputeNode-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64", "7ComputeNode-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64le", "7ComputeNode-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.s390x", "7ComputeNode-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.x86_64", "7ComputeNode-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64", "7ComputeNode-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64le", "7ComputeNode-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.s390x", "7ComputeNode-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.x86_64", "7Server-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64", "7Server-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64le", "7Server-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.s390x", "7Server-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.src", "7Server-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.x86_64", "7Server-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64", "7Server-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64le", "7Server-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.s390x", "7Server-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.x86_64", "7Server-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64", "7Server-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64le", "7Server-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.s390x", "7Server-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.x86_64", "7Server-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64", "7Server-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64le", "7Server-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.s390x", "7Server-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.src", "7Server-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.x86_64", "7Server-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64", "7Server-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64le", "7Server-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.s390x", "7Server-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.x86_64", "7Server-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64", "7Server-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64le", "7Server-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.s390x", "7Server-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N", "version": "3.1" }, "products": [ "7ComputeNode-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64", "7ComputeNode-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64le", "7ComputeNode-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.s390x", "7ComputeNode-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.src", "7ComputeNode-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.x86_64", "7ComputeNode-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64", "7ComputeNode-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64le", "7ComputeNode-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.s390x", "7ComputeNode-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.x86_64", "7ComputeNode-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64", "7ComputeNode-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64le", "7ComputeNode-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.s390x", "7ComputeNode-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.x86_64", "7ComputeNode-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64", "7ComputeNode-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64le", "7ComputeNode-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.s390x", "7ComputeNode-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.src", "7ComputeNode-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.x86_64", "7ComputeNode-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64", "7ComputeNode-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64le", "7ComputeNode-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.s390x", "7ComputeNode-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.x86_64", "7ComputeNode-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64", "7ComputeNode-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64le", "7ComputeNode-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.s390x", "7ComputeNode-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.x86_64", "7Server-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64", "7Server-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64le", "7Server-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.s390x", "7Server-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.src", "7Server-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.x86_64", "7Server-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64", "7Server-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64le", "7Server-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.s390x", "7Server-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.x86_64", "7Server-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64", "7Server-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64le", "7Server-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.s390x", "7Server-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.x86_64", "7Server-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64", "7Server-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.ppc64le", "7Server-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.s390x", "7Server-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.src", "7Server-optional-7.7.EUS:dnsmasq-0:2.76-10.el7_7.2.x86_64", "7Server-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64", "7Server-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.ppc64le", "7Server-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.s390x", "7Server-optional-7.7.EUS:dnsmasq-debuginfo-0:2.76-10.el7_7.2.x86_64", "7Server-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64", "7Server-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.ppc64le", "7Server-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.s390x", "7Server-optional-7.7.EUS:dnsmasq-utils-0:2.76-10.el7_7.2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "dnsmasq: multiple queries forwarded for the same name makes forging replies easier for an off-path attacker" } ] }
rhsa-2021_0150
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_vex", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for dnsmasq is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The dnsmasq packages contain Dnsmasq, a lightweight DNS (Domain Name Server) forwarder and DHCP (Dynamic Host Configuration Protocol) server.\n\nSecurity Fix(es):\n\n* dnsmasq: heap-based buffer overflow in sort_rrset() when DNSSEC is enabled (CVE-2020-25681)\n\n* dnsmasq: buffer overflow in extract_name() due to missing length check when DNSSEC is enabled (CVE-2020-25682)\n\n* dnsmasq: heap-based buffer overflow with large memcpy in get_rdata() when DNSSEC is enabled (CVE-2020-25683)\n\n* dnsmasq: loose address/port check in reply_query() makes forging replies easier for an off-path attacker (CVE-2020-25684)\n\n* dnsmasq: loose query name check in reply_query() makes forging replies easier for an off-path attacker (CVE-2020-25685)\n\n* dnsmasq: multiple queries forwarded for the same name makes forging replies easier for an off-path attacker (CVE-2020-25686)\n\n* dnsmasq: heap-based buffer overflow with large memcpy in sort_rrset() when DNSSEC is enabled (CVE-2020-25687)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat offerings.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:0150", "url": "https://access.redhat.com/errata/RHSA-2021:0150" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-001", "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-001" }, { "category": "external", "summary": "1881875", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1881875" }, { "category": "external", "summary": "1882014", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1882014" }, { "category": "external", "summary": "1882018", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1882018" }, { "category": "external", "summary": "1889686", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889686" }, { "category": "external", "summary": "1889688", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889688" }, { "category": "external", "summary": "1890125", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890125" }, { "category": "external", "summary": "1891568", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1891568" }, { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/data/csaf/v2/advisories/2021/rhsa-2021_0150.json" } ], "title": "Red Hat Security Advisory: dnsmasq security update", "tracking": { "current_release_date": "2024-09-16T05:15:47+00:00", "generator": { "date": "2024-09-16T05:15:47+00:00", "engine": { "name": "Red Hat SDEngine", "version": "3.33.3" } }, "id": "RHSA-2021:0150", "initial_release_date": "2021-01-19T15:06:28+00:00", "revision_history": [ { "date": "2021-01-19T15:06:28+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-01-19T15:06:28+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-09-16T05:15:47+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "dnsmasq-0:2.79-13.el8_3.1.src", "product": { "name": "dnsmasq-0:2.79-13.el8_3.1.src", "product_id": "dnsmasq-0:2.79-13.el8_3.1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq@2.79-13.el8_3.1?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "dnsmasq-0:2.79-13.el8_3.1.aarch64", "product": { "name": "dnsmasq-0:2.79-13.el8_3.1.aarch64", "product_id": "dnsmasq-0:2.79-13.el8_3.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq@2.79-13.el8_3.1?arch=aarch64" } } }, { "category": "product_version", "name": "dnsmasq-utils-0:2.79-13.el8_3.1.aarch64", "product": { "name": "dnsmasq-utils-0:2.79-13.el8_3.1.aarch64", "product_id": "dnsmasq-utils-0:2.79-13.el8_3.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-utils@2.79-13.el8_3.1?arch=aarch64" } } }, { "category": "product_version", "name": "dnsmasq-debugsource-0:2.79-13.el8_3.1.aarch64", "product": { "name": "dnsmasq-debugsource-0:2.79-13.el8_3.1.aarch64", "product_id": "dnsmasq-debugsource-0:2.79-13.el8_3.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-debugsource@2.79-13.el8_3.1?arch=aarch64" } } }, { "category": "product_version", "name": "dnsmasq-debuginfo-0:2.79-13.el8_3.1.aarch64", "product": { "name": "dnsmasq-debuginfo-0:2.79-13.el8_3.1.aarch64", "product_id": "dnsmasq-debuginfo-0:2.79-13.el8_3.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-debuginfo@2.79-13.el8_3.1?arch=aarch64" } } }, { "category": "product_version", "name": "dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.aarch64", "product": { "name": "dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.aarch64", "product_id": "dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-utils-debuginfo@2.79-13.el8_3.1?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "dnsmasq-0:2.79-13.el8_3.1.ppc64le", "product": { "name": "dnsmasq-0:2.79-13.el8_3.1.ppc64le", "product_id": "dnsmasq-0:2.79-13.el8_3.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq@2.79-13.el8_3.1?arch=ppc64le" } } }, { "category": "product_version", "name": "dnsmasq-utils-0:2.79-13.el8_3.1.ppc64le", "product": { "name": "dnsmasq-utils-0:2.79-13.el8_3.1.ppc64le", "product_id": "dnsmasq-utils-0:2.79-13.el8_3.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-utils@2.79-13.el8_3.1?arch=ppc64le" } } }, { "category": "product_version", "name": "dnsmasq-debugsource-0:2.79-13.el8_3.1.ppc64le", "product": { "name": "dnsmasq-debugsource-0:2.79-13.el8_3.1.ppc64le", "product_id": "dnsmasq-debugsource-0:2.79-13.el8_3.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-debugsource@2.79-13.el8_3.1?arch=ppc64le" } } }, { "category": "product_version", "name": "dnsmasq-debuginfo-0:2.79-13.el8_3.1.ppc64le", "product": { "name": "dnsmasq-debuginfo-0:2.79-13.el8_3.1.ppc64le", "product_id": "dnsmasq-debuginfo-0:2.79-13.el8_3.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-debuginfo@2.79-13.el8_3.1?arch=ppc64le" } } }, { "category": "product_version", "name": "dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.ppc64le", "product": { "name": "dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.ppc64le", "product_id": "dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-utils-debuginfo@2.79-13.el8_3.1?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "dnsmasq-0:2.79-13.el8_3.1.x86_64", "product": { "name": "dnsmasq-0:2.79-13.el8_3.1.x86_64", "product_id": "dnsmasq-0:2.79-13.el8_3.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq@2.79-13.el8_3.1?arch=x86_64" } } }, { "category": "product_version", "name": "dnsmasq-utils-0:2.79-13.el8_3.1.x86_64", "product": { "name": "dnsmasq-utils-0:2.79-13.el8_3.1.x86_64", "product_id": "dnsmasq-utils-0:2.79-13.el8_3.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-utils@2.79-13.el8_3.1?arch=x86_64" } } }, { "category": "product_version", "name": "dnsmasq-debugsource-0:2.79-13.el8_3.1.x86_64", "product": { "name": "dnsmasq-debugsource-0:2.79-13.el8_3.1.x86_64", "product_id": "dnsmasq-debugsource-0:2.79-13.el8_3.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-debugsource@2.79-13.el8_3.1?arch=x86_64" } } }, { "category": "product_version", "name": "dnsmasq-debuginfo-0:2.79-13.el8_3.1.x86_64", "product": { "name": "dnsmasq-debuginfo-0:2.79-13.el8_3.1.x86_64", "product_id": "dnsmasq-debuginfo-0:2.79-13.el8_3.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-debuginfo@2.79-13.el8_3.1?arch=x86_64" } } }, { "category": "product_version", "name": "dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.x86_64", "product": { "name": "dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.x86_64", "product_id": "dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-utils-debuginfo@2.79-13.el8_3.1?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "dnsmasq-0:2.79-13.el8_3.1.s390x", "product": { "name": "dnsmasq-0:2.79-13.el8_3.1.s390x", "product_id": "dnsmasq-0:2.79-13.el8_3.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq@2.79-13.el8_3.1?arch=s390x" } } }, { "category": "product_version", "name": "dnsmasq-utils-0:2.79-13.el8_3.1.s390x", "product": { "name": "dnsmasq-utils-0:2.79-13.el8_3.1.s390x", "product_id": "dnsmasq-utils-0:2.79-13.el8_3.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-utils@2.79-13.el8_3.1?arch=s390x" } } }, { "category": "product_version", "name": "dnsmasq-debugsource-0:2.79-13.el8_3.1.s390x", "product": { "name": "dnsmasq-debugsource-0:2.79-13.el8_3.1.s390x", "product_id": "dnsmasq-debugsource-0:2.79-13.el8_3.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-debugsource@2.79-13.el8_3.1?arch=s390x" } } }, { "category": "product_version", "name": "dnsmasq-debuginfo-0:2.79-13.el8_3.1.s390x", "product": { "name": "dnsmasq-debuginfo-0:2.79-13.el8_3.1.s390x", "product_id": "dnsmasq-debuginfo-0:2.79-13.el8_3.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-debuginfo@2.79-13.el8_3.1?arch=s390x" } } }, { "category": "product_version", "name": "dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.s390x", "product": { "name": "dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.s390x", "product_id": "dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-utils-debuginfo@2.79-13.el8_3.1?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.79-13.el8_3.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.aarch64" }, "product_reference": "dnsmasq-0:2.79-13.el8_3.1.aarch64", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.79-13.el8_3.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.ppc64le" }, "product_reference": "dnsmasq-0:2.79-13.el8_3.1.ppc64le", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.79-13.el8_3.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.s390x" }, "product_reference": "dnsmasq-0:2.79-13.el8_3.1.s390x", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.79-13.el8_3.1.src as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.src" }, "product_reference": "dnsmasq-0:2.79-13.el8_3.1.src", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.79-13.el8_3.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.x86_64" }, "product_reference": "dnsmasq-0:2.79-13.el8_3.1.x86_64", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.79-13.el8_3.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.aarch64" }, "product_reference": "dnsmasq-debuginfo-0:2.79-13.el8_3.1.aarch64", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.79-13.el8_3.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.ppc64le" }, "product_reference": "dnsmasq-debuginfo-0:2.79-13.el8_3.1.ppc64le", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.79-13.el8_3.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.s390x" }, "product_reference": "dnsmasq-debuginfo-0:2.79-13.el8_3.1.s390x", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.79-13.el8_3.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.x86_64" }, "product_reference": "dnsmasq-debuginfo-0:2.79-13.el8_3.1.x86_64", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debugsource-0:2.79-13.el8_3.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.aarch64" }, "product_reference": "dnsmasq-debugsource-0:2.79-13.el8_3.1.aarch64", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debugsource-0:2.79-13.el8_3.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.ppc64le" }, "product_reference": "dnsmasq-debugsource-0:2.79-13.el8_3.1.ppc64le", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debugsource-0:2.79-13.el8_3.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.s390x" }, "product_reference": "dnsmasq-debugsource-0:2.79-13.el8_3.1.s390x", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debugsource-0:2.79-13.el8_3.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.x86_64" }, "product_reference": "dnsmasq-debugsource-0:2.79-13.el8_3.1.x86_64", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.79-13.el8_3.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.aarch64" }, "product_reference": "dnsmasq-utils-0:2.79-13.el8_3.1.aarch64", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.79-13.el8_3.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.ppc64le" }, "product_reference": "dnsmasq-utils-0:2.79-13.el8_3.1.ppc64le", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.79-13.el8_3.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.s390x" }, "product_reference": "dnsmasq-utils-0:2.79-13.el8_3.1.s390x", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.79-13.el8_3.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.x86_64" }, "product_reference": "dnsmasq-utils-0:2.79-13.el8_3.1.x86_64", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.aarch64" }, "product_reference": "dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.aarch64", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.ppc64le" }, "product_reference": "dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.ppc64le", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.s390x" }, "product_reference": "dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.s390x", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.x86_64" }, "product_reference": "dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.x86_64", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Moshe Kol", "Shlomi Oberman" ], "organization": "JSOF" } ], "cve": "CVE-2020-25681", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2020-09-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1881875" } ], "notes": [ { "category": "description", "text": "A flaw was found in dnsmasq. A heap-based buffer overflow was discovered in the way RRSets are sorted before validating with DNSSEC data. An attacker on the network, who can forge DNS replies such as that they are accepted as valid, could use this flaw to cause a buffer overflow with arbitrary data in a heap memory segment, possibly executing code on the machine. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "dnsmasq: heap-based buffer overflow in sort_rrset() when DNSSEC is enabled", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the versions of dnsmasq as shipped with Red Hat Enterprise Linux 5, 6, and 7 as they are not compiled with DNSSEC support.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.src", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-25681" }, { "category": "external", "summary": "RHBZ#1881875", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1881875" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-25681", "url": "https://www.cve.org/CVERecord?id=CVE-2020-25681" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25681", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25681" }, { "category": "external", "summary": "https://www.jsof-tech.com/disclosures/dnspooq/", "url": "https://www.jsof-tech.com/disclosures/dnspooq/" } ], "release_date": "2021-01-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.src", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0150" }, { "category": "workaround", "details": "The only known way to mitigate this flaw is to disable DNSSEC altogether, by removing the `--dnssec` command line option or the `dnssec` option from dnsmasq configuration file.", "product_ids": [ "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.src", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.src", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "dnsmasq: heap-based buffer overflow in sort_rrset() when DNSSEC is enabled" }, { "acknowledgments": [ { "names": [ "Moshe Kol", "Shlomi Oberman" ], "organization": "JSOF" } ], "cve": "CVE-2020-25682", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2020-09-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1882014" } ], "notes": [ { "category": "description", "text": "A flaw was found in dnsmasq. A buffer overflow vulnerability was discovered in the way dnsmasq extract names from DNS packets before validating them with DNSSEC data. An attacker on the network, who can create valid DNS replies, could use this flaw to cause an overflow with arbitrary data in a heap-allocated memory, possibly executing code on the machine. The flaw is in the rfc1035.c:extract_name() function, which writes data to the memory pointed by name assuming MAXDNAME*2 bytes are available in the buffer. However, in some code execution paths, it is possible extract_name() gets passed an offset from the base buffer, thus reducing, in practice, the number of available bytes that can be written in the buffer. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "dnsmasq: buffer overflow in extract_name() due to missing length check when DNSSEC is enabled", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the versions of dnsmasq as shipped with Red Hat Enterprise Linux 5, 6, and 7 as they are not compiled with DNSSEC support.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.src", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-25682" }, { "category": "external", "summary": "RHBZ#1882014", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1882014" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-25682", "url": "https://www.cve.org/CVERecord?id=CVE-2020-25682" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25682", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25682" }, { "category": "external", "summary": "https://www.jsof-tech.com/disclosures/dnspooq/", "url": "https://www.jsof-tech.com/disclosures/dnspooq/" } ], "release_date": "2021-01-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.src", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0150" }, { "category": "workaround", "details": "The only known way to mitigate this flaw is to disable DNSSEC altogether, by removing the `--dnssec` command line option or the `dnssec` option from dnsmasq configuration file.", "product_ids": [ "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.src", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.src", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "dnsmasq: buffer overflow in extract_name() due to missing length check when DNSSEC is enabled" }, { "acknowledgments": [ { "names": [ "Moshe Kol", "Shlomi Oberman" ], "organization": "JSOF" } ], "cve": "CVE-2020-25683", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2020-09-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1882018" } ], "notes": [ { "category": "description", "text": "A flaw was found in dnsmasq. A heap-based buffer overflow was discovered in dnsmasq when DNSSEC is enabled and before it validates the received DNS entries. A remote attacker, who can create valid DNS replies, could use this flaw to cause an overflow in a heap-allocated memory. This flaw is caused by the lack of length checks in rfc1035.c:extract_name(), which could be abused to make the code execute memcpy() with a negative size in get_rdata() and cause a crash in dnsmasq, resulting in a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "dnsmasq: heap-based buffer overflow with large memcpy in get_rdata() when DNSSEC is enabled", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the versions of dnsmasq as shipped with Red Hat Enterprise Linux 5, 6, and 7 as they are not compiled with DNSSEC support.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.src", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-25683" }, { "category": "external", "summary": "RHBZ#1882018", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1882018" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-25683", "url": "https://www.cve.org/CVERecord?id=CVE-2020-25683" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25683", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25683" }, { "category": "external", "summary": "https://www.jsof-tech.com/disclosures/dnspooq/", "url": "https://www.jsof-tech.com/disclosures/dnspooq/" } ], "release_date": "2021-01-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.src", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0150" }, { "category": "workaround", "details": "The only known way to mitigate this flaw is to disable DNSSEC altogether, by removing the `--dnssec` command line option or the `dnssec` option from dnsmasq configuration file.", "product_ids": [ "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.src", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.src", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "dnsmasq: heap-based buffer overflow with large memcpy in get_rdata() when DNSSEC is enabled" }, { "acknowledgments": [ { "names": [ "Moshe Kol", "Shlomi Oberman" ], "organization": "JSOF" } ], "cve": "CVE-2020-25684", "cwe": { "id": "CWE-358", "name": "Improperly Implemented Security Check for Standard" }, "discovery_date": "2020-09-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1889686" } ], "notes": [ { "category": "description", "text": "A flaw was found in dnsmasq. When getting a reply from a forwarded query, dnsmasq checks in the forward.c:reply_query() if the reply destination address/port is used by the pending forwarded queries. However, it does not use the address/port to retrieve the exact forwarded query, substantially reducing the number of attempts an attacker on the network would have to perform to forge a reply and get it accepted by dnsmasq. This issue contrasts with RFC5452, which specifies a query\u0027s attributes that all must be used to match a reply. This flaw allows an attacker to perform a DNS Cache Poisoning attack. If chained with CVE-2020-25685 or CVE-2020-25686, the attack complexity of a successful attack is reduced. The highest threat from this vulnerability is to data integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "dnsmasq: loose address/port check in reply_query() makes forging replies easier for an off-path attacker", "title": "Vulnerability summary" }, { "category": "other", "text": "Dnsmasq may be run by libvirt and/or NetworkManager. libvirt uses dnsmasq by default to provide DNS service to its guests. NetworkManager may be configured to use dnsmasq to provide DNS service to the system, if a line `dns=dnsmasq` is present in the `[main]` section of the configuration file /etc/NetworkManager/NetworkManager.conf.\n\nIn Red Hat OpenStack Platform (RHOSP) and Red Hat Virtualization (RHV), the dnsmasq package is provided by the underlying Red Hat Enterprise Linux (RHEL) product. RHOSP and RHV are therefore indirectly affected, so please ensure that the underlying RHEL dnsmasq package is updated.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.src", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-25684" }, { "category": "external", "summary": "RHBZ#1889686", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889686" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-25684", "url": "https://www.cve.org/CVERecord?id=CVE-2020-25684" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25684", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25684" }, { "category": "external", "summary": "https://www.jsof-tech.com/disclosures/dnspooq/", "url": "https://www.jsof-tech.com/disclosures/dnspooq/" } ], "release_date": "2021-01-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.src", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0150" }, { "category": "workaround", "details": "The impact of this flaw can be reduced by disabling the dnsmasq cache by adding `--cache-size=0` when calling dnsmasq or by adding a line with `cache-size=0` to the dnsmasq configuration file (/etc/dnsmasq.conf by default).\n\nWhen using Red Hat Enterprise Linux 8.3 with libvirt through a virt:rhel module, use `virsh net-edit \u003cnetwork-name\u003e` and reference https://libvirt.org/formatnetwork.html#elementsNamespaces to add the suggested option `cache-size=0`. \n\nThere is no way to customize the dnsmasq configuration generated by libvirt, when using versions of Red Hat Enterprise Linux prior to version 8.3. If dnsmasq is being run through NetworkManager, create a new file in /etc/NetworkManager/dnsmasq.d/ and add `cache-size=0` to it.\n\nIn all cases, by disabling the cache, you may experience a performance loss in your environment due to all DNS queries being forwarded to the upstream servers. Please evaluate if the mitigation is appropriate for the system\u2019s environment before applying.", "product_ids": [ "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.src", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N", "version": "3.1" }, "products": [ "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.src", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "dnsmasq: loose address/port check in reply_query() makes forging replies easier for an off-path attacker" }, { "acknowledgments": [ { "names": [ "Moshe Kol", "Shlomi Oberman" ], "organization": "JSOF" } ], "cve": "CVE-2020-25685", "cwe": { "id": "CWE-326", "name": "Inadequate Encryption Strength" }, "discovery_date": "2020-09-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1889688" } ], "notes": [ { "category": "description", "text": "A flaw was found in dnsmasq. When getting a reply from a forwarded query, dnsmasq checks in forward.c:reply_query(), which is the forwarded query that matches the reply, by only using a weak hash of the query name. Due to the weak hash (CRC32 when dnsmasq is compiled without DNSSEC, SHA-1 when it is) this flaw allows an off-path attacker to find several different domains all having the same hash, substantially reducing the number of attempts they would have to perform to forge a reply and get it accepted by dnsmasq. This is in contrast with RFC5452, which specifies that the query name is one of the attributes of a query that must be used to match a reply. This flaw could be abused to perform a DNS Cache Poisoning attack. If chained with CVE-2020-25684 the attack complexity of a successful attack is reduced. The highest threat from this vulnerability is to data integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "dnsmasq: loose query name check in reply_query() makes forging replies easier for an off-path attacker", "title": "Vulnerability summary" }, { "category": "other", "text": "Dnsmasq may be run by libvirt and/or NetworkManager. libvirt uses dnsmasq by default to provide DNS service to its guests. NetworkManager may be configured to use dnsmasq to provide DNS service to the system, if a line `dns=dnsmasq` is present in the `[main]` section of the configuration file /etc/NetworkManager/NetworkManager.conf.\n\nIn Red Hat OpenStack Platform (RHOSP) and Red Hat Virtualization (RHV), the dnsmasq package is provided by the underlying Red Hat Enterprise Linux (RHEL) product. RHOSP and RHV are therefore indirectly affected, so please ensure that the underlying RHEL dnsmasq package is updated.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.src", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-25685" }, { "category": "external", "summary": "RHBZ#1889688", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889688" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-25685", "url": "https://www.cve.org/CVERecord?id=CVE-2020-25685" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25685", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25685" }, { "category": "external", "summary": "https://www.jsof-tech.com/disclosures/dnspooq/", "url": "https://www.jsof-tech.com/disclosures/dnspooq/" } ], "release_date": "2021-01-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.src", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0150" }, { "category": "workaround", "details": "The impact of this flaw can be reduced by disabling the dnsmasq cache by adding `--cache-size=0` when calling dnsmasq or by adding a line with `cache-size=0` to the dnsmasq configuration file (/etc/dnsmasq.conf by default). \n\nWhen using Red Hat Enterprise Linux 8.3 with libvirt through a virt:rhel module, use `virsh net-edit \u003cnetwork-name\u003e` and reference https://libvirt.org/formatnetwork.html#elementsNamespaces to add the suggested option `cache-size=0`. \n\nThere is no way to customize the dnsmasq configuration generated by libvirt, when using versions of Red Hat Enterprise Linux prior to version 8.3. If dnsmasq is being run through NetworkManager, create a new file in /etc/NetworkManager/dnsmasq.d/ and add `cache-size=0` to it.\n\nIn all cases, by disabling the cache, you may experience a performance loss in your environment due to all DNS queries being forwarded to the upstream servers. Please evaluate if the mitigation is appropriate for the system\u2019s environment before applying.", "product_ids": [ "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.src", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N", "version": "3.1" }, "products": [ "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.src", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "dnsmasq: loose query name check in reply_query() makes forging replies easier for an off-path attacker" }, { "acknowledgments": [ { "names": [ "Moshe Kol", "Shlomi Oberman" ], "organization": "JSOF" } ], "cve": "CVE-2020-25686", "cwe": { "id": "CWE-290", "name": "Authentication Bypass by Spoofing" }, "discovery_date": "2020-09-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1890125" } ], "notes": [ { "category": "description", "text": "A flaw was found in dnsmasq. When receiving a query, dnsmasq does not check for an existing pending request for the same name and forwards a new request. By default, a maximum of 150 pending queries can be sent to upstream servers, so there can be at most 150 queries for the same name. This flaw allows an off-path attacker on the network to substantially reduce the number of attempts that it would have to perform to forge a reply and have it accepted by dnsmasq. This issue is mentioned in the \"Birthday Attacks\" section of RFC5452. If chained with CVE-2020-25684, the attack complexity of a successful attack is reduced. The highest threat from this vulnerability is to data integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "dnsmasq: multiple queries forwarded for the same name makes forging replies easier for an off-path attacker", "title": "Vulnerability summary" }, { "category": "other", "text": "Dnsmasq may be run by libvirt and/or NetworkManager. libvirt uses dnsmasq by default to provide DNS service to its guests. NetworkManager may be configured to use dnsmasq to provide DNS service to the system, if a line `dns=dnsmasq` is present in the `[main]` section of the configuration file /etc/NetworkManager/NetworkManager.conf.\n\nIn Red Hat OpenStack Platform (RHOSP) and Red Hat Virtualization (RHV), the dnsmasq package is provided by the underlying Red Hat Enterprise Linux (RHEL) product. RHOSP and RHV are therefore indirectly affected, so please ensure that the underlying RHEL dnsmasq package is updated.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.src", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-25686" }, { "category": "external", "summary": "RHBZ#1890125", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890125" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-25686", "url": "https://www.cve.org/CVERecord?id=CVE-2020-25686" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25686", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25686" }, { "category": "external", "summary": "https://www.jsof-tech.com/disclosures/dnspooq/", "url": "https://www.jsof-tech.com/disclosures/dnspooq/" } ], "release_date": "2021-01-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.src", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0150" }, { "category": "workaround", "details": "The impact of this flaw can be reduced by disabling the dnsmasq cache by adding `--cache-size=0` when calling dnsmasq or by adding a line with `cache-size=0` to the dnsmasq configuration file (/etc/dnsmasq.conf by default). \n\nWhen using Red Hat Enterprise Linux 8.3 with libvirt through a virt:rhel module, use `virsh net-edit \u003cnetwork-name\u003e` and reference https://libvirt.org/formatnetwork.html#elementsNamespaces to add the suggested option `cache-size=0`. \n\nThere is no way to customize the dnsmasq configuration generated by libvirt, when using versions of Red Hat Enterprise Linux prior to version 8.3. If dnsmasq is being run through NetworkManager, create a new file in /etc/NetworkManager/dnsmasq.d/ and add `cache-size=0` to it.\n\nIn all cases, by disabling the cache, you may experience a performance loss in your environment due to all DNS queries being forwarded to the upstream servers. Please evaluate if the mitigation is appropriate for the system\u2019s environment before applying.", "product_ids": [ "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.src", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N", "version": "3.1" }, "products": [ "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.src", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "dnsmasq: multiple queries forwarded for the same name makes forging replies easier for an off-path attacker" }, { "acknowledgments": [ { "names": [ "Moshe Kol", "Shlomi Oberman" ], "organization": "JSOF" } ], "cve": "CVE-2020-25687", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2020-09-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1891568" } ], "notes": [ { "category": "description", "text": "A flaw was found in dnsmasq. A heap-based buffer overflow was discovered in dnsmasq when DNSSEC is enabled and before it validates the received DNS entries. This flaw allows a remote attacker, who can create valid DNS replies, to cause an overflow in a heap-allocated memory. This flaw is caused by the lack of length checks in rfc1035.c:extract_name(), which could be abused to make the code execute memcpy() with a negative size in sort_rrset() and cause a crash in dnsmasq, resulting in a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "dnsmasq: heap-based buffer overflow with large memcpy in sort_rrset() when DNSSEC is enabled", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the versions of dnsmasq as shipped with Red Hat Enterprise Linux 5, 6, and 7 as they are not compiled with DNSSEC support.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.src", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-25687" }, { "category": "external", "summary": "RHBZ#1891568", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1891568" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-25687", "url": "https://www.cve.org/CVERecord?id=CVE-2020-25687" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25687", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25687" }, { "category": "external", "summary": "https://www.jsof-tech.com/disclosures/dnspooq/", "url": "https://www.jsof-tech.com/disclosures/dnspooq/" } ], "release_date": "2021-01-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.src", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0150" }, { "category": "workaround", "details": "The only known way to mitigate this flaw is to disable DNSSEC altogether, by removing the `--dnssec` command line option or the `dnssec` option from dnsmasq configuration file.", "product_ids": [ "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.src", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.src", "AppStream-8.3.0.Z.MAIN:dnsmasq-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-debuginfo-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-debugsource-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-0:2.79-13.el8_3.1.x86_64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.aarch64", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.ppc64le", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.s390x", "AppStream-8.3.0.Z.MAIN:dnsmasq-utils-debuginfo-0:2.79-13.el8_3.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "dnsmasq: heap-based buffer overflow with large memcpy in sort_rrset() when DNSSEC is enabled" } ] }
rhsa-2021_0245
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_vex", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for dnsmasq is now available for Red Hat Enterprise Linux 7.3 Advanced Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The dnsmasq packages contain Dnsmasq, a lightweight DNS (Domain Name Server) forwarder and DHCP (Dynamic Host Configuration Protocol) server.\n\nSecurity Fix(es):\n\n* dnsmasq: loose address/port check in reply_query() makes forging replies easier for an off-path attacker (CVE-2020-25684)\n\n* dnsmasq: loose query name check in reply_query() makes forging replies easier for an off-path attacker (CVE-2020-25685)\n\n* dnsmasq: multiple queries forwarded for the same name makes forging replies easier for an off-path attacker (CVE-2020-25686)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat offerings.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:0245", "url": "https://access.redhat.com/errata/RHSA-2021:0245" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-001", "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-001" }, { "category": "external", "summary": "1889686", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889686" }, { "category": "external", "summary": "1889688", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889688" }, { "category": "external", "summary": "1890125", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890125" }, { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/data/csaf/v2/advisories/2021/rhsa-2021_0245.json" } ], "title": "Red Hat Security Advisory: dnsmasq security update", "tracking": { "current_release_date": "2024-09-13T18:16:30+00:00", "generator": { "date": "2024-09-13T18:16:30+00:00", "engine": { "name": "Red Hat SDEngine", "version": "3.33.3" } }, "id": "RHSA-2021:0245", "initial_release_date": "2021-01-25T15:13:22+00:00", "revision_history": [ { "date": "2021-01-25T15:13:22+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-01-25T15:13:22+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-09-13T18:16:30+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Server AUS (v. 7.3)", "product": { "name": "Red Hat Enterprise Linux Server AUS (v. 7.3)", "product_id": "7Server-7.3.AUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_aus:7.3::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.3)", "product": { "name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.3)", "product_id": "7Server-optional-7.3.AUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_aus:7.3::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "dnsmasq-0:2.66-21.el7_3.3.src", "product": { "name": "dnsmasq-0:2.66-21.el7_3.3.src", "product_id": "dnsmasq-0:2.66-21.el7_3.3.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq@2.66-21.el7_3.3?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "dnsmasq-0:2.66-21.el7_3.3.x86_64", "product": { "name": "dnsmasq-0:2.66-21.el7_3.3.x86_64", "product_id": "dnsmasq-0:2.66-21.el7_3.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq@2.66-21.el7_3.3?arch=x86_64" } } }, { "category": "product_version", "name": "dnsmasq-debuginfo-0:2.66-21.el7_3.3.x86_64", "product": { "name": "dnsmasq-debuginfo-0:2.66-21.el7_3.3.x86_64", "product_id": "dnsmasq-debuginfo-0:2.66-21.el7_3.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-debuginfo@2.66-21.el7_3.3?arch=x86_64" } } }, { "category": "product_version", "name": "dnsmasq-utils-0:2.66-21.el7_3.3.x86_64", "product": { "name": "dnsmasq-utils-0:2.66-21.el7_3.3.x86_64", "product_id": "dnsmasq-utils-0:2.66-21.el7_3.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-utils@2.66-21.el7_3.3?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.66-21.el7_3.3.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)", "product_id": "7Server-7.3.AUS:dnsmasq-0:2.66-21.el7_3.3.src" }, "product_reference": "dnsmasq-0:2.66-21.el7_3.3.src", "relates_to_product_reference": "7Server-7.3.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.66-21.el7_3.3.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)", "product_id": "7Server-7.3.AUS:dnsmasq-0:2.66-21.el7_3.3.x86_64" }, "product_reference": "dnsmasq-0:2.66-21.el7_3.3.x86_64", "relates_to_product_reference": "7Server-7.3.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.66-21.el7_3.3.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)", "product_id": "7Server-7.3.AUS:dnsmasq-debuginfo-0:2.66-21.el7_3.3.x86_64" }, "product_reference": "dnsmasq-debuginfo-0:2.66-21.el7_3.3.x86_64", "relates_to_product_reference": "7Server-7.3.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.66-21.el7_3.3.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)", "product_id": "7Server-7.3.AUS:dnsmasq-utils-0:2.66-21.el7_3.3.x86_64" }, "product_reference": "dnsmasq-utils-0:2.66-21.el7_3.3.x86_64", "relates_to_product_reference": "7Server-7.3.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.66-21.el7_3.3.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)", "product_id": "7Server-optional-7.3.AUS:dnsmasq-0:2.66-21.el7_3.3.src" }, "product_reference": "dnsmasq-0:2.66-21.el7_3.3.src", "relates_to_product_reference": "7Server-optional-7.3.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.66-21.el7_3.3.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)", "product_id": "7Server-optional-7.3.AUS:dnsmasq-0:2.66-21.el7_3.3.x86_64" }, "product_reference": "dnsmasq-0:2.66-21.el7_3.3.x86_64", "relates_to_product_reference": "7Server-optional-7.3.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.66-21.el7_3.3.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)", "product_id": "7Server-optional-7.3.AUS:dnsmasq-debuginfo-0:2.66-21.el7_3.3.x86_64" }, "product_reference": "dnsmasq-debuginfo-0:2.66-21.el7_3.3.x86_64", "relates_to_product_reference": "7Server-optional-7.3.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.66-21.el7_3.3.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)", "product_id": "7Server-optional-7.3.AUS:dnsmasq-utils-0:2.66-21.el7_3.3.x86_64" }, "product_reference": "dnsmasq-utils-0:2.66-21.el7_3.3.x86_64", "relates_to_product_reference": "7Server-optional-7.3.AUS" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Moshe Kol", "Shlomi Oberman" ], "organization": "JSOF" } ], "cve": "CVE-2020-25684", "cwe": { "id": "CWE-358", "name": "Improperly Implemented Security Check for Standard" }, "discovery_date": "2020-09-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1889686" } ], "notes": [ { "category": "description", "text": "A flaw was found in dnsmasq. When getting a reply from a forwarded query, dnsmasq checks in the forward.c:reply_query() if the reply destination address/port is used by the pending forwarded queries. However, it does not use the address/port to retrieve the exact forwarded query, substantially reducing the number of attempts an attacker on the network would have to perform to forge a reply and get it accepted by dnsmasq. This issue contrasts with RFC5452, which specifies a query\u0027s attributes that all must be used to match a reply. This flaw allows an attacker to perform a DNS Cache Poisoning attack. If chained with CVE-2020-25685 or CVE-2020-25686, the attack complexity of a successful attack is reduced. The highest threat from this vulnerability is to data integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "dnsmasq: loose address/port check in reply_query() makes forging replies easier for an off-path attacker", "title": "Vulnerability summary" }, { "category": "other", "text": "Dnsmasq may be run by libvirt and/or NetworkManager. libvirt uses dnsmasq by default to provide DNS service to its guests. NetworkManager may be configured to use dnsmasq to provide DNS service to the system, if a line `dns=dnsmasq` is present in the `[main]` section of the configuration file /etc/NetworkManager/NetworkManager.conf.\n\nIn Red Hat OpenStack Platform (RHOSP) and Red Hat Virtualization (RHV), the dnsmasq package is provided by the underlying Red Hat Enterprise Linux (RHEL) product. RHOSP and RHV are therefore indirectly affected, so please ensure that the underlying RHEL dnsmasq package is updated.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.3.AUS:dnsmasq-0:2.66-21.el7_3.3.src", "7Server-7.3.AUS:dnsmasq-0:2.66-21.el7_3.3.x86_64", "7Server-7.3.AUS:dnsmasq-debuginfo-0:2.66-21.el7_3.3.x86_64", "7Server-7.3.AUS:dnsmasq-utils-0:2.66-21.el7_3.3.x86_64", "7Server-optional-7.3.AUS:dnsmasq-0:2.66-21.el7_3.3.src", "7Server-optional-7.3.AUS:dnsmasq-0:2.66-21.el7_3.3.x86_64", "7Server-optional-7.3.AUS:dnsmasq-debuginfo-0:2.66-21.el7_3.3.x86_64", "7Server-optional-7.3.AUS:dnsmasq-utils-0:2.66-21.el7_3.3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-25684" }, { "category": "external", "summary": "RHBZ#1889686", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889686" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-25684", "url": "https://www.cve.org/CVERecord?id=CVE-2020-25684" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25684", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25684" }, { "category": "external", "summary": "https://www.jsof-tech.com/disclosures/dnspooq/", "url": "https://www.jsof-tech.com/disclosures/dnspooq/" } ], "release_date": "2021-01-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-7.3.AUS:dnsmasq-0:2.66-21.el7_3.3.src", "7Server-7.3.AUS:dnsmasq-0:2.66-21.el7_3.3.x86_64", "7Server-7.3.AUS:dnsmasq-debuginfo-0:2.66-21.el7_3.3.x86_64", "7Server-7.3.AUS:dnsmasq-utils-0:2.66-21.el7_3.3.x86_64", "7Server-optional-7.3.AUS:dnsmasq-0:2.66-21.el7_3.3.src", "7Server-optional-7.3.AUS:dnsmasq-0:2.66-21.el7_3.3.x86_64", "7Server-optional-7.3.AUS:dnsmasq-debuginfo-0:2.66-21.el7_3.3.x86_64", "7Server-optional-7.3.AUS:dnsmasq-utils-0:2.66-21.el7_3.3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0245" }, { "category": "workaround", "details": "The impact of this flaw can be reduced by disabling the dnsmasq cache by adding `--cache-size=0` when calling dnsmasq or by adding a line with `cache-size=0` to the dnsmasq configuration file (/etc/dnsmasq.conf by default).\n\nWhen using Red Hat Enterprise Linux 8.3 with libvirt through a virt:rhel module, use `virsh net-edit \u003cnetwork-name\u003e` and reference https://libvirt.org/formatnetwork.html#elementsNamespaces to add the suggested option `cache-size=0`. \n\nThere is no way to customize the dnsmasq configuration generated by libvirt, when using versions of Red Hat Enterprise Linux prior to version 8.3. If dnsmasq is being run through NetworkManager, create a new file in /etc/NetworkManager/dnsmasq.d/ and add `cache-size=0` to it.\n\nIn all cases, by disabling the cache, you may experience a performance loss in your environment due to all DNS queries being forwarded to the upstream servers. Please evaluate if the mitigation is appropriate for the system\u2019s environment before applying.", "product_ids": [ "7Server-7.3.AUS:dnsmasq-0:2.66-21.el7_3.3.src", "7Server-7.3.AUS:dnsmasq-0:2.66-21.el7_3.3.x86_64", "7Server-7.3.AUS:dnsmasq-debuginfo-0:2.66-21.el7_3.3.x86_64", "7Server-7.3.AUS:dnsmasq-utils-0:2.66-21.el7_3.3.x86_64", "7Server-optional-7.3.AUS:dnsmasq-0:2.66-21.el7_3.3.src", "7Server-optional-7.3.AUS:dnsmasq-0:2.66-21.el7_3.3.x86_64", "7Server-optional-7.3.AUS:dnsmasq-debuginfo-0:2.66-21.el7_3.3.x86_64", "7Server-optional-7.3.AUS:dnsmasq-utils-0:2.66-21.el7_3.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N", "version": "3.1" }, "products": [ "7Server-7.3.AUS:dnsmasq-0:2.66-21.el7_3.3.src", "7Server-7.3.AUS:dnsmasq-0:2.66-21.el7_3.3.x86_64", "7Server-7.3.AUS:dnsmasq-debuginfo-0:2.66-21.el7_3.3.x86_64", "7Server-7.3.AUS:dnsmasq-utils-0:2.66-21.el7_3.3.x86_64", "7Server-optional-7.3.AUS:dnsmasq-0:2.66-21.el7_3.3.src", "7Server-optional-7.3.AUS:dnsmasq-0:2.66-21.el7_3.3.x86_64", "7Server-optional-7.3.AUS:dnsmasq-debuginfo-0:2.66-21.el7_3.3.x86_64", "7Server-optional-7.3.AUS:dnsmasq-utils-0:2.66-21.el7_3.3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "dnsmasq: loose address/port check in reply_query() makes forging replies easier for an off-path attacker" }, { "acknowledgments": [ { "names": [ "Moshe Kol", "Shlomi Oberman" ], "organization": "JSOF" } ], "cve": "CVE-2020-25685", "cwe": { "id": "CWE-326", "name": "Inadequate Encryption Strength" }, "discovery_date": "2020-09-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1889688" } ], "notes": [ { "category": "description", "text": "A flaw was found in dnsmasq. When getting a reply from a forwarded query, dnsmasq checks in forward.c:reply_query(), which is the forwarded query that matches the reply, by only using a weak hash of the query name. Due to the weak hash (CRC32 when dnsmasq is compiled without DNSSEC, SHA-1 when it is) this flaw allows an off-path attacker to find several different domains all having the same hash, substantially reducing the number of attempts they would have to perform to forge a reply and get it accepted by dnsmasq. This is in contrast with RFC5452, which specifies that the query name is one of the attributes of a query that must be used to match a reply. This flaw could be abused to perform a DNS Cache Poisoning attack. If chained with CVE-2020-25684 the attack complexity of a successful attack is reduced. The highest threat from this vulnerability is to data integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "dnsmasq: loose query name check in reply_query() makes forging replies easier for an off-path attacker", "title": "Vulnerability summary" }, { "category": "other", "text": "Dnsmasq may be run by libvirt and/or NetworkManager. libvirt uses dnsmasq by default to provide DNS service to its guests. NetworkManager may be configured to use dnsmasq to provide DNS service to the system, if a line `dns=dnsmasq` is present in the `[main]` section of the configuration file /etc/NetworkManager/NetworkManager.conf.\n\nIn Red Hat OpenStack Platform (RHOSP) and Red Hat Virtualization (RHV), the dnsmasq package is provided by the underlying Red Hat Enterprise Linux (RHEL) product. RHOSP and RHV are therefore indirectly affected, so please ensure that the underlying RHEL dnsmasq package is updated.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.3.AUS:dnsmasq-0:2.66-21.el7_3.3.src", "7Server-7.3.AUS:dnsmasq-0:2.66-21.el7_3.3.x86_64", "7Server-7.3.AUS:dnsmasq-debuginfo-0:2.66-21.el7_3.3.x86_64", "7Server-7.3.AUS:dnsmasq-utils-0:2.66-21.el7_3.3.x86_64", "7Server-optional-7.3.AUS:dnsmasq-0:2.66-21.el7_3.3.src", "7Server-optional-7.3.AUS:dnsmasq-0:2.66-21.el7_3.3.x86_64", "7Server-optional-7.3.AUS:dnsmasq-debuginfo-0:2.66-21.el7_3.3.x86_64", "7Server-optional-7.3.AUS:dnsmasq-utils-0:2.66-21.el7_3.3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-25685" }, { "category": "external", "summary": "RHBZ#1889688", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889688" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-25685", "url": "https://www.cve.org/CVERecord?id=CVE-2020-25685" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25685", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25685" }, { "category": "external", "summary": "https://www.jsof-tech.com/disclosures/dnspooq/", "url": "https://www.jsof-tech.com/disclosures/dnspooq/" } ], "release_date": "2021-01-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-7.3.AUS:dnsmasq-0:2.66-21.el7_3.3.src", "7Server-7.3.AUS:dnsmasq-0:2.66-21.el7_3.3.x86_64", "7Server-7.3.AUS:dnsmasq-debuginfo-0:2.66-21.el7_3.3.x86_64", "7Server-7.3.AUS:dnsmasq-utils-0:2.66-21.el7_3.3.x86_64", "7Server-optional-7.3.AUS:dnsmasq-0:2.66-21.el7_3.3.src", "7Server-optional-7.3.AUS:dnsmasq-0:2.66-21.el7_3.3.x86_64", "7Server-optional-7.3.AUS:dnsmasq-debuginfo-0:2.66-21.el7_3.3.x86_64", "7Server-optional-7.3.AUS:dnsmasq-utils-0:2.66-21.el7_3.3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0245" }, { "category": "workaround", "details": "The impact of this flaw can be reduced by disabling the dnsmasq cache by adding `--cache-size=0` when calling dnsmasq or by adding a line with `cache-size=0` to the dnsmasq configuration file (/etc/dnsmasq.conf by default). \n\nWhen using Red Hat Enterprise Linux 8.3 with libvirt through a virt:rhel module, use `virsh net-edit \u003cnetwork-name\u003e` and reference https://libvirt.org/formatnetwork.html#elementsNamespaces to add the suggested option `cache-size=0`. \n\nThere is no way to customize the dnsmasq configuration generated by libvirt, when using versions of Red Hat Enterprise Linux prior to version 8.3. If dnsmasq is being run through NetworkManager, create a new file in /etc/NetworkManager/dnsmasq.d/ and add `cache-size=0` to it.\n\nIn all cases, by disabling the cache, you may experience a performance loss in your environment due to all DNS queries being forwarded to the upstream servers. Please evaluate if the mitigation is appropriate for the system\u2019s environment before applying.", "product_ids": [ "7Server-7.3.AUS:dnsmasq-0:2.66-21.el7_3.3.src", "7Server-7.3.AUS:dnsmasq-0:2.66-21.el7_3.3.x86_64", "7Server-7.3.AUS:dnsmasq-debuginfo-0:2.66-21.el7_3.3.x86_64", "7Server-7.3.AUS:dnsmasq-utils-0:2.66-21.el7_3.3.x86_64", "7Server-optional-7.3.AUS:dnsmasq-0:2.66-21.el7_3.3.src", "7Server-optional-7.3.AUS:dnsmasq-0:2.66-21.el7_3.3.x86_64", "7Server-optional-7.3.AUS:dnsmasq-debuginfo-0:2.66-21.el7_3.3.x86_64", "7Server-optional-7.3.AUS:dnsmasq-utils-0:2.66-21.el7_3.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N", "version": "3.1" }, "products": [ "7Server-7.3.AUS:dnsmasq-0:2.66-21.el7_3.3.src", "7Server-7.3.AUS:dnsmasq-0:2.66-21.el7_3.3.x86_64", "7Server-7.3.AUS:dnsmasq-debuginfo-0:2.66-21.el7_3.3.x86_64", "7Server-7.3.AUS:dnsmasq-utils-0:2.66-21.el7_3.3.x86_64", "7Server-optional-7.3.AUS:dnsmasq-0:2.66-21.el7_3.3.src", "7Server-optional-7.3.AUS:dnsmasq-0:2.66-21.el7_3.3.x86_64", "7Server-optional-7.3.AUS:dnsmasq-debuginfo-0:2.66-21.el7_3.3.x86_64", "7Server-optional-7.3.AUS:dnsmasq-utils-0:2.66-21.el7_3.3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "dnsmasq: loose query name check in reply_query() makes forging replies easier for an off-path attacker" }, { "acknowledgments": [ { "names": [ "Moshe Kol", "Shlomi Oberman" ], "organization": "JSOF" } ], "cve": "CVE-2020-25686", "cwe": { "id": "CWE-290", "name": "Authentication Bypass by Spoofing" }, "discovery_date": "2020-09-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1890125" } ], "notes": [ { "category": "description", "text": "A flaw was found in dnsmasq. When receiving a query, dnsmasq does not check for an existing pending request for the same name and forwards a new request. By default, a maximum of 150 pending queries can be sent to upstream servers, so there can be at most 150 queries for the same name. This flaw allows an off-path attacker on the network to substantially reduce the number of attempts that it would have to perform to forge a reply and have it accepted by dnsmasq. This issue is mentioned in the \"Birthday Attacks\" section of RFC5452. If chained with CVE-2020-25684, the attack complexity of a successful attack is reduced. The highest threat from this vulnerability is to data integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "dnsmasq: multiple queries forwarded for the same name makes forging replies easier for an off-path attacker", "title": "Vulnerability summary" }, { "category": "other", "text": "Dnsmasq may be run by libvirt and/or NetworkManager. libvirt uses dnsmasq by default to provide DNS service to its guests. NetworkManager may be configured to use dnsmasq to provide DNS service to the system, if a line `dns=dnsmasq` is present in the `[main]` section of the configuration file /etc/NetworkManager/NetworkManager.conf.\n\nIn Red Hat OpenStack Platform (RHOSP) and Red Hat Virtualization (RHV), the dnsmasq package is provided by the underlying Red Hat Enterprise Linux (RHEL) product. RHOSP and RHV are therefore indirectly affected, so please ensure that the underlying RHEL dnsmasq package is updated.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.3.AUS:dnsmasq-0:2.66-21.el7_3.3.src", "7Server-7.3.AUS:dnsmasq-0:2.66-21.el7_3.3.x86_64", "7Server-7.3.AUS:dnsmasq-debuginfo-0:2.66-21.el7_3.3.x86_64", "7Server-7.3.AUS:dnsmasq-utils-0:2.66-21.el7_3.3.x86_64", "7Server-optional-7.3.AUS:dnsmasq-0:2.66-21.el7_3.3.src", "7Server-optional-7.3.AUS:dnsmasq-0:2.66-21.el7_3.3.x86_64", "7Server-optional-7.3.AUS:dnsmasq-debuginfo-0:2.66-21.el7_3.3.x86_64", "7Server-optional-7.3.AUS:dnsmasq-utils-0:2.66-21.el7_3.3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-25686" }, { "category": "external", "summary": "RHBZ#1890125", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890125" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-25686", "url": "https://www.cve.org/CVERecord?id=CVE-2020-25686" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25686", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25686" }, { "category": "external", "summary": "https://www.jsof-tech.com/disclosures/dnspooq/", "url": "https://www.jsof-tech.com/disclosures/dnspooq/" } ], "release_date": "2021-01-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-7.3.AUS:dnsmasq-0:2.66-21.el7_3.3.src", "7Server-7.3.AUS:dnsmasq-0:2.66-21.el7_3.3.x86_64", "7Server-7.3.AUS:dnsmasq-debuginfo-0:2.66-21.el7_3.3.x86_64", "7Server-7.3.AUS:dnsmasq-utils-0:2.66-21.el7_3.3.x86_64", "7Server-optional-7.3.AUS:dnsmasq-0:2.66-21.el7_3.3.src", "7Server-optional-7.3.AUS:dnsmasq-0:2.66-21.el7_3.3.x86_64", "7Server-optional-7.3.AUS:dnsmasq-debuginfo-0:2.66-21.el7_3.3.x86_64", "7Server-optional-7.3.AUS:dnsmasq-utils-0:2.66-21.el7_3.3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0245" }, { "category": "workaround", "details": "The impact of this flaw can be reduced by disabling the dnsmasq cache by adding `--cache-size=0` when calling dnsmasq or by adding a line with `cache-size=0` to the dnsmasq configuration file (/etc/dnsmasq.conf by default). \n\nWhen using Red Hat Enterprise Linux 8.3 with libvirt through a virt:rhel module, use `virsh net-edit \u003cnetwork-name\u003e` and reference https://libvirt.org/formatnetwork.html#elementsNamespaces to add the suggested option `cache-size=0`. \n\nThere is no way to customize the dnsmasq configuration generated by libvirt, when using versions of Red Hat Enterprise Linux prior to version 8.3. If dnsmasq is being run through NetworkManager, create a new file in /etc/NetworkManager/dnsmasq.d/ and add `cache-size=0` to it.\n\nIn all cases, by disabling the cache, you may experience a performance loss in your environment due to all DNS queries being forwarded to the upstream servers. Please evaluate if the mitigation is appropriate for the system\u2019s environment before applying.", "product_ids": [ "7Server-7.3.AUS:dnsmasq-0:2.66-21.el7_3.3.src", "7Server-7.3.AUS:dnsmasq-0:2.66-21.el7_3.3.x86_64", "7Server-7.3.AUS:dnsmasq-debuginfo-0:2.66-21.el7_3.3.x86_64", "7Server-7.3.AUS:dnsmasq-utils-0:2.66-21.el7_3.3.x86_64", "7Server-optional-7.3.AUS:dnsmasq-0:2.66-21.el7_3.3.src", "7Server-optional-7.3.AUS:dnsmasq-0:2.66-21.el7_3.3.x86_64", "7Server-optional-7.3.AUS:dnsmasq-debuginfo-0:2.66-21.el7_3.3.x86_64", "7Server-optional-7.3.AUS:dnsmasq-utils-0:2.66-21.el7_3.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N", "version": "3.1" }, "products": [ "7Server-7.3.AUS:dnsmasq-0:2.66-21.el7_3.3.src", "7Server-7.3.AUS:dnsmasq-0:2.66-21.el7_3.3.x86_64", "7Server-7.3.AUS:dnsmasq-debuginfo-0:2.66-21.el7_3.3.x86_64", "7Server-7.3.AUS:dnsmasq-utils-0:2.66-21.el7_3.3.x86_64", "7Server-optional-7.3.AUS:dnsmasq-0:2.66-21.el7_3.3.src", "7Server-optional-7.3.AUS:dnsmasq-0:2.66-21.el7_3.3.x86_64", "7Server-optional-7.3.AUS:dnsmasq-debuginfo-0:2.66-21.el7_3.3.x86_64", "7Server-optional-7.3.AUS:dnsmasq-utils-0:2.66-21.el7_3.3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "dnsmasq: multiple queries forwarded for the same name makes forging replies easier for an off-path attacker" } ] }
rhsa-2021_0155
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_vex", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for dnsmasq is now available for Red Hat Enterprise Linux 7.6 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The dnsmasq packages contain Dnsmasq, a lightweight DNS (Domain Name Server) forwarder and DHCP (Dynamic Host Configuration Protocol) server.\n\nSecurity Fix(es):\n\n* dnsmasq: loose address/port check in reply_query() makes forging replies easier for an off-path attacker (CVE-2020-25684)\n\n* dnsmasq: loose query name check in reply_query() makes forging replies easier for an off-path attacker (CVE-2020-25685)\n\n* dnsmasq: multiple queries forwarded for the same name makes forging replies easier for an off-path attacker (CVE-2020-25686)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat offerings.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:0155", "url": "https://access.redhat.com/errata/RHSA-2021:0155" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-001", "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-001" }, { "category": "external", "summary": "1889686", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889686" }, { "category": "external", "summary": "1889688", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889688" }, { "category": "external", "summary": "1890125", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890125" }, { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/data/csaf/v2/advisories/2021/rhsa-2021_0155.json" } ], "title": "Red Hat Security Advisory: dnsmasq security update", "tracking": { "current_release_date": "2024-09-13T18:17:03+00:00", "generator": { "date": "2024-09-13T18:17:03+00:00", "engine": { "name": "Red Hat SDEngine", "version": "3.33.3" } }, "id": "RHSA-2021:0155", "initial_release_date": "2021-01-19T17:41:47+00:00", "revision_history": [ { "date": "2021-01-19T17:41:47+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-01-19T17:41:47+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-09-13T18:17:03+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)", "product": { "name": "Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)", "product_id": "7ComputeNode-7.6.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:7.6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)", "product": { "name": "Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)", "product_id": "7ComputeNode-optional-7.6.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:7.6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server EUS (v. 7.6)", "product": { "name": "Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-7.6.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:7.6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional EUS (v. 7.6)", "product": { "name": "Red Hat Enterprise Linux Server Optional EUS (v. 7.6)", "product_id": "7Server-optional-7.6.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:7.6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product": { "name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.6-EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:7.6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.6-EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:7.6::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "dnsmasq-utils-0:2.76-7.el7_6.2.x86_64", "product": { "name": "dnsmasq-utils-0:2.76-7.el7_6.2.x86_64", "product_id": "dnsmasq-utils-0:2.76-7.el7_6.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-utils@2.76-7.el7_6.2?arch=x86_64" } } }, { "category": "product_version", "name": "dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64", "product": { "name": "dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64", "product_id": "dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-debuginfo@2.76-7.el7_6.2?arch=x86_64" } } }, { "category": "product_version", "name": "dnsmasq-0:2.76-7.el7_6.2.x86_64", "product": { "name": "dnsmasq-0:2.76-7.el7_6.2.x86_64", "product_id": "dnsmasq-0:2.76-7.el7_6.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq@2.76-7.el7_6.2?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le", "product": { "name": "dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le", "product_id": "dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-utils@2.76-7.el7_6.2?arch=ppc64le" } } }, { "category": "product_version", "name": "dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le", "product": { "name": "dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le", "product_id": "dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-debuginfo@2.76-7.el7_6.2?arch=ppc64le" } } }, { "category": "product_version", "name": "dnsmasq-0:2.76-7.el7_6.2.ppc64le", "product": { "name": "dnsmasq-0:2.76-7.el7_6.2.ppc64le", "product_id": "dnsmasq-0:2.76-7.el7_6.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq@2.76-7.el7_6.2?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "dnsmasq-utils-0:2.76-7.el7_6.2.ppc64", "product": { "name": "dnsmasq-utils-0:2.76-7.el7_6.2.ppc64", "product_id": "dnsmasq-utils-0:2.76-7.el7_6.2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-utils@2.76-7.el7_6.2?arch=ppc64" } } }, { "category": "product_version", "name": "dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64", "product": { "name": "dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64", "product_id": "dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-debuginfo@2.76-7.el7_6.2?arch=ppc64" } } }, { "category": "product_version", "name": "dnsmasq-0:2.76-7.el7_6.2.ppc64", "product": { "name": "dnsmasq-0:2.76-7.el7_6.2.ppc64", "product_id": "dnsmasq-0:2.76-7.el7_6.2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq@2.76-7.el7_6.2?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "dnsmasq-utils-0:2.76-7.el7_6.2.s390x", "product": { "name": "dnsmasq-utils-0:2.76-7.el7_6.2.s390x", "product_id": "dnsmasq-utils-0:2.76-7.el7_6.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-utils@2.76-7.el7_6.2?arch=s390x" } } }, { "category": "product_version", "name": "dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x", "product": { "name": "dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x", "product_id": "dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-debuginfo@2.76-7.el7_6.2?arch=s390x" } } }, { "category": "product_version", "name": "dnsmasq-0:2.76-7.el7_6.2.s390x", "product": { "name": "dnsmasq-0:2.76-7.el7_6.2.s390x", "product_id": "dnsmasq-0:2.76-7.el7_6.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq@2.76-7.el7_6.2?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "dnsmasq-0:2.76-7.el7_6.2.src", "product": { "name": "dnsmasq-0:2.76-7.el7_6.2.src", "product_id": "dnsmasq-0:2.76-7.el7_6.2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq@2.76-7.el7_6.2?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-7.el7_6.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)", "product_id": "7ComputeNode-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64" }, "product_reference": "dnsmasq-0:2.76-7.el7_6.2.ppc64", "relates_to_product_reference": "7ComputeNode-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-7.el7_6.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)", "product_id": "7ComputeNode-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64le" }, "product_reference": "dnsmasq-0:2.76-7.el7_6.2.ppc64le", "relates_to_product_reference": "7ComputeNode-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-7.el7_6.2.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)", "product_id": "7ComputeNode-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.s390x" }, "product_reference": "dnsmasq-0:2.76-7.el7_6.2.s390x", "relates_to_product_reference": "7ComputeNode-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-7.el7_6.2.src as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)", "product_id": "7ComputeNode-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.src" }, "product_reference": "dnsmasq-0:2.76-7.el7_6.2.src", "relates_to_product_reference": "7ComputeNode-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-7.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)", "product_id": "7ComputeNode-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.x86_64" }, "product_reference": "dnsmasq-0:2.76-7.el7_6.2.x86_64", "relates_to_product_reference": "7ComputeNode-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)", "product_id": "7ComputeNode-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64" }, "product_reference": "dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64", "relates_to_product_reference": "7ComputeNode-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)", "product_id": "7ComputeNode-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le" }, "product_reference": "dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le", "relates_to_product_reference": "7ComputeNode-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)", "product_id": "7ComputeNode-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x" }, "product_reference": "dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x", "relates_to_product_reference": "7ComputeNode-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)", "product_id": "7ComputeNode-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64" }, "product_reference": "dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64", "relates_to_product_reference": "7ComputeNode-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-7.el7_6.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)", "product_id": "7ComputeNode-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64" }, "product_reference": "dnsmasq-utils-0:2.76-7.el7_6.2.ppc64", "relates_to_product_reference": "7ComputeNode-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)", "product_id": "7ComputeNode-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le" }, "product_reference": "dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le", "relates_to_product_reference": "7ComputeNode-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-7.el7_6.2.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)", "product_id": "7ComputeNode-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.s390x" }, "product_reference": "dnsmasq-utils-0:2.76-7.el7_6.2.s390x", "relates_to_product_reference": "7ComputeNode-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-7.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)", "product_id": "7ComputeNode-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.x86_64" }, "product_reference": "dnsmasq-utils-0:2.76-7.el7_6.2.x86_64", "relates_to_product_reference": "7ComputeNode-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-7.el7_6.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)", "product_id": "7ComputeNode-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64" }, "product_reference": "dnsmasq-0:2.76-7.el7_6.2.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-7.el7_6.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)", "product_id": "7ComputeNode-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64le" }, "product_reference": "dnsmasq-0:2.76-7.el7_6.2.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-7.el7_6.2.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)", "product_id": "7ComputeNode-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.s390x" }, "product_reference": "dnsmasq-0:2.76-7.el7_6.2.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-7.el7_6.2.src as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)", "product_id": "7ComputeNode-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.src" }, "product_reference": "dnsmasq-0:2.76-7.el7_6.2.src", "relates_to_product_reference": "7ComputeNode-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-7.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)", "product_id": "7ComputeNode-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.x86_64" }, "product_reference": "dnsmasq-0:2.76-7.el7_6.2.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)", "product_id": "7ComputeNode-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64" }, "product_reference": "dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)", "product_id": "7ComputeNode-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le" }, "product_reference": "dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)", "product_id": "7ComputeNode-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x" }, "product_reference": "dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)", "product_id": "7ComputeNode-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64" }, "product_reference": "dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-7.el7_6.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)", "product_id": "7ComputeNode-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64" }, "product_reference": "dnsmasq-utils-0:2.76-7.el7_6.2.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)", "product_id": "7ComputeNode-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le" }, "product_reference": "dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-7.el7_6.2.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)", "product_id": "7ComputeNode-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.s390x" }, "product_reference": "dnsmasq-utils-0:2.76-7.el7_6.2.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-7.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)", "product_id": "7ComputeNode-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.x86_64" }, "product_reference": "dnsmasq-utils-0:2.76-7.el7_6.2.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-7.el7_6.2.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64" }, "product_reference": "dnsmasq-0:2.76-7.el7_6.2.ppc64", "relates_to_product_reference": "7Server-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-7.el7_6.2.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64le" }, "product_reference": "dnsmasq-0:2.76-7.el7_6.2.ppc64le", "relates_to_product_reference": "7Server-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-7.el7_6.2.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.s390x" }, "product_reference": "dnsmasq-0:2.76-7.el7_6.2.s390x", "relates_to_product_reference": "7Server-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-7.el7_6.2.src as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.src" }, "product_reference": "dnsmasq-0:2.76-7.el7_6.2.src", "relates_to_product_reference": "7Server-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-7.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.x86_64" }, "product_reference": "dnsmasq-0:2.76-7.el7_6.2.x86_64", "relates_to_product_reference": "7Server-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64" }, "product_reference": "dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64", "relates_to_product_reference": "7Server-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le" }, "product_reference": "dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le", "relates_to_product_reference": "7Server-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x" }, "product_reference": "dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x", "relates_to_product_reference": "7Server-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64" }, "product_reference": "dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64", "relates_to_product_reference": "7Server-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-7.el7_6.2.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64" }, "product_reference": "dnsmasq-utils-0:2.76-7.el7_6.2.ppc64", "relates_to_product_reference": "7Server-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le" }, "product_reference": "dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le", "relates_to_product_reference": "7Server-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-7.el7_6.2.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.s390x" }, "product_reference": "dnsmasq-utils-0:2.76-7.el7_6.2.s390x", "relates_to_product_reference": "7Server-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-7.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.x86_64" }, "product_reference": "dnsmasq-utils-0:2.76-7.el7_6.2.x86_64", "relates_to_product_reference": "7Server-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-7.el7_6.2.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64" }, "product_reference": "dnsmasq-0:2.76-7.el7_6.2.ppc64", "relates_to_product_reference": "7Server-Alt-7.6-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-7.el7_6.2.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64le" }, "product_reference": "dnsmasq-0:2.76-7.el7_6.2.ppc64le", "relates_to_product_reference": "7Server-Alt-7.6-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-7.el7_6.2.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.s390x" }, "product_reference": "dnsmasq-0:2.76-7.el7_6.2.s390x", "relates_to_product_reference": "7Server-Alt-7.6-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-7.el7_6.2.src as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.src" }, "product_reference": "dnsmasq-0:2.76-7.el7_6.2.src", "relates_to_product_reference": "7Server-Alt-7.6-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-7.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.x86_64" }, "product_reference": "dnsmasq-0:2.76-7.el7_6.2.x86_64", "relates_to_product_reference": "7Server-Alt-7.6-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64" }, "product_reference": "dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64", "relates_to_product_reference": "7Server-Alt-7.6-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le" }, "product_reference": "dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le", "relates_to_product_reference": "7Server-Alt-7.6-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x" }, "product_reference": "dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x", "relates_to_product_reference": "7Server-Alt-7.6-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64" }, "product_reference": "dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64", "relates_to_product_reference": "7Server-Alt-7.6-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-7.el7_6.2.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64" }, "product_reference": "dnsmasq-utils-0:2.76-7.el7_6.2.ppc64", "relates_to_product_reference": "7Server-Alt-7.6-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le" }, "product_reference": "dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le", "relates_to_product_reference": "7Server-Alt-7.6-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-7.el7_6.2.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.s390x" }, "product_reference": "dnsmasq-utils-0:2.76-7.el7_6.2.s390x", "relates_to_product_reference": "7Server-Alt-7.6-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-7.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.x86_64" }, "product_reference": "dnsmasq-utils-0:2.76-7.el7_6.2.x86_64", "relates_to_product_reference": "7Server-Alt-7.6-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-7.el7_6.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)", "product_id": "7Server-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64" }, "product_reference": "dnsmasq-0:2.76-7.el7_6.2.ppc64", "relates_to_product_reference": "7Server-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-7.el7_6.2.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)", "product_id": "7Server-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64le" }, "product_reference": "dnsmasq-0:2.76-7.el7_6.2.ppc64le", "relates_to_product_reference": "7Server-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-7.el7_6.2.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)", "product_id": "7Server-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.s390x" }, "product_reference": "dnsmasq-0:2.76-7.el7_6.2.s390x", "relates_to_product_reference": "7Server-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-7.el7_6.2.src as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)", "product_id": "7Server-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.src" }, "product_reference": "dnsmasq-0:2.76-7.el7_6.2.src", "relates_to_product_reference": "7Server-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-7.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)", "product_id": "7Server-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.x86_64" }, "product_reference": "dnsmasq-0:2.76-7.el7_6.2.x86_64", "relates_to_product_reference": "7Server-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)", "product_id": "7Server-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64" }, "product_reference": "dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64", "relates_to_product_reference": "7Server-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)", "product_id": "7Server-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le" }, "product_reference": "dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le", "relates_to_product_reference": "7Server-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)", "product_id": "7Server-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x" }, "product_reference": "dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x", "relates_to_product_reference": "7Server-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)", "product_id": "7Server-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64" }, "product_reference": "dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64", "relates_to_product_reference": "7Server-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-7.el7_6.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)", "product_id": "7Server-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64" }, "product_reference": "dnsmasq-utils-0:2.76-7.el7_6.2.ppc64", "relates_to_product_reference": "7Server-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)", "product_id": "7Server-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le" }, "product_reference": "dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le", "relates_to_product_reference": "7Server-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-7.el7_6.2.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)", "product_id": "7Server-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.s390x" }, "product_reference": "dnsmasq-utils-0:2.76-7.el7_6.2.s390x", "relates_to_product_reference": "7Server-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-7.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)", "product_id": "7Server-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.x86_64" }, "product_reference": "dnsmasq-utils-0:2.76-7.el7_6.2.x86_64", "relates_to_product_reference": "7Server-optional-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-7.el7_6.2.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64" }, "product_reference": "dnsmasq-0:2.76-7.el7_6.2.ppc64", "relates_to_product_reference": "7Server-optional-Alt-7.6-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-7.el7_6.2.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64le" }, "product_reference": "dnsmasq-0:2.76-7.el7_6.2.ppc64le", "relates_to_product_reference": "7Server-optional-Alt-7.6-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-7.el7_6.2.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.s390x" }, "product_reference": "dnsmasq-0:2.76-7.el7_6.2.s390x", "relates_to_product_reference": "7Server-optional-Alt-7.6-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-7.el7_6.2.src as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.src" }, "product_reference": "dnsmasq-0:2.76-7.el7_6.2.src", "relates_to_product_reference": "7Server-optional-Alt-7.6-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-7.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.x86_64" }, "product_reference": "dnsmasq-0:2.76-7.el7_6.2.x86_64", "relates_to_product_reference": "7Server-optional-Alt-7.6-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64" }, "product_reference": "dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64", "relates_to_product_reference": "7Server-optional-Alt-7.6-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le" }, "product_reference": "dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le", "relates_to_product_reference": "7Server-optional-Alt-7.6-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x" }, "product_reference": "dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x", "relates_to_product_reference": "7Server-optional-Alt-7.6-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64" }, "product_reference": "dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64", "relates_to_product_reference": "7Server-optional-Alt-7.6-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-7.el7_6.2.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64" }, "product_reference": "dnsmasq-utils-0:2.76-7.el7_6.2.ppc64", "relates_to_product_reference": "7Server-optional-Alt-7.6-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le" }, "product_reference": "dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le", "relates_to_product_reference": "7Server-optional-Alt-7.6-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-7.el7_6.2.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.s390x" }, "product_reference": "dnsmasq-utils-0:2.76-7.el7_6.2.s390x", "relates_to_product_reference": "7Server-optional-Alt-7.6-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-7.el7_6.2.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.x86_64" }, "product_reference": "dnsmasq-utils-0:2.76-7.el7_6.2.x86_64", "relates_to_product_reference": "7Server-optional-Alt-7.6-EUS" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Moshe Kol", "Shlomi Oberman" ], "organization": "JSOF" } ], "cve": "CVE-2020-25684", "cwe": { "id": "CWE-358", "name": "Improperly Implemented Security Check for Standard" }, "discovery_date": "2020-09-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1889686" } ], "notes": [ { "category": "description", "text": "A flaw was found in dnsmasq. When getting a reply from a forwarded query, dnsmasq checks in the forward.c:reply_query() if the reply destination address/port is used by the pending forwarded queries. However, it does not use the address/port to retrieve the exact forwarded query, substantially reducing the number of attempts an attacker on the network would have to perform to forge a reply and get it accepted by dnsmasq. This issue contrasts with RFC5452, which specifies a query\u0027s attributes that all must be used to match a reply. This flaw allows an attacker to perform a DNS Cache Poisoning attack. If chained with CVE-2020-25685 or CVE-2020-25686, the attack complexity of a successful attack is reduced. The highest threat from this vulnerability is to data integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "dnsmasq: loose address/port check in reply_query() makes forging replies easier for an off-path attacker", "title": "Vulnerability summary" }, { "category": "other", "text": "Dnsmasq may be run by libvirt and/or NetworkManager. libvirt uses dnsmasq by default to provide DNS service to its guests. NetworkManager may be configured to use dnsmasq to provide DNS service to the system, if a line `dns=dnsmasq` is present in the `[main]` section of the configuration file /etc/NetworkManager/NetworkManager.conf.\n\nIn Red Hat OpenStack Platform (RHOSP) and Red Hat Virtualization (RHV), the dnsmasq package is provided by the underlying Red Hat Enterprise Linux (RHEL) product. RHOSP and RHV are therefore indirectly affected, so please ensure that the underlying RHEL dnsmasq package is updated.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7ComputeNode-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64", "7ComputeNode-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64le", "7ComputeNode-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.s390x", "7ComputeNode-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.src", "7ComputeNode-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.x86_64", "7ComputeNode-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64", "7ComputeNode-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le", "7ComputeNode-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x", "7ComputeNode-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64", "7ComputeNode-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64", "7ComputeNode-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le", "7ComputeNode-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.s390x", "7ComputeNode-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.x86_64", "7ComputeNode-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64", "7ComputeNode-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64le", "7ComputeNode-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.s390x", "7ComputeNode-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.src", "7ComputeNode-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.x86_64", "7ComputeNode-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64", "7ComputeNode-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le", "7ComputeNode-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x", "7ComputeNode-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64", "7ComputeNode-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64", "7ComputeNode-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le", "7ComputeNode-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.s390x", "7ComputeNode-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.x86_64", "7Server-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64", "7Server-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64le", "7Server-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.s390x", "7Server-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.src", "7Server-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.x86_64", "7Server-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64", "7Server-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le", "7Server-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x", "7Server-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64", "7Server-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64", "7Server-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le", "7Server-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.s390x", "7Server-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.x86_64", "7Server-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64", "7Server-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64le", "7Server-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.s390x", "7Server-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.src", "7Server-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.x86_64", "7Server-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64", "7Server-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le", "7Server-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x", "7Server-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64", "7Server-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64", "7Server-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le", "7Server-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.s390x", "7Server-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.x86_64", "7Server-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64", "7Server-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64le", "7Server-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.s390x", "7Server-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.src", "7Server-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.x86_64", "7Server-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64", "7Server-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le", "7Server-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x", "7Server-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64", "7Server-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64", "7Server-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le", "7Server-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.s390x", "7Server-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.x86_64", "7Server-optional-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64", "7Server-optional-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64le", "7Server-optional-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.s390x", "7Server-optional-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.src", "7Server-optional-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.x86_64", "7Server-optional-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64", "7Server-optional-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le", "7Server-optional-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x", "7Server-optional-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64", "7Server-optional-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64", "7Server-optional-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le", "7Server-optional-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.s390x", "7Server-optional-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-25684" }, { "category": "external", "summary": "RHBZ#1889686", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889686" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-25684", "url": "https://www.cve.org/CVERecord?id=CVE-2020-25684" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25684", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25684" }, { "category": "external", "summary": "https://www.jsof-tech.com/disclosures/dnspooq/", "url": "https://www.jsof-tech.com/disclosures/dnspooq/" } ], "release_date": "2021-01-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7ComputeNode-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64", "7ComputeNode-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64le", "7ComputeNode-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.s390x", "7ComputeNode-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.src", "7ComputeNode-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.x86_64", "7ComputeNode-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64", "7ComputeNode-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le", "7ComputeNode-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x", "7ComputeNode-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64", "7ComputeNode-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64", "7ComputeNode-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le", "7ComputeNode-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.s390x", "7ComputeNode-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.x86_64", "7ComputeNode-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64", "7ComputeNode-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64le", "7ComputeNode-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.s390x", "7ComputeNode-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.src", "7ComputeNode-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.x86_64", "7ComputeNode-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64", "7ComputeNode-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le", "7ComputeNode-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x", "7ComputeNode-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64", "7ComputeNode-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64", "7ComputeNode-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le", "7ComputeNode-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.s390x", "7ComputeNode-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.x86_64", "7Server-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64", "7Server-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64le", "7Server-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.s390x", "7Server-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.src", "7Server-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.x86_64", "7Server-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64", "7Server-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le", "7Server-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x", "7Server-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64", "7Server-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64", "7Server-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le", "7Server-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.s390x", "7Server-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.x86_64", "7Server-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64", "7Server-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64le", "7Server-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.s390x", "7Server-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.src", "7Server-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.x86_64", "7Server-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64", "7Server-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le", "7Server-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x", "7Server-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64", "7Server-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64", "7Server-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le", "7Server-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.s390x", "7Server-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.x86_64", "7Server-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64", "7Server-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64le", "7Server-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.s390x", "7Server-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.src", "7Server-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.x86_64", "7Server-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64", "7Server-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le", "7Server-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x", "7Server-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64", "7Server-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64", "7Server-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le", "7Server-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.s390x", "7Server-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.x86_64", "7Server-optional-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64", "7Server-optional-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64le", "7Server-optional-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.s390x", "7Server-optional-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.src", "7Server-optional-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.x86_64", "7Server-optional-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64", "7Server-optional-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le", "7Server-optional-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x", "7Server-optional-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64", "7Server-optional-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64", "7Server-optional-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le", "7Server-optional-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.s390x", "7Server-optional-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0155" }, { "category": "workaround", "details": "The impact of this flaw can be reduced by disabling the dnsmasq cache by adding `--cache-size=0` when calling dnsmasq or by adding a line with `cache-size=0` to the dnsmasq configuration file (/etc/dnsmasq.conf by default).\n\nWhen using Red Hat Enterprise Linux 8.3 with libvirt through a virt:rhel module, use `virsh net-edit \u003cnetwork-name\u003e` and reference https://libvirt.org/formatnetwork.html#elementsNamespaces to add the suggested option `cache-size=0`. \n\nThere is no way to customize the dnsmasq configuration generated by libvirt, when using versions of Red Hat Enterprise Linux prior to version 8.3. If dnsmasq is being run through NetworkManager, create a new file in /etc/NetworkManager/dnsmasq.d/ and add `cache-size=0` to it.\n\nIn all cases, by disabling the cache, you may experience a performance loss in your environment due to all DNS queries being forwarded to the upstream servers. Please evaluate if the mitigation is appropriate for the system\u2019s environment before applying.", "product_ids": [ "7ComputeNode-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64", "7ComputeNode-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64le", "7ComputeNode-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.s390x", "7ComputeNode-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.src", "7ComputeNode-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.x86_64", "7ComputeNode-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64", "7ComputeNode-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le", "7ComputeNode-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x", "7ComputeNode-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64", "7ComputeNode-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64", "7ComputeNode-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le", "7ComputeNode-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.s390x", "7ComputeNode-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.x86_64", "7ComputeNode-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64", "7ComputeNode-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64le", "7ComputeNode-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.s390x", "7ComputeNode-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.src", "7ComputeNode-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.x86_64", "7ComputeNode-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64", "7ComputeNode-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le", "7ComputeNode-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x", "7ComputeNode-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64", "7ComputeNode-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64", "7ComputeNode-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le", "7ComputeNode-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.s390x", "7ComputeNode-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.x86_64", "7Server-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64", "7Server-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64le", "7Server-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.s390x", "7Server-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.src", "7Server-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.x86_64", "7Server-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64", "7Server-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le", "7Server-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x", "7Server-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64", "7Server-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64", "7Server-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le", "7Server-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.s390x", "7Server-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.x86_64", "7Server-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64", "7Server-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64le", "7Server-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.s390x", "7Server-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.src", "7Server-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.x86_64", "7Server-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64", "7Server-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le", "7Server-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x", "7Server-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64", "7Server-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64", "7Server-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le", "7Server-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.s390x", "7Server-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.x86_64", "7Server-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64", "7Server-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64le", "7Server-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.s390x", "7Server-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.src", "7Server-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.x86_64", "7Server-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64", "7Server-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le", "7Server-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x", "7Server-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64", "7Server-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64", "7Server-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le", "7Server-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.s390x", "7Server-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.x86_64", "7Server-optional-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64", "7Server-optional-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64le", "7Server-optional-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.s390x", "7Server-optional-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.src", "7Server-optional-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.x86_64", "7Server-optional-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64", "7Server-optional-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le", "7Server-optional-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x", "7Server-optional-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64", "7Server-optional-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64", "7Server-optional-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le", "7Server-optional-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.s390x", "7Server-optional-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N", "version": "3.1" }, "products": [ "7ComputeNode-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64", "7ComputeNode-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64le", "7ComputeNode-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.s390x", "7ComputeNode-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.src", "7ComputeNode-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.x86_64", "7ComputeNode-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64", "7ComputeNode-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le", "7ComputeNode-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x", "7ComputeNode-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64", "7ComputeNode-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64", "7ComputeNode-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le", "7ComputeNode-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.s390x", "7ComputeNode-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.x86_64", "7ComputeNode-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64", "7ComputeNode-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64le", "7ComputeNode-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.s390x", "7ComputeNode-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.src", "7ComputeNode-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.x86_64", "7ComputeNode-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64", "7ComputeNode-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le", "7ComputeNode-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x", "7ComputeNode-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64", "7ComputeNode-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64", "7ComputeNode-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le", "7ComputeNode-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.s390x", "7ComputeNode-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.x86_64", "7Server-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64", "7Server-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64le", "7Server-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.s390x", "7Server-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.src", "7Server-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.x86_64", "7Server-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64", "7Server-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le", "7Server-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x", "7Server-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64", "7Server-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64", "7Server-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le", "7Server-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.s390x", "7Server-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.x86_64", "7Server-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64", "7Server-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64le", "7Server-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.s390x", "7Server-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.src", "7Server-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.x86_64", "7Server-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64", "7Server-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le", "7Server-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x", "7Server-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64", "7Server-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64", "7Server-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le", "7Server-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.s390x", "7Server-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.x86_64", "7Server-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64", "7Server-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64le", "7Server-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.s390x", "7Server-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.src", "7Server-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.x86_64", "7Server-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64", "7Server-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le", "7Server-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x", "7Server-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64", "7Server-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64", "7Server-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le", "7Server-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.s390x", "7Server-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.x86_64", "7Server-optional-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64", "7Server-optional-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64le", "7Server-optional-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.s390x", "7Server-optional-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.src", "7Server-optional-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.x86_64", "7Server-optional-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64", "7Server-optional-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le", "7Server-optional-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x", "7Server-optional-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64", "7Server-optional-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64", "7Server-optional-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le", "7Server-optional-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.s390x", "7Server-optional-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "dnsmasq: loose address/port check in reply_query() makes forging replies easier for an off-path attacker" }, { "acknowledgments": [ { "names": [ "Moshe Kol", "Shlomi Oberman" ], "organization": "JSOF" } ], "cve": "CVE-2020-25685", "cwe": { "id": "CWE-326", "name": "Inadequate Encryption Strength" }, "discovery_date": "2020-09-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1889688" } ], "notes": [ { "category": "description", "text": "A flaw was found in dnsmasq. When getting a reply from a forwarded query, dnsmasq checks in forward.c:reply_query(), which is the forwarded query that matches the reply, by only using a weak hash of the query name. Due to the weak hash (CRC32 when dnsmasq is compiled without DNSSEC, SHA-1 when it is) this flaw allows an off-path attacker to find several different domains all having the same hash, substantially reducing the number of attempts they would have to perform to forge a reply and get it accepted by dnsmasq. This is in contrast with RFC5452, which specifies that the query name is one of the attributes of a query that must be used to match a reply. This flaw could be abused to perform a DNS Cache Poisoning attack. If chained with CVE-2020-25684 the attack complexity of a successful attack is reduced. The highest threat from this vulnerability is to data integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "dnsmasq: loose query name check in reply_query() makes forging replies easier for an off-path attacker", "title": "Vulnerability summary" }, { "category": "other", "text": "Dnsmasq may be run by libvirt and/or NetworkManager. libvirt uses dnsmasq by default to provide DNS service to its guests. NetworkManager may be configured to use dnsmasq to provide DNS service to the system, if a line `dns=dnsmasq` is present in the `[main]` section of the configuration file /etc/NetworkManager/NetworkManager.conf.\n\nIn Red Hat OpenStack Platform (RHOSP) and Red Hat Virtualization (RHV), the dnsmasq package is provided by the underlying Red Hat Enterprise Linux (RHEL) product. RHOSP and RHV are therefore indirectly affected, so please ensure that the underlying RHEL dnsmasq package is updated.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7ComputeNode-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64", "7ComputeNode-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64le", "7ComputeNode-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.s390x", "7ComputeNode-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.src", "7ComputeNode-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.x86_64", "7ComputeNode-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64", "7ComputeNode-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le", "7ComputeNode-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x", "7ComputeNode-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64", "7ComputeNode-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64", "7ComputeNode-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le", "7ComputeNode-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.s390x", "7ComputeNode-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.x86_64", "7ComputeNode-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64", "7ComputeNode-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64le", "7ComputeNode-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.s390x", "7ComputeNode-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.src", "7ComputeNode-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.x86_64", "7ComputeNode-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64", "7ComputeNode-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le", "7ComputeNode-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x", "7ComputeNode-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64", "7ComputeNode-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64", "7ComputeNode-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le", "7ComputeNode-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.s390x", "7ComputeNode-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.x86_64", "7Server-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64", "7Server-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64le", "7Server-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.s390x", "7Server-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.src", "7Server-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.x86_64", "7Server-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64", "7Server-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le", "7Server-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x", "7Server-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64", "7Server-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64", "7Server-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le", "7Server-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.s390x", "7Server-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.x86_64", "7Server-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64", "7Server-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64le", "7Server-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.s390x", "7Server-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.src", "7Server-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.x86_64", "7Server-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64", "7Server-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le", "7Server-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x", "7Server-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64", "7Server-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64", "7Server-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le", "7Server-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.s390x", "7Server-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.x86_64", "7Server-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64", "7Server-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64le", "7Server-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.s390x", "7Server-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.src", "7Server-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.x86_64", "7Server-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64", "7Server-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le", "7Server-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x", "7Server-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64", "7Server-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64", "7Server-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le", "7Server-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.s390x", "7Server-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.x86_64", "7Server-optional-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64", "7Server-optional-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64le", "7Server-optional-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.s390x", "7Server-optional-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.src", "7Server-optional-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.x86_64", "7Server-optional-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64", "7Server-optional-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le", "7Server-optional-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x", "7Server-optional-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64", "7Server-optional-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64", "7Server-optional-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le", "7Server-optional-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.s390x", "7Server-optional-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-25685" }, { "category": "external", "summary": "RHBZ#1889688", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889688" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-25685", "url": "https://www.cve.org/CVERecord?id=CVE-2020-25685" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25685", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25685" }, { "category": "external", "summary": "https://www.jsof-tech.com/disclosures/dnspooq/", "url": "https://www.jsof-tech.com/disclosures/dnspooq/" } ], "release_date": "2021-01-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7ComputeNode-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64", "7ComputeNode-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64le", "7ComputeNode-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.s390x", "7ComputeNode-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.src", "7ComputeNode-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.x86_64", "7ComputeNode-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64", "7ComputeNode-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le", "7ComputeNode-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x", "7ComputeNode-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64", "7ComputeNode-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64", "7ComputeNode-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le", "7ComputeNode-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.s390x", "7ComputeNode-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.x86_64", "7ComputeNode-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64", "7ComputeNode-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64le", "7ComputeNode-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.s390x", "7ComputeNode-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.src", "7ComputeNode-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.x86_64", "7ComputeNode-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64", "7ComputeNode-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le", "7ComputeNode-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x", "7ComputeNode-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64", "7ComputeNode-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64", "7ComputeNode-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le", "7ComputeNode-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.s390x", "7ComputeNode-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.x86_64", "7Server-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64", "7Server-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64le", "7Server-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.s390x", "7Server-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.src", "7Server-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.x86_64", "7Server-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64", "7Server-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le", "7Server-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x", "7Server-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64", "7Server-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64", "7Server-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le", "7Server-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.s390x", "7Server-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.x86_64", "7Server-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64", "7Server-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64le", "7Server-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.s390x", "7Server-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.src", "7Server-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.x86_64", "7Server-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64", "7Server-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le", "7Server-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x", "7Server-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64", "7Server-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64", "7Server-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le", "7Server-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.s390x", "7Server-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.x86_64", "7Server-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64", "7Server-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64le", "7Server-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.s390x", "7Server-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.src", "7Server-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.x86_64", "7Server-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64", "7Server-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le", "7Server-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x", "7Server-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64", "7Server-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64", "7Server-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le", "7Server-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.s390x", "7Server-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.x86_64", "7Server-optional-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64", "7Server-optional-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64le", "7Server-optional-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.s390x", "7Server-optional-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.src", "7Server-optional-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.x86_64", "7Server-optional-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64", "7Server-optional-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le", "7Server-optional-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x", "7Server-optional-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64", "7Server-optional-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64", "7Server-optional-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le", "7Server-optional-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.s390x", "7Server-optional-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0155" }, { "category": "workaround", "details": "The impact of this flaw can be reduced by disabling the dnsmasq cache by adding `--cache-size=0` when calling dnsmasq or by adding a line with `cache-size=0` to the dnsmasq configuration file (/etc/dnsmasq.conf by default). \n\nWhen using Red Hat Enterprise Linux 8.3 with libvirt through a virt:rhel module, use `virsh net-edit \u003cnetwork-name\u003e` and reference https://libvirt.org/formatnetwork.html#elementsNamespaces to add the suggested option `cache-size=0`. \n\nThere is no way to customize the dnsmasq configuration generated by libvirt, when using versions of Red Hat Enterprise Linux prior to version 8.3. If dnsmasq is being run through NetworkManager, create a new file in /etc/NetworkManager/dnsmasq.d/ and add `cache-size=0` to it.\n\nIn all cases, by disabling the cache, you may experience a performance loss in your environment due to all DNS queries being forwarded to the upstream servers. Please evaluate if the mitigation is appropriate for the system\u2019s environment before applying.", "product_ids": [ "7ComputeNode-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64", "7ComputeNode-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64le", "7ComputeNode-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.s390x", "7ComputeNode-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.src", "7ComputeNode-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.x86_64", "7ComputeNode-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64", "7ComputeNode-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le", "7ComputeNode-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x", "7ComputeNode-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64", "7ComputeNode-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64", "7ComputeNode-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le", "7ComputeNode-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.s390x", "7ComputeNode-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.x86_64", "7ComputeNode-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64", "7ComputeNode-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64le", "7ComputeNode-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.s390x", "7ComputeNode-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.src", "7ComputeNode-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.x86_64", "7ComputeNode-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64", "7ComputeNode-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le", "7ComputeNode-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x", "7ComputeNode-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64", "7ComputeNode-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64", "7ComputeNode-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le", "7ComputeNode-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.s390x", "7ComputeNode-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.x86_64", "7Server-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64", "7Server-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64le", "7Server-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.s390x", "7Server-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.src", "7Server-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.x86_64", "7Server-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64", "7Server-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le", "7Server-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x", "7Server-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64", "7Server-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64", "7Server-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le", "7Server-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.s390x", "7Server-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.x86_64", "7Server-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64", "7Server-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64le", "7Server-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.s390x", "7Server-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.src", "7Server-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.x86_64", "7Server-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64", "7Server-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le", "7Server-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x", "7Server-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64", "7Server-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64", "7Server-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le", "7Server-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.s390x", "7Server-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.x86_64", "7Server-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64", "7Server-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64le", "7Server-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.s390x", "7Server-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.src", "7Server-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.x86_64", "7Server-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64", "7Server-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le", "7Server-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x", "7Server-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64", "7Server-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64", "7Server-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le", "7Server-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.s390x", "7Server-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.x86_64", "7Server-optional-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64", "7Server-optional-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64le", "7Server-optional-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.s390x", "7Server-optional-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.src", "7Server-optional-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.x86_64", "7Server-optional-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64", "7Server-optional-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le", "7Server-optional-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x", "7Server-optional-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64", "7Server-optional-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64", "7Server-optional-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le", "7Server-optional-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.s390x", "7Server-optional-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N", "version": "3.1" }, "products": [ "7ComputeNode-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64", "7ComputeNode-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64le", "7ComputeNode-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.s390x", "7ComputeNode-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.src", "7ComputeNode-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.x86_64", "7ComputeNode-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64", "7ComputeNode-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le", "7ComputeNode-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x", "7ComputeNode-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64", "7ComputeNode-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64", "7ComputeNode-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le", "7ComputeNode-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.s390x", "7ComputeNode-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.x86_64", "7ComputeNode-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64", "7ComputeNode-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64le", "7ComputeNode-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.s390x", "7ComputeNode-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.src", "7ComputeNode-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.x86_64", "7ComputeNode-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64", "7ComputeNode-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le", "7ComputeNode-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x", "7ComputeNode-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64", "7ComputeNode-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64", "7ComputeNode-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le", "7ComputeNode-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.s390x", "7ComputeNode-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.x86_64", "7Server-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64", "7Server-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64le", "7Server-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.s390x", "7Server-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.src", "7Server-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.x86_64", "7Server-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64", "7Server-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le", "7Server-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x", "7Server-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64", "7Server-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64", "7Server-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le", "7Server-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.s390x", "7Server-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.x86_64", "7Server-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64", "7Server-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64le", "7Server-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.s390x", "7Server-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.src", "7Server-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.x86_64", "7Server-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64", "7Server-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le", "7Server-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x", "7Server-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64", "7Server-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64", "7Server-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le", "7Server-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.s390x", "7Server-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.x86_64", "7Server-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64", "7Server-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64le", "7Server-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.s390x", "7Server-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.src", "7Server-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.x86_64", "7Server-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64", "7Server-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le", "7Server-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x", "7Server-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64", "7Server-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64", "7Server-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le", "7Server-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.s390x", "7Server-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.x86_64", "7Server-optional-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64", "7Server-optional-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64le", "7Server-optional-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.s390x", "7Server-optional-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.src", "7Server-optional-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.x86_64", "7Server-optional-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64", "7Server-optional-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le", "7Server-optional-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x", "7Server-optional-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64", "7Server-optional-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64", "7Server-optional-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le", "7Server-optional-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.s390x", "7Server-optional-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "dnsmasq: loose query name check in reply_query() makes forging replies easier for an off-path attacker" }, { "acknowledgments": [ { "names": [ "Moshe Kol", "Shlomi Oberman" ], "organization": "JSOF" } ], "cve": "CVE-2020-25686", "cwe": { "id": "CWE-290", "name": "Authentication Bypass by Spoofing" }, "discovery_date": "2020-09-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1890125" } ], "notes": [ { "category": "description", "text": "A flaw was found in dnsmasq. When receiving a query, dnsmasq does not check for an existing pending request for the same name and forwards a new request. By default, a maximum of 150 pending queries can be sent to upstream servers, so there can be at most 150 queries for the same name. This flaw allows an off-path attacker on the network to substantially reduce the number of attempts that it would have to perform to forge a reply and have it accepted by dnsmasq. This issue is mentioned in the \"Birthday Attacks\" section of RFC5452. If chained with CVE-2020-25684, the attack complexity of a successful attack is reduced. The highest threat from this vulnerability is to data integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "dnsmasq: multiple queries forwarded for the same name makes forging replies easier for an off-path attacker", "title": "Vulnerability summary" }, { "category": "other", "text": "Dnsmasq may be run by libvirt and/or NetworkManager. libvirt uses dnsmasq by default to provide DNS service to its guests. NetworkManager may be configured to use dnsmasq to provide DNS service to the system, if a line `dns=dnsmasq` is present in the `[main]` section of the configuration file /etc/NetworkManager/NetworkManager.conf.\n\nIn Red Hat OpenStack Platform (RHOSP) and Red Hat Virtualization (RHV), the dnsmasq package is provided by the underlying Red Hat Enterprise Linux (RHEL) product. RHOSP and RHV are therefore indirectly affected, so please ensure that the underlying RHEL dnsmasq package is updated.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7ComputeNode-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64", "7ComputeNode-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64le", "7ComputeNode-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.s390x", "7ComputeNode-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.src", "7ComputeNode-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.x86_64", "7ComputeNode-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64", "7ComputeNode-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le", "7ComputeNode-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x", "7ComputeNode-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64", "7ComputeNode-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64", "7ComputeNode-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le", "7ComputeNode-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.s390x", "7ComputeNode-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.x86_64", "7ComputeNode-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64", "7ComputeNode-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64le", "7ComputeNode-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.s390x", "7ComputeNode-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.src", "7ComputeNode-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.x86_64", "7ComputeNode-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64", "7ComputeNode-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le", "7ComputeNode-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x", "7ComputeNode-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64", "7ComputeNode-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64", "7ComputeNode-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le", "7ComputeNode-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.s390x", "7ComputeNode-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.x86_64", "7Server-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64", "7Server-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64le", "7Server-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.s390x", "7Server-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.src", "7Server-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.x86_64", "7Server-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64", "7Server-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le", "7Server-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x", "7Server-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64", "7Server-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64", "7Server-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le", "7Server-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.s390x", "7Server-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.x86_64", "7Server-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64", "7Server-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64le", "7Server-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.s390x", "7Server-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.src", "7Server-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.x86_64", "7Server-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64", "7Server-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le", "7Server-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x", "7Server-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64", "7Server-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64", "7Server-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le", "7Server-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.s390x", "7Server-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.x86_64", "7Server-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64", "7Server-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64le", "7Server-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.s390x", "7Server-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.src", "7Server-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.x86_64", "7Server-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64", "7Server-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le", "7Server-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x", "7Server-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64", "7Server-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64", "7Server-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le", "7Server-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.s390x", "7Server-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.x86_64", "7Server-optional-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64", "7Server-optional-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64le", "7Server-optional-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.s390x", "7Server-optional-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.src", "7Server-optional-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.x86_64", "7Server-optional-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64", "7Server-optional-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le", "7Server-optional-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x", "7Server-optional-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64", "7Server-optional-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64", "7Server-optional-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le", "7Server-optional-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.s390x", "7Server-optional-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-25686" }, { "category": "external", "summary": "RHBZ#1890125", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890125" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-25686", "url": "https://www.cve.org/CVERecord?id=CVE-2020-25686" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25686", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25686" }, { "category": "external", "summary": "https://www.jsof-tech.com/disclosures/dnspooq/", "url": "https://www.jsof-tech.com/disclosures/dnspooq/" } ], "release_date": "2021-01-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7ComputeNode-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64", "7ComputeNode-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64le", "7ComputeNode-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.s390x", "7ComputeNode-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.src", "7ComputeNode-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.x86_64", "7ComputeNode-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64", "7ComputeNode-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le", "7ComputeNode-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x", "7ComputeNode-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64", "7ComputeNode-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64", "7ComputeNode-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le", "7ComputeNode-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.s390x", "7ComputeNode-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.x86_64", "7ComputeNode-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64", "7ComputeNode-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64le", "7ComputeNode-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.s390x", "7ComputeNode-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.src", "7ComputeNode-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.x86_64", "7ComputeNode-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64", "7ComputeNode-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le", "7ComputeNode-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x", "7ComputeNode-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64", "7ComputeNode-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64", "7ComputeNode-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le", "7ComputeNode-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.s390x", "7ComputeNode-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.x86_64", "7Server-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64", "7Server-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64le", "7Server-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.s390x", "7Server-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.src", "7Server-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.x86_64", "7Server-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64", "7Server-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le", "7Server-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x", "7Server-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64", "7Server-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64", "7Server-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le", "7Server-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.s390x", "7Server-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.x86_64", "7Server-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64", "7Server-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64le", "7Server-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.s390x", "7Server-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.src", "7Server-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.x86_64", "7Server-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64", "7Server-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le", "7Server-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x", "7Server-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64", "7Server-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64", "7Server-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le", "7Server-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.s390x", "7Server-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.x86_64", "7Server-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64", "7Server-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64le", "7Server-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.s390x", "7Server-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.src", "7Server-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.x86_64", "7Server-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64", "7Server-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le", "7Server-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x", "7Server-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64", "7Server-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64", "7Server-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le", "7Server-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.s390x", "7Server-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.x86_64", "7Server-optional-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64", "7Server-optional-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64le", "7Server-optional-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.s390x", "7Server-optional-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.src", "7Server-optional-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.x86_64", "7Server-optional-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64", "7Server-optional-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le", "7Server-optional-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x", "7Server-optional-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64", "7Server-optional-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64", "7Server-optional-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le", "7Server-optional-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.s390x", "7Server-optional-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0155" }, { "category": "workaround", "details": "The impact of this flaw can be reduced by disabling the dnsmasq cache by adding `--cache-size=0` when calling dnsmasq or by adding a line with `cache-size=0` to the dnsmasq configuration file (/etc/dnsmasq.conf by default). \n\nWhen using Red Hat Enterprise Linux 8.3 with libvirt through a virt:rhel module, use `virsh net-edit \u003cnetwork-name\u003e` and reference https://libvirt.org/formatnetwork.html#elementsNamespaces to add the suggested option `cache-size=0`. \n\nThere is no way to customize the dnsmasq configuration generated by libvirt, when using versions of Red Hat Enterprise Linux prior to version 8.3. If dnsmasq is being run through NetworkManager, create a new file in /etc/NetworkManager/dnsmasq.d/ and add `cache-size=0` to it.\n\nIn all cases, by disabling the cache, you may experience a performance loss in your environment due to all DNS queries being forwarded to the upstream servers. Please evaluate if the mitigation is appropriate for the system\u2019s environment before applying.", "product_ids": [ "7ComputeNode-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64", "7ComputeNode-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64le", "7ComputeNode-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.s390x", "7ComputeNode-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.src", "7ComputeNode-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.x86_64", "7ComputeNode-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64", "7ComputeNode-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le", "7ComputeNode-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x", "7ComputeNode-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64", "7ComputeNode-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64", "7ComputeNode-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le", "7ComputeNode-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.s390x", "7ComputeNode-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.x86_64", "7ComputeNode-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64", "7ComputeNode-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64le", "7ComputeNode-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.s390x", "7ComputeNode-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.src", "7ComputeNode-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.x86_64", "7ComputeNode-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64", "7ComputeNode-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le", "7ComputeNode-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x", "7ComputeNode-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64", "7ComputeNode-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64", "7ComputeNode-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le", "7ComputeNode-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.s390x", "7ComputeNode-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.x86_64", "7Server-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64", "7Server-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64le", "7Server-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.s390x", "7Server-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.src", "7Server-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.x86_64", "7Server-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64", "7Server-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le", "7Server-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x", "7Server-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64", "7Server-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64", "7Server-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le", "7Server-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.s390x", "7Server-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.x86_64", "7Server-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64", "7Server-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64le", "7Server-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.s390x", "7Server-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.src", "7Server-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.x86_64", "7Server-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64", "7Server-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le", "7Server-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x", "7Server-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64", "7Server-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64", "7Server-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le", "7Server-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.s390x", "7Server-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.x86_64", "7Server-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64", "7Server-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64le", "7Server-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.s390x", "7Server-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.src", "7Server-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.x86_64", "7Server-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64", "7Server-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le", "7Server-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x", "7Server-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64", "7Server-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64", "7Server-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le", "7Server-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.s390x", "7Server-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.x86_64", "7Server-optional-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64", "7Server-optional-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64le", "7Server-optional-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.s390x", "7Server-optional-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.src", "7Server-optional-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.x86_64", "7Server-optional-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64", "7Server-optional-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le", "7Server-optional-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x", "7Server-optional-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64", "7Server-optional-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64", "7Server-optional-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le", "7Server-optional-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.s390x", "7Server-optional-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N", "version": "3.1" }, "products": [ "7ComputeNode-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64", "7ComputeNode-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64le", "7ComputeNode-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.s390x", "7ComputeNode-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.src", "7ComputeNode-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.x86_64", "7ComputeNode-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64", "7ComputeNode-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le", "7ComputeNode-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x", "7ComputeNode-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64", "7ComputeNode-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64", "7ComputeNode-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le", "7ComputeNode-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.s390x", "7ComputeNode-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.x86_64", "7ComputeNode-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64", "7ComputeNode-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64le", "7ComputeNode-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.s390x", "7ComputeNode-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.src", "7ComputeNode-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.x86_64", "7ComputeNode-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64", "7ComputeNode-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le", "7ComputeNode-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x", "7ComputeNode-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64", "7ComputeNode-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64", "7ComputeNode-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le", "7ComputeNode-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.s390x", "7ComputeNode-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.x86_64", "7Server-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64", "7Server-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64le", "7Server-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.s390x", "7Server-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.src", "7Server-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.x86_64", "7Server-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64", "7Server-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le", "7Server-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x", "7Server-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64", "7Server-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64", "7Server-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le", "7Server-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.s390x", "7Server-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.x86_64", "7Server-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64", "7Server-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64le", "7Server-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.s390x", "7Server-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.src", "7Server-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.x86_64", "7Server-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64", "7Server-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le", "7Server-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x", "7Server-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64", "7Server-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64", "7Server-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le", "7Server-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.s390x", "7Server-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.x86_64", "7Server-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64", "7Server-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64le", "7Server-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.s390x", "7Server-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.src", "7Server-optional-7.6.EUS:dnsmasq-0:2.76-7.el7_6.2.x86_64", "7Server-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64", "7Server-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le", "7Server-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x", "7Server-optional-7.6.EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64", "7Server-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64", "7Server-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le", "7Server-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.s390x", "7Server-optional-7.6.EUS:dnsmasq-utils-0:2.76-7.el7_6.2.x86_64", "7Server-optional-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64", "7Server-optional-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.ppc64le", "7Server-optional-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.s390x", "7Server-optional-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.src", "7Server-optional-Alt-7.6-EUS:dnsmasq-0:2.76-7.el7_6.2.x86_64", "7Server-optional-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64", "7Server-optional-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.ppc64le", "7Server-optional-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.s390x", "7Server-optional-Alt-7.6-EUS:dnsmasq-debuginfo-0:2.76-7.el7_6.2.x86_64", "7Server-optional-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64", "7Server-optional-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.ppc64le", "7Server-optional-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.s390x", "7Server-optional-Alt-7.6-EUS:dnsmasq-utils-0:2.76-7.el7_6.2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "dnsmasq: multiple queries forwarded for the same name makes forging replies easier for an off-path attacker" } ] }
rhsa-2021_0156
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_vex", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for dnsmasq is now available for Red Hat Enterprise Linux 7.4 Advanced Update Support, Red Hat Enterprise Linux 7.4 Telco Extended Update Support, and Red Hat Enterprise Linux 7.4 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The dnsmasq packages contain Dnsmasq, a lightweight DNS (Domain Name Server) forwarder and DHCP (Dynamic Host Configuration Protocol) server.\n\nSecurity Fix(es):\n\n* dnsmasq: loose address/port check in reply_query() makes forging replies easier for an off-path attacker (CVE-2020-25684)\n\n* dnsmasq: loose query name check in reply_query() makes forging replies easier for an off-path attacker (CVE-2020-25685)\n\n* dnsmasq: multiple queries forwarded for the same name makes forging replies easier for an off-path attacker (CVE-2020-25686)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat offerings.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:0156", "url": "https://access.redhat.com/errata/RHSA-2021:0156" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-001", "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-001" }, { "category": "external", "summary": "1889686", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889686" }, { "category": "external", "summary": "1889688", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889688" }, { "category": "external", "summary": "1890125", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890125" }, { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/data/csaf/v2/advisories/2021/rhsa-2021_0156.json" } ], "title": "Red Hat Security Advisory: dnsmasq security update", "tracking": { "current_release_date": "2024-09-13T18:16:47+00:00", "generator": { "date": "2024-09-13T18:16:47+00:00", "engine": { "name": "Red Hat SDEngine", "version": "3.33.3" } }, "id": "RHSA-2021:0156", "initial_release_date": "2021-01-19T13:40:12+00:00", "revision_history": [ { "date": "2021-01-19T13:40:12+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-01-19T13:40:12+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-09-13T18:16:47+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Server AUS (v. 7.4)", "product": { "name": "Red Hat Enterprise Linux Server AUS (v. 7.4)", "product_id": "7Server-7.4.AUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_aus:7.4::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.4)", "product": { "name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.4)", "product_id": "7Server-optional-7.4.AUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_aus:7.4::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server E4S (v. 7.4)", "product": { "name": "Red Hat Enterprise Linux Server E4S (v. 7.4)", "product_id": "7Server-7.4.E4S", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_e4s:7.4::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.4)", "product": { "name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.4)", "product_id": "7Server-optional-7.4.E4S", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_e4s:7.4::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server TUS (v. 7.4)", "product": { "name": "Red Hat Enterprise Linux Server TUS (v. 7.4)", "product_id": "7Server-7.4.TUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_tus:7.4::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.4)", "product": { "name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.4)", "product_id": "7Server-optional-7.4.TUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_tus:7.4::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "dnsmasq-0:2.76-2.el7_4.3.src", "product": { "name": "dnsmasq-0:2.76-2.el7_4.3.src", "product_id": "dnsmasq-0:2.76-2.el7_4.3.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq@2.76-2.el7_4.3?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "dnsmasq-0:2.76-2.el7_4.3.x86_64", "product": { "name": "dnsmasq-0:2.76-2.el7_4.3.x86_64", "product_id": "dnsmasq-0:2.76-2.el7_4.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq@2.76-2.el7_4.3?arch=x86_64" } } }, { "category": "product_version", "name": "dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64", "product": { "name": "dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64", "product_id": "dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-debuginfo@2.76-2.el7_4.3?arch=x86_64" } } }, { "category": "product_version", "name": "dnsmasq-utils-0:2.76-2.el7_4.3.x86_64", "product": { "name": "dnsmasq-utils-0:2.76-2.el7_4.3.x86_64", "product_id": "dnsmasq-utils-0:2.76-2.el7_4.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-utils@2.76-2.el7_4.3?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "dnsmasq-0:2.76-2.el7_4.3.ppc64le", "product": { "name": "dnsmasq-0:2.76-2.el7_4.3.ppc64le", "product_id": "dnsmasq-0:2.76-2.el7_4.3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq@2.76-2.el7_4.3?arch=ppc64le" } } }, { "category": "product_version", "name": "dnsmasq-debuginfo-0:2.76-2.el7_4.3.ppc64le", "product": { "name": "dnsmasq-debuginfo-0:2.76-2.el7_4.3.ppc64le", "product_id": "dnsmasq-debuginfo-0:2.76-2.el7_4.3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-debuginfo@2.76-2.el7_4.3?arch=ppc64le" } } }, { "category": "product_version", "name": "dnsmasq-utils-0:2.76-2.el7_4.3.ppc64le", "product": { "name": "dnsmasq-utils-0:2.76-2.el7_4.3.ppc64le", "product_id": "dnsmasq-utils-0:2.76-2.el7_4.3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-utils@2.76-2.el7_4.3?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-2.el7_4.3.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)", "product_id": "7Server-7.4.AUS:dnsmasq-0:2.76-2.el7_4.3.src" }, "product_reference": "dnsmasq-0:2.76-2.el7_4.3.src", "relates_to_product_reference": "7Server-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-2.el7_4.3.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)", "product_id": "7Server-7.4.AUS:dnsmasq-0:2.76-2.el7_4.3.x86_64" }, "product_reference": "dnsmasq-0:2.76-2.el7_4.3.x86_64", "relates_to_product_reference": "7Server-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)", "product_id": "7Server-7.4.AUS:dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64" }, "product_reference": "dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64", "relates_to_product_reference": "7Server-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-2.el7_4.3.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)", "product_id": "7Server-7.4.AUS:dnsmasq-utils-0:2.76-2.el7_4.3.x86_64" }, "product_reference": "dnsmasq-utils-0:2.76-2.el7_4.3.x86_64", "relates_to_product_reference": "7Server-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-2.el7_4.3.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)", "product_id": "7Server-7.4.E4S:dnsmasq-0:2.76-2.el7_4.3.ppc64le" }, "product_reference": "dnsmasq-0:2.76-2.el7_4.3.ppc64le", "relates_to_product_reference": "7Server-7.4.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-2.el7_4.3.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)", "product_id": "7Server-7.4.E4S:dnsmasq-0:2.76-2.el7_4.3.src" }, "product_reference": "dnsmasq-0:2.76-2.el7_4.3.src", "relates_to_product_reference": "7Server-7.4.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-2.el7_4.3.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)", "product_id": "7Server-7.4.E4S:dnsmasq-0:2.76-2.el7_4.3.x86_64" }, "product_reference": "dnsmasq-0:2.76-2.el7_4.3.x86_64", "relates_to_product_reference": "7Server-7.4.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-2.el7_4.3.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)", "product_id": "7Server-7.4.E4S:dnsmasq-debuginfo-0:2.76-2.el7_4.3.ppc64le" }, "product_reference": "dnsmasq-debuginfo-0:2.76-2.el7_4.3.ppc64le", "relates_to_product_reference": "7Server-7.4.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)", "product_id": "7Server-7.4.E4S:dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64" }, "product_reference": "dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64", "relates_to_product_reference": "7Server-7.4.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-2.el7_4.3.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)", "product_id": "7Server-7.4.E4S:dnsmasq-utils-0:2.76-2.el7_4.3.ppc64le" }, "product_reference": "dnsmasq-utils-0:2.76-2.el7_4.3.ppc64le", "relates_to_product_reference": "7Server-7.4.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-2.el7_4.3.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)", "product_id": "7Server-7.4.E4S:dnsmasq-utils-0:2.76-2.el7_4.3.x86_64" }, "product_reference": "dnsmasq-utils-0:2.76-2.el7_4.3.x86_64", "relates_to_product_reference": "7Server-7.4.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-2.el7_4.3.src as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)", "product_id": "7Server-7.4.TUS:dnsmasq-0:2.76-2.el7_4.3.src" }, "product_reference": "dnsmasq-0:2.76-2.el7_4.3.src", "relates_to_product_reference": "7Server-7.4.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-2.el7_4.3.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)", "product_id": "7Server-7.4.TUS:dnsmasq-0:2.76-2.el7_4.3.x86_64" }, "product_reference": "dnsmasq-0:2.76-2.el7_4.3.x86_64", "relates_to_product_reference": "7Server-7.4.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)", "product_id": "7Server-7.4.TUS:dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64" }, "product_reference": "dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64", "relates_to_product_reference": "7Server-7.4.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-2.el7_4.3.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)", "product_id": "7Server-7.4.TUS:dnsmasq-utils-0:2.76-2.el7_4.3.x86_64" }, "product_reference": "dnsmasq-utils-0:2.76-2.el7_4.3.x86_64", "relates_to_product_reference": "7Server-7.4.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-2.el7_4.3.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)", "product_id": "7Server-optional-7.4.AUS:dnsmasq-0:2.76-2.el7_4.3.src" }, "product_reference": "dnsmasq-0:2.76-2.el7_4.3.src", "relates_to_product_reference": "7Server-optional-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-2.el7_4.3.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)", "product_id": "7Server-optional-7.4.AUS:dnsmasq-0:2.76-2.el7_4.3.x86_64" }, "product_reference": "dnsmasq-0:2.76-2.el7_4.3.x86_64", "relates_to_product_reference": "7Server-optional-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)", "product_id": "7Server-optional-7.4.AUS:dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64" }, "product_reference": "dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64", "relates_to_product_reference": "7Server-optional-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-2.el7_4.3.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)", "product_id": "7Server-optional-7.4.AUS:dnsmasq-utils-0:2.76-2.el7_4.3.x86_64" }, "product_reference": "dnsmasq-utils-0:2.76-2.el7_4.3.x86_64", "relates_to_product_reference": "7Server-optional-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-2.el7_4.3.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)", "product_id": "7Server-optional-7.4.E4S:dnsmasq-0:2.76-2.el7_4.3.ppc64le" }, "product_reference": "dnsmasq-0:2.76-2.el7_4.3.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-2.el7_4.3.src as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)", "product_id": "7Server-optional-7.4.E4S:dnsmasq-0:2.76-2.el7_4.3.src" }, "product_reference": "dnsmasq-0:2.76-2.el7_4.3.src", "relates_to_product_reference": "7Server-optional-7.4.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-2.el7_4.3.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)", "product_id": "7Server-optional-7.4.E4S:dnsmasq-0:2.76-2.el7_4.3.x86_64" }, "product_reference": "dnsmasq-0:2.76-2.el7_4.3.x86_64", "relates_to_product_reference": "7Server-optional-7.4.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-2.el7_4.3.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)", "product_id": "7Server-optional-7.4.E4S:dnsmasq-debuginfo-0:2.76-2.el7_4.3.ppc64le" }, "product_reference": "dnsmasq-debuginfo-0:2.76-2.el7_4.3.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)", "product_id": "7Server-optional-7.4.E4S:dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64" }, "product_reference": "dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64", "relates_to_product_reference": "7Server-optional-7.4.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-2.el7_4.3.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)", "product_id": "7Server-optional-7.4.E4S:dnsmasq-utils-0:2.76-2.el7_4.3.ppc64le" }, "product_reference": "dnsmasq-utils-0:2.76-2.el7_4.3.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-2.el7_4.3.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)", "product_id": "7Server-optional-7.4.E4S:dnsmasq-utils-0:2.76-2.el7_4.3.x86_64" }, "product_reference": "dnsmasq-utils-0:2.76-2.el7_4.3.x86_64", "relates_to_product_reference": "7Server-optional-7.4.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-2.el7_4.3.src as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.4)", "product_id": "7Server-optional-7.4.TUS:dnsmasq-0:2.76-2.el7_4.3.src" }, "product_reference": "dnsmasq-0:2.76-2.el7_4.3.src", "relates_to_product_reference": "7Server-optional-7.4.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-2.el7_4.3.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.4)", "product_id": "7Server-optional-7.4.TUS:dnsmasq-0:2.76-2.el7_4.3.x86_64" }, "product_reference": "dnsmasq-0:2.76-2.el7_4.3.x86_64", "relates_to_product_reference": "7Server-optional-7.4.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.4)", "product_id": "7Server-optional-7.4.TUS:dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64" }, "product_reference": "dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64", "relates_to_product_reference": "7Server-optional-7.4.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-2.el7_4.3.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.4)", "product_id": "7Server-optional-7.4.TUS:dnsmasq-utils-0:2.76-2.el7_4.3.x86_64" }, "product_reference": "dnsmasq-utils-0:2.76-2.el7_4.3.x86_64", "relates_to_product_reference": "7Server-optional-7.4.TUS" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Moshe Kol", "Shlomi Oberman" ], "organization": "JSOF" } ], "cve": "CVE-2020-25684", "cwe": { "id": "CWE-358", "name": "Improperly Implemented Security Check for Standard" }, "discovery_date": "2020-09-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1889686" } ], "notes": [ { "category": "description", "text": "A flaw was found in dnsmasq. When getting a reply from a forwarded query, dnsmasq checks in the forward.c:reply_query() if the reply destination address/port is used by the pending forwarded queries. However, it does not use the address/port to retrieve the exact forwarded query, substantially reducing the number of attempts an attacker on the network would have to perform to forge a reply and get it accepted by dnsmasq. This issue contrasts with RFC5452, which specifies a query\u0027s attributes that all must be used to match a reply. This flaw allows an attacker to perform a DNS Cache Poisoning attack. If chained with CVE-2020-25685 or CVE-2020-25686, the attack complexity of a successful attack is reduced. The highest threat from this vulnerability is to data integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "dnsmasq: loose address/port check in reply_query() makes forging replies easier for an off-path attacker", "title": "Vulnerability summary" }, { "category": "other", "text": "Dnsmasq may be run by libvirt and/or NetworkManager. libvirt uses dnsmasq by default to provide DNS service to its guests. NetworkManager may be configured to use dnsmasq to provide DNS service to the system, if a line `dns=dnsmasq` is present in the `[main]` section of the configuration file /etc/NetworkManager/NetworkManager.conf.\n\nIn Red Hat OpenStack Platform (RHOSP) and Red Hat Virtualization (RHV), the dnsmasq package is provided by the underlying Red Hat Enterprise Linux (RHEL) product. RHOSP and RHV are therefore indirectly affected, so please ensure that the underlying RHEL dnsmasq package is updated.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.4.AUS:dnsmasq-0:2.76-2.el7_4.3.src", "7Server-7.4.AUS:dnsmasq-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.AUS:dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.AUS:dnsmasq-utils-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.E4S:dnsmasq-0:2.76-2.el7_4.3.ppc64le", "7Server-7.4.E4S:dnsmasq-0:2.76-2.el7_4.3.src", "7Server-7.4.E4S:dnsmasq-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.E4S:dnsmasq-debuginfo-0:2.76-2.el7_4.3.ppc64le", "7Server-7.4.E4S:dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.E4S:dnsmasq-utils-0:2.76-2.el7_4.3.ppc64le", "7Server-7.4.E4S:dnsmasq-utils-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.TUS:dnsmasq-0:2.76-2.el7_4.3.src", "7Server-7.4.TUS:dnsmasq-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.TUS:dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.TUS:dnsmasq-utils-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.AUS:dnsmasq-0:2.76-2.el7_4.3.src", "7Server-optional-7.4.AUS:dnsmasq-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.AUS:dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.AUS:dnsmasq-utils-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.E4S:dnsmasq-0:2.76-2.el7_4.3.ppc64le", "7Server-optional-7.4.E4S:dnsmasq-0:2.76-2.el7_4.3.src", "7Server-optional-7.4.E4S:dnsmasq-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.E4S:dnsmasq-debuginfo-0:2.76-2.el7_4.3.ppc64le", "7Server-optional-7.4.E4S:dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.E4S:dnsmasq-utils-0:2.76-2.el7_4.3.ppc64le", "7Server-optional-7.4.E4S:dnsmasq-utils-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.TUS:dnsmasq-0:2.76-2.el7_4.3.src", "7Server-optional-7.4.TUS:dnsmasq-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.TUS:dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.TUS:dnsmasq-utils-0:2.76-2.el7_4.3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-25684" }, { "category": "external", "summary": "RHBZ#1889686", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889686" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-25684", "url": "https://www.cve.org/CVERecord?id=CVE-2020-25684" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25684", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25684" }, { "category": "external", "summary": "https://www.jsof-tech.com/disclosures/dnspooq/", "url": "https://www.jsof-tech.com/disclosures/dnspooq/" } ], "release_date": "2021-01-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-7.4.AUS:dnsmasq-0:2.76-2.el7_4.3.src", "7Server-7.4.AUS:dnsmasq-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.AUS:dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.AUS:dnsmasq-utils-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.E4S:dnsmasq-0:2.76-2.el7_4.3.ppc64le", "7Server-7.4.E4S:dnsmasq-0:2.76-2.el7_4.3.src", "7Server-7.4.E4S:dnsmasq-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.E4S:dnsmasq-debuginfo-0:2.76-2.el7_4.3.ppc64le", "7Server-7.4.E4S:dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.E4S:dnsmasq-utils-0:2.76-2.el7_4.3.ppc64le", "7Server-7.4.E4S:dnsmasq-utils-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.TUS:dnsmasq-0:2.76-2.el7_4.3.src", "7Server-7.4.TUS:dnsmasq-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.TUS:dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.TUS:dnsmasq-utils-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.AUS:dnsmasq-0:2.76-2.el7_4.3.src", "7Server-optional-7.4.AUS:dnsmasq-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.AUS:dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.AUS:dnsmasq-utils-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.E4S:dnsmasq-0:2.76-2.el7_4.3.ppc64le", "7Server-optional-7.4.E4S:dnsmasq-0:2.76-2.el7_4.3.src", "7Server-optional-7.4.E4S:dnsmasq-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.E4S:dnsmasq-debuginfo-0:2.76-2.el7_4.3.ppc64le", "7Server-optional-7.4.E4S:dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.E4S:dnsmasq-utils-0:2.76-2.el7_4.3.ppc64le", "7Server-optional-7.4.E4S:dnsmasq-utils-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.TUS:dnsmasq-0:2.76-2.el7_4.3.src", "7Server-optional-7.4.TUS:dnsmasq-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.TUS:dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.TUS:dnsmasq-utils-0:2.76-2.el7_4.3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0156" }, { "category": "workaround", "details": "The impact of this flaw can be reduced by disabling the dnsmasq cache by adding `--cache-size=0` when calling dnsmasq or by adding a line with `cache-size=0` to the dnsmasq configuration file (/etc/dnsmasq.conf by default).\n\nWhen using Red Hat Enterprise Linux 8.3 with libvirt through a virt:rhel module, use `virsh net-edit \u003cnetwork-name\u003e` and reference https://libvirt.org/formatnetwork.html#elementsNamespaces to add the suggested option `cache-size=0`. \n\nThere is no way to customize the dnsmasq configuration generated by libvirt, when using versions of Red Hat Enterprise Linux prior to version 8.3. If dnsmasq is being run through NetworkManager, create a new file in /etc/NetworkManager/dnsmasq.d/ and add `cache-size=0` to it.\n\nIn all cases, by disabling the cache, you may experience a performance loss in your environment due to all DNS queries being forwarded to the upstream servers. Please evaluate if the mitigation is appropriate for the system\u2019s environment before applying.", "product_ids": [ "7Server-7.4.AUS:dnsmasq-0:2.76-2.el7_4.3.src", "7Server-7.4.AUS:dnsmasq-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.AUS:dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.AUS:dnsmasq-utils-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.E4S:dnsmasq-0:2.76-2.el7_4.3.ppc64le", "7Server-7.4.E4S:dnsmasq-0:2.76-2.el7_4.3.src", "7Server-7.4.E4S:dnsmasq-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.E4S:dnsmasq-debuginfo-0:2.76-2.el7_4.3.ppc64le", "7Server-7.4.E4S:dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.E4S:dnsmasq-utils-0:2.76-2.el7_4.3.ppc64le", "7Server-7.4.E4S:dnsmasq-utils-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.TUS:dnsmasq-0:2.76-2.el7_4.3.src", "7Server-7.4.TUS:dnsmasq-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.TUS:dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.TUS:dnsmasq-utils-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.AUS:dnsmasq-0:2.76-2.el7_4.3.src", "7Server-optional-7.4.AUS:dnsmasq-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.AUS:dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.AUS:dnsmasq-utils-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.E4S:dnsmasq-0:2.76-2.el7_4.3.ppc64le", "7Server-optional-7.4.E4S:dnsmasq-0:2.76-2.el7_4.3.src", "7Server-optional-7.4.E4S:dnsmasq-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.E4S:dnsmasq-debuginfo-0:2.76-2.el7_4.3.ppc64le", "7Server-optional-7.4.E4S:dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.E4S:dnsmasq-utils-0:2.76-2.el7_4.3.ppc64le", "7Server-optional-7.4.E4S:dnsmasq-utils-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.TUS:dnsmasq-0:2.76-2.el7_4.3.src", "7Server-optional-7.4.TUS:dnsmasq-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.TUS:dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.TUS:dnsmasq-utils-0:2.76-2.el7_4.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N", "version": "3.1" }, "products": [ "7Server-7.4.AUS:dnsmasq-0:2.76-2.el7_4.3.src", "7Server-7.4.AUS:dnsmasq-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.AUS:dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.AUS:dnsmasq-utils-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.E4S:dnsmasq-0:2.76-2.el7_4.3.ppc64le", "7Server-7.4.E4S:dnsmasq-0:2.76-2.el7_4.3.src", "7Server-7.4.E4S:dnsmasq-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.E4S:dnsmasq-debuginfo-0:2.76-2.el7_4.3.ppc64le", "7Server-7.4.E4S:dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.E4S:dnsmasq-utils-0:2.76-2.el7_4.3.ppc64le", "7Server-7.4.E4S:dnsmasq-utils-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.TUS:dnsmasq-0:2.76-2.el7_4.3.src", "7Server-7.4.TUS:dnsmasq-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.TUS:dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.TUS:dnsmasq-utils-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.AUS:dnsmasq-0:2.76-2.el7_4.3.src", "7Server-optional-7.4.AUS:dnsmasq-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.AUS:dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.AUS:dnsmasq-utils-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.E4S:dnsmasq-0:2.76-2.el7_4.3.ppc64le", "7Server-optional-7.4.E4S:dnsmasq-0:2.76-2.el7_4.3.src", "7Server-optional-7.4.E4S:dnsmasq-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.E4S:dnsmasq-debuginfo-0:2.76-2.el7_4.3.ppc64le", "7Server-optional-7.4.E4S:dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.E4S:dnsmasq-utils-0:2.76-2.el7_4.3.ppc64le", "7Server-optional-7.4.E4S:dnsmasq-utils-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.TUS:dnsmasq-0:2.76-2.el7_4.3.src", "7Server-optional-7.4.TUS:dnsmasq-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.TUS:dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.TUS:dnsmasq-utils-0:2.76-2.el7_4.3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "dnsmasq: loose address/port check in reply_query() makes forging replies easier for an off-path attacker" }, { "acknowledgments": [ { "names": [ "Moshe Kol", "Shlomi Oberman" ], "organization": "JSOF" } ], "cve": "CVE-2020-25685", "cwe": { "id": "CWE-326", "name": "Inadequate Encryption Strength" }, "discovery_date": "2020-09-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1889688" } ], "notes": [ { "category": "description", "text": "A flaw was found in dnsmasq. When getting a reply from a forwarded query, dnsmasq checks in forward.c:reply_query(), which is the forwarded query that matches the reply, by only using a weak hash of the query name. Due to the weak hash (CRC32 when dnsmasq is compiled without DNSSEC, SHA-1 when it is) this flaw allows an off-path attacker to find several different domains all having the same hash, substantially reducing the number of attempts they would have to perform to forge a reply and get it accepted by dnsmasq. This is in contrast with RFC5452, which specifies that the query name is one of the attributes of a query that must be used to match a reply. This flaw could be abused to perform a DNS Cache Poisoning attack. If chained with CVE-2020-25684 the attack complexity of a successful attack is reduced. The highest threat from this vulnerability is to data integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "dnsmasq: loose query name check in reply_query() makes forging replies easier for an off-path attacker", "title": "Vulnerability summary" }, { "category": "other", "text": "Dnsmasq may be run by libvirt and/or NetworkManager. libvirt uses dnsmasq by default to provide DNS service to its guests. NetworkManager may be configured to use dnsmasq to provide DNS service to the system, if a line `dns=dnsmasq` is present in the `[main]` section of the configuration file /etc/NetworkManager/NetworkManager.conf.\n\nIn Red Hat OpenStack Platform (RHOSP) and Red Hat Virtualization (RHV), the dnsmasq package is provided by the underlying Red Hat Enterprise Linux (RHEL) product. RHOSP and RHV are therefore indirectly affected, so please ensure that the underlying RHEL dnsmasq package is updated.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.4.AUS:dnsmasq-0:2.76-2.el7_4.3.src", "7Server-7.4.AUS:dnsmasq-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.AUS:dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.AUS:dnsmasq-utils-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.E4S:dnsmasq-0:2.76-2.el7_4.3.ppc64le", "7Server-7.4.E4S:dnsmasq-0:2.76-2.el7_4.3.src", "7Server-7.4.E4S:dnsmasq-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.E4S:dnsmasq-debuginfo-0:2.76-2.el7_4.3.ppc64le", "7Server-7.4.E4S:dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.E4S:dnsmasq-utils-0:2.76-2.el7_4.3.ppc64le", "7Server-7.4.E4S:dnsmasq-utils-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.TUS:dnsmasq-0:2.76-2.el7_4.3.src", "7Server-7.4.TUS:dnsmasq-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.TUS:dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.TUS:dnsmasq-utils-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.AUS:dnsmasq-0:2.76-2.el7_4.3.src", "7Server-optional-7.4.AUS:dnsmasq-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.AUS:dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.AUS:dnsmasq-utils-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.E4S:dnsmasq-0:2.76-2.el7_4.3.ppc64le", "7Server-optional-7.4.E4S:dnsmasq-0:2.76-2.el7_4.3.src", "7Server-optional-7.4.E4S:dnsmasq-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.E4S:dnsmasq-debuginfo-0:2.76-2.el7_4.3.ppc64le", "7Server-optional-7.4.E4S:dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.E4S:dnsmasq-utils-0:2.76-2.el7_4.3.ppc64le", "7Server-optional-7.4.E4S:dnsmasq-utils-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.TUS:dnsmasq-0:2.76-2.el7_4.3.src", "7Server-optional-7.4.TUS:dnsmasq-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.TUS:dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.TUS:dnsmasq-utils-0:2.76-2.el7_4.3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-25685" }, { "category": "external", "summary": "RHBZ#1889688", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889688" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-25685", "url": "https://www.cve.org/CVERecord?id=CVE-2020-25685" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25685", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25685" }, { "category": "external", "summary": "https://www.jsof-tech.com/disclosures/dnspooq/", "url": "https://www.jsof-tech.com/disclosures/dnspooq/" } ], "release_date": "2021-01-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-7.4.AUS:dnsmasq-0:2.76-2.el7_4.3.src", "7Server-7.4.AUS:dnsmasq-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.AUS:dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.AUS:dnsmasq-utils-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.E4S:dnsmasq-0:2.76-2.el7_4.3.ppc64le", "7Server-7.4.E4S:dnsmasq-0:2.76-2.el7_4.3.src", "7Server-7.4.E4S:dnsmasq-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.E4S:dnsmasq-debuginfo-0:2.76-2.el7_4.3.ppc64le", "7Server-7.4.E4S:dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.E4S:dnsmasq-utils-0:2.76-2.el7_4.3.ppc64le", "7Server-7.4.E4S:dnsmasq-utils-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.TUS:dnsmasq-0:2.76-2.el7_4.3.src", "7Server-7.4.TUS:dnsmasq-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.TUS:dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.TUS:dnsmasq-utils-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.AUS:dnsmasq-0:2.76-2.el7_4.3.src", "7Server-optional-7.4.AUS:dnsmasq-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.AUS:dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.AUS:dnsmasq-utils-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.E4S:dnsmasq-0:2.76-2.el7_4.3.ppc64le", "7Server-optional-7.4.E4S:dnsmasq-0:2.76-2.el7_4.3.src", "7Server-optional-7.4.E4S:dnsmasq-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.E4S:dnsmasq-debuginfo-0:2.76-2.el7_4.3.ppc64le", "7Server-optional-7.4.E4S:dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.E4S:dnsmasq-utils-0:2.76-2.el7_4.3.ppc64le", "7Server-optional-7.4.E4S:dnsmasq-utils-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.TUS:dnsmasq-0:2.76-2.el7_4.3.src", "7Server-optional-7.4.TUS:dnsmasq-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.TUS:dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.TUS:dnsmasq-utils-0:2.76-2.el7_4.3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0156" }, { "category": "workaround", "details": "The impact of this flaw can be reduced by disabling the dnsmasq cache by adding `--cache-size=0` when calling dnsmasq or by adding a line with `cache-size=0` to the dnsmasq configuration file (/etc/dnsmasq.conf by default). \n\nWhen using Red Hat Enterprise Linux 8.3 with libvirt through a virt:rhel module, use `virsh net-edit \u003cnetwork-name\u003e` and reference https://libvirt.org/formatnetwork.html#elementsNamespaces to add the suggested option `cache-size=0`. \n\nThere is no way to customize the dnsmasq configuration generated by libvirt, when using versions of Red Hat Enterprise Linux prior to version 8.3. If dnsmasq is being run through NetworkManager, create a new file in /etc/NetworkManager/dnsmasq.d/ and add `cache-size=0` to it.\n\nIn all cases, by disabling the cache, you may experience a performance loss in your environment due to all DNS queries being forwarded to the upstream servers. Please evaluate if the mitigation is appropriate for the system\u2019s environment before applying.", "product_ids": [ "7Server-7.4.AUS:dnsmasq-0:2.76-2.el7_4.3.src", "7Server-7.4.AUS:dnsmasq-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.AUS:dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.AUS:dnsmasq-utils-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.E4S:dnsmasq-0:2.76-2.el7_4.3.ppc64le", "7Server-7.4.E4S:dnsmasq-0:2.76-2.el7_4.3.src", "7Server-7.4.E4S:dnsmasq-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.E4S:dnsmasq-debuginfo-0:2.76-2.el7_4.3.ppc64le", "7Server-7.4.E4S:dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.E4S:dnsmasq-utils-0:2.76-2.el7_4.3.ppc64le", "7Server-7.4.E4S:dnsmasq-utils-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.TUS:dnsmasq-0:2.76-2.el7_4.3.src", "7Server-7.4.TUS:dnsmasq-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.TUS:dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.TUS:dnsmasq-utils-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.AUS:dnsmasq-0:2.76-2.el7_4.3.src", "7Server-optional-7.4.AUS:dnsmasq-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.AUS:dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.AUS:dnsmasq-utils-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.E4S:dnsmasq-0:2.76-2.el7_4.3.ppc64le", "7Server-optional-7.4.E4S:dnsmasq-0:2.76-2.el7_4.3.src", "7Server-optional-7.4.E4S:dnsmasq-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.E4S:dnsmasq-debuginfo-0:2.76-2.el7_4.3.ppc64le", "7Server-optional-7.4.E4S:dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.E4S:dnsmasq-utils-0:2.76-2.el7_4.3.ppc64le", "7Server-optional-7.4.E4S:dnsmasq-utils-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.TUS:dnsmasq-0:2.76-2.el7_4.3.src", "7Server-optional-7.4.TUS:dnsmasq-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.TUS:dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.TUS:dnsmasq-utils-0:2.76-2.el7_4.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N", "version": "3.1" }, "products": [ "7Server-7.4.AUS:dnsmasq-0:2.76-2.el7_4.3.src", "7Server-7.4.AUS:dnsmasq-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.AUS:dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.AUS:dnsmasq-utils-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.E4S:dnsmasq-0:2.76-2.el7_4.3.ppc64le", "7Server-7.4.E4S:dnsmasq-0:2.76-2.el7_4.3.src", "7Server-7.4.E4S:dnsmasq-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.E4S:dnsmasq-debuginfo-0:2.76-2.el7_4.3.ppc64le", "7Server-7.4.E4S:dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.E4S:dnsmasq-utils-0:2.76-2.el7_4.3.ppc64le", "7Server-7.4.E4S:dnsmasq-utils-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.TUS:dnsmasq-0:2.76-2.el7_4.3.src", "7Server-7.4.TUS:dnsmasq-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.TUS:dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.TUS:dnsmasq-utils-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.AUS:dnsmasq-0:2.76-2.el7_4.3.src", "7Server-optional-7.4.AUS:dnsmasq-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.AUS:dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.AUS:dnsmasq-utils-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.E4S:dnsmasq-0:2.76-2.el7_4.3.ppc64le", "7Server-optional-7.4.E4S:dnsmasq-0:2.76-2.el7_4.3.src", "7Server-optional-7.4.E4S:dnsmasq-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.E4S:dnsmasq-debuginfo-0:2.76-2.el7_4.3.ppc64le", "7Server-optional-7.4.E4S:dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.E4S:dnsmasq-utils-0:2.76-2.el7_4.3.ppc64le", "7Server-optional-7.4.E4S:dnsmasq-utils-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.TUS:dnsmasq-0:2.76-2.el7_4.3.src", "7Server-optional-7.4.TUS:dnsmasq-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.TUS:dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.TUS:dnsmasq-utils-0:2.76-2.el7_4.3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "dnsmasq: loose query name check in reply_query() makes forging replies easier for an off-path attacker" }, { "acknowledgments": [ { "names": [ "Moshe Kol", "Shlomi Oberman" ], "organization": "JSOF" } ], "cve": "CVE-2020-25686", "cwe": { "id": "CWE-290", "name": "Authentication Bypass by Spoofing" }, "discovery_date": "2020-09-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1890125" } ], "notes": [ { "category": "description", "text": "A flaw was found in dnsmasq. When receiving a query, dnsmasq does not check for an existing pending request for the same name and forwards a new request. By default, a maximum of 150 pending queries can be sent to upstream servers, so there can be at most 150 queries for the same name. This flaw allows an off-path attacker on the network to substantially reduce the number of attempts that it would have to perform to forge a reply and have it accepted by dnsmasq. This issue is mentioned in the \"Birthday Attacks\" section of RFC5452. If chained with CVE-2020-25684, the attack complexity of a successful attack is reduced. The highest threat from this vulnerability is to data integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "dnsmasq: multiple queries forwarded for the same name makes forging replies easier for an off-path attacker", "title": "Vulnerability summary" }, { "category": "other", "text": "Dnsmasq may be run by libvirt and/or NetworkManager. libvirt uses dnsmasq by default to provide DNS service to its guests. NetworkManager may be configured to use dnsmasq to provide DNS service to the system, if a line `dns=dnsmasq` is present in the `[main]` section of the configuration file /etc/NetworkManager/NetworkManager.conf.\n\nIn Red Hat OpenStack Platform (RHOSP) and Red Hat Virtualization (RHV), the dnsmasq package is provided by the underlying Red Hat Enterprise Linux (RHEL) product. RHOSP and RHV are therefore indirectly affected, so please ensure that the underlying RHEL dnsmasq package is updated.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.4.AUS:dnsmasq-0:2.76-2.el7_4.3.src", "7Server-7.4.AUS:dnsmasq-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.AUS:dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.AUS:dnsmasq-utils-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.E4S:dnsmasq-0:2.76-2.el7_4.3.ppc64le", "7Server-7.4.E4S:dnsmasq-0:2.76-2.el7_4.3.src", "7Server-7.4.E4S:dnsmasq-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.E4S:dnsmasq-debuginfo-0:2.76-2.el7_4.3.ppc64le", "7Server-7.4.E4S:dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.E4S:dnsmasq-utils-0:2.76-2.el7_4.3.ppc64le", "7Server-7.4.E4S:dnsmasq-utils-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.TUS:dnsmasq-0:2.76-2.el7_4.3.src", "7Server-7.4.TUS:dnsmasq-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.TUS:dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.TUS:dnsmasq-utils-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.AUS:dnsmasq-0:2.76-2.el7_4.3.src", "7Server-optional-7.4.AUS:dnsmasq-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.AUS:dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.AUS:dnsmasq-utils-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.E4S:dnsmasq-0:2.76-2.el7_4.3.ppc64le", "7Server-optional-7.4.E4S:dnsmasq-0:2.76-2.el7_4.3.src", "7Server-optional-7.4.E4S:dnsmasq-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.E4S:dnsmasq-debuginfo-0:2.76-2.el7_4.3.ppc64le", "7Server-optional-7.4.E4S:dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.E4S:dnsmasq-utils-0:2.76-2.el7_4.3.ppc64le", "7Server-optional-7.4.E4S:dnsmasq-utils-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.TUS:dnsmasq-0:2.76-2.el7_4.3.src", "7Server-optional-7.4.TUS:dnsmasq-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.TUS:dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.TUS:dnsmasq-utils-0:2.76-2.el7_4.3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-25686" }, { "category": "external", "summary": "RHBZ#1890125", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890125" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-25686", "url": "https://www.cve.org/CVERecord?id=CVE-2020-25686" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25686", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25686" }, { "category": "external", "summary": "https://www.jsof-tech.com/disclosures/dnspooq/", "url": "https://www.jsof-tech.com/disclosures/dnspooq/" } ], "release_date": "2021-01-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-7.4.AUS:dnsmasq-0:2.76-2.el7_4.3.src", "7Server-7.4.AUS:dnsmasq-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.AUS:dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.AUS:dnsmasq-utils-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.E4S:dnsmasq-0:2.76-2.el7_4.3.ppc64le", "7Server-7.4.E4S:dnsmasq-0:2.76-2.el7_4.3.src", "7Server-7.4.E4S:dnsmasq-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.E4S:dnsmasq-debuginfo-0:2.76-2.el7_4.3.ppc64le", "7Server-7.4.E4S:dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.E4S:dnsmasq-utils-0:2.76-2.el7_4.3.ppc64le", "7Server-7.4.E4S:dnsmasq-utils-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.TUS:dnsmasq-0:2.76-2.el7_4.3.src", "7Server-7.4.TUS:dnsmasq-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.TUS:dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.TUS:dnsmasq-utils-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.AUS:dnsmasq-0:2.76-2.el7_4.3.src", "7Server-optional-7.4.AUS:dnsmasq-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.AUS:dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.AUS:dnsmasq-utils-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.E4S:dnsmasq-0:2.76-2.el7_4.3.ppc64le", "7Server-optional-7.4.E4S:dnsmasq-0:2.76-2.el7_4.3.src", "7Server-optional-7.4.E4S:dnsmasq-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.E4S:dnsmasq-debuginfo-0:2.76-2.el7_4.3.ppc64le", "7Server-optional-7.4.E4S:dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.E4S:dnsmasq-utils-0:2.76-2.el7_4.3.ppc64le", "7Server-optional-7.4.E4S:dnsmasq-utils-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.TUS:dnsmasq-0:2.76-2.el7_4.3.src", "7Server-optional-7.4.TUS:dnsmasq-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.TUS:dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.TUS:dnsmasq-utils-0:2.76-2.el7_4.3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0156" }, { "category": "workaround", "details": "The impact of this flaw can be reduced by disabling the dnsmasq cache by adding `--cache-size=0` when calling dnsmasq or by adding a line with `cache-size=0` to the dnsmasq configuration file (/etc/dnsmasq.conf by default). \n\nWhen using Red Hat Enterprise Linux 8.3 with libvirt through a virt:rhel module, use `virsh net-edit \u003cnetwork-name\u003e` and reference https://libvirt.org/formatnetwork.html#elementsNamespaces to add the suggested option `cache-size=0`. \n\nThere is no way to customize the dnsmasq configuration generated by libvirt, when using versions of Red Hat Enterprise Linux prior to version 8.3. If dnsmasq is being run through NetworkManager, create a new file in /etc/NetworkManager/dnsmasq.d/ and add `cache-size=0` to it.\n\nIn all cases, by disabling the cache, you may experience a performance loss in your environment due to all DNS queries being forwarded to the upstream servers. Please evaluate if the mitigation is appropriate for the system\u2019s environment before applying.", "product_ids": [ "7Server-7.4.AUS:dnsmasq-0:2.76-2.el7_4.3.src", "7Server-7.4.AUS:dnsmasq-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.AUS:dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.AUS:dnsmasq-utils-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.E4S:dnsmasq-0:2.76-2.el7_4.3.ppc64le", "7Server-7.4.E4S:dnsmasq-0:2.76-2.el7_4.3.src", "7Server-7.4.E4S:dnsmasq-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.E4S:dnsmasq-debuginfo-0:2.76-2.el7_4.3.ppc64le", "7Server-7.4.E4S:dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.E4S:dnsmasq-utils-0:2.76-2.el7_4.3.ppc64le", "7Server-7.4.E4S:dnsmasq-utils-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.TUS:dnsmasq-0:2.76-2.el7_4.3.src", "7Server-7.4.TUS:dnsmasq-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.TUS:dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.TUS:dnsmasq-utils-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.AUS:dnsmasq-0:2.76-2.el7_4.3.src", "7Server-optional-7.4.AUS:dnsmasq-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.AUS:dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.AUS:dnsmasq-utils-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.E4S:dnsmasq-0:2.76-2.el7_4.3.ppc64le", "7Server-optional-7.4.E4S:dnsmasq-0:2.76-2.el7_4.3.src", "7Server-optional-7.4.E4S:dnsmasq-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.E4S:dnsmasq-debuginfo-0:2.76-2.el7_4.3.ppc64le", "7Server-optional-7.4.E4S:dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.E4S:dnsmasq-utils-0:2.76-2.el7_4.3.ppc64le", "7Server-optional-7.4.E4S:dnsmasq-utils-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.TUS:dnsmasq-0:2.76-2.el7_4.3.src", "7Server-optional-7.4.TUS:dnsmasq-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.TUS:dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.TUS:dnsmasq-utils-0:2.76-2.el7_4.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N", "version": "3.1" }, "products": [ "7Server-7.4.AUS:dnsmasq-0:2.76-2.el7_4.3.src", "7Server-7.4.AUS:dnsmasq-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.AUS:dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.AUS:dnsmasq-utils-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.E4S:dnsmasq-0:2.76-2.el7_4.3.ppc64le", "7Server-7.4.E4S:dnsmasq-0:2.76-2.el7_4.3.src", "7Server-7.4.E4S:dnsmasq-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.E4S:dnsmasq-debuginfo-0:2.76-2.el7_4.3.ppc64le", "7Server-7.4.E4S:dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.E4S:dnsmasq-utils-0:2.76-2.el7_4.3.ppc64le", "7Server-7.4.E4S:dnsmasq-utils-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.TUS:dnsmasq-0:2.76-2.el7_4.3.src", "7Server-7.4.TUS:dnsmasq-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.TUS:dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64", "7Server-7.4.TUS:dnsmasq-utils-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.AUS:dnsmasq-0:2.76-2.el7_4.3.src", "7Server-optional-7.4.AUS:dnsmasq-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.AUS:dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.AUS:dnsmasq-utils-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.E4S:dnsmasq-0:2.76-2.el7_4.3.ppc64le", "7Server-optional-7.4.E4S:dnsmasq-0:2.76-2.el7_4.3.src", "7Server-optional-7.4.E4S:dnsmasq-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.E4S:dnsmasq-debuginfo-0:2.76-2.el7_4.3.ppc64le", "7Server-optional-7.4.E4S:dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.E4S:dnsmasq-utils-0:2.76-2.el7_4.3.ppc64le", "7Server-optional-7.4.E4S:dnsmasq-utils-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.TUS:dnsmasq-0:2.76-2.el7_4.3.src", "7Server-optional-7.4.TUS:dnsmasq-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.TUS:dnsmasq-debuginfo-0:2.76-2.el7_4.3.x86_64", "7Server-optional-7.4.TUS:dnsmasq-utils-0:2.76-2.el7_4.3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "dnsmasq: multiple queries forwarded for the same name makes forging replies easier for an off-path attacker" } ] }
rhsa-2021_0401
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_vex", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for imgbased, redhat-release-virtualization-host, and redhat-virtualization-host is now available for Red Hat Virtualization 4 for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The redhat-virtualization-host packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. Red Hat Virtualization Hosts (RHVH) are installed using a special build of Red Hat Enterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host\u0027s resources and performing administrative tasks. \n\nSecurity Fix(es):\n\n* sudo: Heap buffer overflow in argument parsing (CVE-2021-3156)\n\n* dnsmasq: loose address/port check in reply_query() makes forging replies easier for an off-path attacker (CVE-2020-25684)\n\n* dnsmasq: loose query name check in reply_query() makes forging replies easier for an off-path attacker (CVE-2020-25685)\n\n* dnsmasq: multiple queries forwarded for the same name makes forging replies easier for an off-path attacker (CVE-2020-25686)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* Previously, the Red Hat Virtualization Host (RHV-H) repository (rhvh-4-for-rhel-8-x86_64-rpms) did not include the libsmbclient package, which is a dependency for the sssd-ad package. Consequently, the sssd-ad package failed to install.\n\nWith this update, the libsmbclient is now in the RHV-H repository, and sssd-ad now installs on RHV-H. (BZ#1868967)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat offerings.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:0401", "url": "https://access.redhat.com/errata/RHSA-2021:0401" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-001", "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-001" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-002", "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-002" }, { "category": "external", "summary": "1850939", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1850939" }, { "category": "external", "summary": "1868967", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1868967" }, { "category": "external", "summary": "1889686", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889686" }, { "category": "external", "summary": "1889688", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889688" }, { "category": "external", "summary": "1890125", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890125" }, { "category": "external", "summary": "1902315", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1902315" }, { "category": "external", "summary": "1902646", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1902646" }, { "category": "external", "summary": "1909644", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1909644" }, { "category": "external", "summary": "1917684", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1917684" }, { "category": "external", "summary": "1921553", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1921553" }, { "category": "external", "summary": "1923126", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1923126" }, { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/data/csaf/v2/advisories/2021/rhsa-2021_0401.json" } ], "title": "Red Hat Security Advisory: Red Hat Virtualization Host security bug fix and enhancement update [ovirt-4.4.4]", "tracking": { "current_release_date": "2024-09-13T20:24:38+00:00", "generator": { "date": "2024-09-13T20:24:38+00:00", "engine": { "name": "Red Hat SDEngine", "version": "3.33.3" } }, "id": "RHSA-2021:0401", "initial_release_date": "2021-02-03T16:14:40+00:00", "revision_history": [ { "date": "2021-02-03T16:14:40+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-02-03T16:14:40+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-09-13T20:24:38+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Virtualization 4 Hypervisor for RHEL 8", "product": { "name": "Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhev_hypervisor:4.4::el8" } } }, { "category": "product_name", "name": "RHEL 8-based RHEV-H for RHEV 4 (build requirements)", "product": { "name": "RHEL 8-based RHEV-H for RHEV 4 (build requirements)", "product_id": "8Base-RHV-HypervisorBuild-4", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhev_hypervisor:4.4::el8" } } }, { "category": "product_name", "name": "Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product": { "name": "Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "8Base-RHV-Agents-4", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhev_hypervisor:4.4::el8" } } } ], "category": "product_family", "name": "Red Hat Virtualization" }, { "branches": [ { "category": "product_version", "name": "libsmbclient-0:4.12.3-12.el8.3.x86_64", "product": { "name": "libsmbclient-0:4.12.3-12.el8.3.x86_64", "product_id": "libsmbclient-0:4.12.3-12.el8.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libsmbclient@4.12.3-12.el8.3?arch=x86_64" } } }, { "category": "product_version", "name": "samba-debugsource-0:4.12.3-12.el8.3.x86_64", "product": { "name": "samba-debugsource-0:4.12.3-12.el8.3.x86_64", "product_id": "samba-debugsource-0:4.12.3-12.el8.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/samba-debugsource@4.12.3-12.el8.3?arch=x86_64" } } }, { "category": "product_version", "name": "libsmbclient-debuginfo-0:4.12.3-12.el8.3.x86_64", "product": { "name": "libsmbclient-debuginfo-0:4.12.3-12.el8.3.x86_64", "product_id": "libsmbclient-debuginfo-0:4.12.3-12.el8.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libsmbclient-debuginfo@4.12.3-12.el8.3?arch=x86_64" } } }, { "category": "product_version", "name": "samba-debuginfo-0:4.12.3-12.el8.3.x86_64", "product": { "name": "samba-debuginfo-0:4.12.3-12.el8.3.x86_64", "product_id": "samba-debuginfo-0:4.12.3-12.el8.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/samba-debuginfo@4.12.3-12.el8.3?arch=x86_64" } } }, { "category": "product_version", "name": "libipa_hbac-0:2.3.0-9.el8.x86_64", "product": { "name": "libipa_hbac-0:2.3.0-9.el8.x86_64", "product_id": "libipa_hbac-0:2.3.0-9.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libipa_hbac@2.3.0-9.el8?arch=x86_64" } } }, { "category": "product_version", "name": "libsss_autofs-0:2.3.0-9.el8.x86_64", "product": { "name": "libsss_autofs-0:2.3.0-9.el8.x86_64", "product_id": "libsss_autofs-0:2.3.0-9.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libsss_autofs@2.3.0-9.el8?arch=x86_64" } } }, { "category": "product_version", "name": "libsss_certmap-0:2.3.0-9.el8.x86_64", "product": { "name": "libsss_certmap-0:2.3.0-9.el8.x86_64", "product_id": "libsss_certmap-0:2.3.0-9.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libsss_certmap@2.3.0-9.el8?arch=x86_64" } } }, { "category": "product_version", "name": "libsss_idmap-0:2.3.0-9.el8.x86_64", "product": { "name": "libsss_idmap-0:2.3.0-9.el8.x86_64", "product_id": "libsss_idmap-0:2.3.0-9.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libsss_idmap@2.3.0-9.el8?arch=x86_64" } } }, { "category": "product_version", "name": "libsss_nss_idmap-0:2.3.0-9.el8.x86_64", "product": { "name": "libsss_nss_idmap-0:2.3.0-9.el8.x86_64", "product_id": "libsss_nss_idmap-0:2.3.0-9.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libsss_nss_idmap@2.3.0-9.el8?arch=x86_64" } } }, { "category": "product_version", "name": "libsss_nss_idmap-devel-0:2.3.0-9.el8.x86_64", "product": { "name": "libsss_nss_idmap-devel-0:2.3.0-9.el8.x86_64", "product_id": "libsss_nss_idmap-devel-0:2.3.0-9.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libsss_nss_idmap-devel@2.3.0-9.el8?arch=x86_64" } } }, { "category": "product_version", "name": "libsss_simpleifp-0:2.3.0-9.el8.x86_64", "product": { "name": "libsss_simpleifp-0:2.3.0-9.el8.x86_64", "product_id": "libsss_simpleifp-0:2.3.0-9.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libsss_simpleifp@2.3.0-9.el8?arch=x86_64" } } }, { "category": "product_version", "name": "libsss_sudo-0:2.3.0-9.el8.x86_64", "product": { "name": "libsss_sudo-0:2.3.0-9.el8.x86_64", "product_id": "libsss_sudo-0:2.3.0-9.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libsss_sudo@2.3.0-9.el8?arch=x86_64" } } }, { "category": "product_version", "name": "python3-libipa_hbac-0:2.3.0-9.el8.x86_64", "product": { "name": "python3-libipa_hbac-0:2.3.0-9.el8.x86_64", "product_id": "python3-libipa_hbac-0:2.3.0-9.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-libipa_hbac@2.3.0-9.el8?arch=x86_64" } } }, { "category": "product_version", "name": "python3-libsss_nss_idmap-0:2.3.0-9.el8.x86_64", "product": { "name": "python3-libsss_nss_idmap-0:2.3.0-9.el8.x86_64", "product_id": "python3-libsss_nss_idmap-0:2.3.0-9.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-libsss_nss_idmap@2.3.0-9.el8?arch=x86_64" } } }, { "category": "product_version", "name": "python3-sss-0:2.3.0-9.el8.x86_64", "product": { "name": "python3-sss-0:2.3.0-9.el8.x86_64", "product_id": "python3-sss-0:2.3.0-9.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-sss@2.3.0-9.el8?arch=x86_64" } } }, { "category": "product_version", "name": "python3-sss-murmur-0:2.3.0-9.el8.x86_64", "product": { "name": "python3-sss-murmur-0:2.3.0-9.el8.x86_64", "product_id": "python3-sss-murmur-0:2.3.0-9.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-sss-murmur@2.3.0-9.el8?arch=x86_64" } } }, { "category": "product_version", "name": "sssd-0:2.3.0-9.el8.x86_64", "product": { "name": "sssd-0:2.3.0-9.el8.x86_64", "product_id": "sssd-0:2.3.0-9.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/sssd@2.3.0-9.el8?arch=x86_64" } } }, { "category": "product_version", "name": "sssd-ad-0:2.3.0-9.el8.x86_64", "product": { "name": "sssd-ad-0:2.3.0-9.el8.x86_64", "product_id": "sssd-ad-0:2.3.0-9.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/sssd-ad@2.3.0-9.el8?arch=x86_64" } } }, { "category": "product_version", "name": "sssd-client-0:2.3.0-9.el8.x86_64", "product": { "name": "sssd-client-0:2.3.0-9.el8.x86_64", "product_id": "sssd-client-0:2.3.0-9.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/sssd-client@2.3.0-9.el8?arch=x86_64" } } }, { "category": "product_version", "name": "sssd-common-0:2.3.0-9.el8.x86_64", "product": { "name": "sssd-common-0:2.3.0-9.el8.x86_64", "product_id": "sssd-common-0:2.3.0-9.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/sssd-common@2.3.0-9.el8?arch=x86_64" } } }, { "category": "product_version", "name": "sssd-common-pac-0:2.3.0-9.el8.x86_64", "product": { "name": "sssd-common-pac-0:2.3.0-9.el8.x86_64", "product_id": "sssd-common-pac-0:2.3.0-9.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/sssd-common-pac@2.3.0-9.el8?arch=x86_64" } } }, { "category": "product_version", "name": "sssd-dbus-0:2.3.0-9.el8.x86_64", "product": { "name": "sssd-dbus-0:2.3.0-9.el8.x86_64", "product_id": "sssd-dbus-0:2.3.0-9.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/sssd-dbus@2.3.0-9.el8?arch=x86_64" } } }, { "category": "product_version", "name": "sssd-ipa-0:2.3.0-9.el8.x86_64", "product": { "name": "sssd-ipa-0:2.3.0-9.el8.x86_64", "product_id": "sssd-ipa-0:2.3.0-9.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/sssd-ipa@2.3.0-9.el8?arch=x86_64" } } }, { "category": "product_version", "name": "sssd-kcm-0:2.3.0-9.el8.x86_64", "product": { "name": "sssd-kcm-0:2.3.0-9.el8.x86_64", "product_id": "sssd-kcm-0:2.3.0-9.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/sssd-kcm@2.3.0-9.el8?arch=x86_64" } } }, { "category": "product_version", "name": "sssd-krb5-0:2.3.0-9.el8.x86_64", "product": { "name": "sssd-krb5-0:2.3.0-9.el8.x86_64", "product_id": "sssd-krb5-0:2.3.0-9.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/sssd-krb5@2.3.0-9.el8?arch=x86_64" } } }, { "category": "product_version", "name": "sssd-krb5-common-0:2.3.0-9.el8.x86_64", "product": { "name": "sssd-krb5-common-0:2.3.0-9.el8.x86_64", "product_id": "sssd-krb5-common-0:2.3.0-9.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/sssd-krb5-common@2.3.0-9.el8?arch=x86_64" } } }, { "category": "product_version", "name": "sssd-ldap-0:2.3.0-9.el8.x86_64", "product": { "name": "sssd-ldap-0:2.3.0-9.el8.x86_64", "product_id": "sssd-ldap-0:2.3.0-9.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/sssd-ldap@2.3.0-9.el8?arch=x86_64" } } }, { "category": "product_version", "name": "sssd-libwbclient-0:2.3.0-9.el8.x86_64", "product": { "name": "sssd-libwbclient-0:2.3.0-9.el8.x86_64", "product_id": "sssd-libwbclient-0:2.3.0-9.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/sssd-libwbclient@2.3.0-9.el8?arch=x86_64" } } }, { "category": "product_version", "name": "sssd-nfs-idmap-0:2.3.0-9.el8.x86_64", "product": { "name": "sssd-nfs-idmap-0:2.3.0-9.el8.x86_64", "product_id": "sssd-nfs-idmap-0:2.3.0-9.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/sssd-nfs-idmap@2.3.0-9.el8?arch=x86_64" } } }, { "category": "product_version", "name": "sssd-polkit-rules-0:2.3.0-9.el8.x86_64", "product": { "name": "sssd-polkit-rules-0:2.3.0-9.el8.x86_64", "product_id": "sssd-polkit-rules-0:2.3.0-9.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/sssd-polkit-rules@2.3.0-9.el8?arch=x86_64" } } }, { "category": "product_version", "name": "sssd-proxy-0:2.3.0-9.el8.x86_64", "product": { "name": "sssd-proxy-0:2.3.0-9.el8.x86_64", "product_id": "sssd-proxy-0:2.3.0-9.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/sssd-proxy@2.3.0-9.el8?arch=x86_64" } } }, { "category": "product_version", "name": "sssd-tools-0:2.3.0-9.el8.x86_64", "product": { "name": "sssd-tools-0:2.3.0-9.el8.x86_64", "product_id": "sssd-tools-0:2.3.0-9.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/sssd-tools@2.3.0-9.el8?arch=x86_64" } } }, { "category": "product_version", "name": "sssd-winbind-idmap-0:2.3.0-9.el8.x86_64", "product": { "name": "sssd-winbind-idmap-0:2.3.0-9.el8.x86_64", "product_id": "sssd-winbind-idmap-0:2.3.0-9.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/sssd-winbind-idmap@2.3.0-9.el8?arch=x86_64" } } }, { "category": "product_version", "name": "sssd-debugsource-0:2.3.0-9.el8.x86_64", "product": { "name": "sssd-debugsource-0:2.3.0-9.el8.x86_64", "product_id": "sssd-debugsource-0:2.3.0-9.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/sssd-debugsource@2.3.0-9.el8?arch=x86_64" } } }, { "category": "product_version", "name": "libipa_hbac-debuginfo-0:2.3.0-9.el8.x86_64", "product": { "name": "libipa_hbac-debuginfo-0:2.3.0-9.el8.x86_64", "product_id": "libipa_hbac-debuginfo-0:2.3.0-9.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libipa_hbac-debuginfo@2.3.0-9.el8?arch=x86_64" } } }, { "category": "product_version", "name": "libsss_autofs-debuginfo-0:2.3.0-9.el8.x86_64", "product": { "name": "libsss_autofs-debuginfo-0:2.3.0-9.el8.x86_64", "product_id": "libsss_autofs-debuginfo-0:2.3.0-9.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libsss_autofs-debuginfo@2.3.0-9.el8?arch=x86_64" } } }, { "category": "product_version", "name": "libsss_certmap-debuginfo-0:2.3.0-9.el8.x86_64", "product": { "name": "libsss_certmap-debuginfo-0:2.3.0-9.el8.x86_64", "product_id": "libsss_certmap-debuginfo-0:2.3.0-9.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libsss_certmap-debuginfo@2.3.0-9.el8?arch=x86_64" } } }, { "category": "product_version", "name": "libsss_idmap-debuginfo-0:2.3.0-9.el8.x86_64", "product": { "name": "libsss_idmap-debuginfo-0:2.3.0-9.el8.x86_64", "product_id": "libsss_idmap-debuginfo-0:2.3.0-9.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libsss_idmap-debuginfo@2.3.0-9.el8?arch=x86_64" } } }, { "category": "product_version", "name": "libsss_nss_idmap-debuginfo-0:2.3.0-9.el8.x86_64", "product": { "name": "libsss_nss_idmap-debuginfo-0:2.3.0-9.el8.x86_64", "product_id": "libsss_nss_idmap-debuginfo-0:2.3.0-9.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libsss_nss_idmap-debuginfo@2.3.0-9.el8?arch=x86_64" } } }, { "category": "product_version", "name": "libsss_simpleifp-debuginfo-0:2.3.0-9.el8.x86_64", "product": { "name": "libsss_simpleifp-debuginfo-0:2.3.0-9.el8.x86_64", "product_id": "libsss_simpleifp-debuginfo-0:2.3.0-9.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libsss_simpleifp-debuginfo@2.3.0-9.el8?arch=x86_64" } } }, { "category": "product_version", "name": "libsss_sudo-debuginfo-0:2.3.0-9.el8.x86_64", "product": { "name": "libsss_sudo-debuginfo-0:2.3.0-9.el8.x86_64", "product_id": "libsss_sudo-debuginfo-0:2.3.0-9.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libsss_sudo-debuginfo@2.3.0-9.el8?arch=x86_64" } } }, { "category": "product_version", "name": "python3-libipa_hbac-debuginfo-0:2.3.0-9.el8.x86_64", "product": { "name": "python3-libipa_hbac-debuginfo-0:2.3.0-9.el8.x86_64", "product_id": "python3-libipa_hbac-debuginfo-0:2.3.0-9.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-libipa_hbac-debuginfo@2.3.0-9.el8?arch=x86_64" } } }, { "category": "product_version", "name": "python3-libsss_nss_idmap-debuginfo-0:2.3.0-9.el8.x86_64", "product": { "name": "python3-libsss_nss_idmap-debuginfo-0:2.3.0-9.el8.x86_64", "product_id": "python3-libsss_nss_idmap-debuginfo-0:2.3.0-9.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-libsss_nss_idmap-debuginfo@2.3.0-9.el8?arch=x86_64" } } }, { "category": "product_version", "name": "python3-sss-debuginfo-0:2.3.0-9.el8.x86_64", "product": { "name": "python3-sss-debuginfo-0:2.3.0-9.el8.x86_64", "product_id": "python3-sss-debuginfo-0:2.3.0-9.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-sss-debuginfo@2.3.0-9.el8?arch=x86_64" } } }, { "category": "product_version", "name": "python3-sss-murmur-debuginfo-0:2.3.0-9.el8.x86_64", "product": { "name": "python3-sss-murmur-debuginfo-0:2.3.0-9.el8.x86_64", "product_id": "python3-sss-murmur-debuginfo-0:2.3.0-9.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-sss-murmur-debuginfo@2.3.0-9.el8?arch=x86_64" } } }, { "category": "product_version", "name": "sssd-ad-debuginfo-0:2.3.0-9.el8.x86_64", "product": { "name": "sssd-ad-debuginfo-0:2.3.0-9.el8.x86_64", "product_id": "sssd-ad-debuginfo-0:2.3.0-9.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/sssd-ad-debuginfo@2.3.0-9.el8?arch=x86_64" } } }, { "category": "product_version", "name": "sssd-client-debuginfo-0:2.3.0-9.el8.x86_64", "product": { "name": "sssd-client-debuginfo-0:2.3.0-9.el8.x86_64", "product_id": "sssd-client-debuginfo-0:2.3.0-9.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/sssd-client-debuginfo@2.3.0-9.el8?arch=x86_64" } } }, { "category": "product_version", "name": "sssd-common-debuginfo-0:2.3.0-9.el8.x86_64", "product": { "name": "sssd-common-debuginfo-0:2.3.0-9.el8.x86_64", "product_id": "sssd-common-debuginfo-0:2.3.0-9.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/sssd-common-debuginfo@2.3.0-9.el8?arch=x86_64" } } }, { "category": "product_version", "name": "sssd-common-pac-debuginfo-0:2.3.0-9.el8.x86_64", "product": { "name": "sssd-common-pac-debuginfo-0:2.3.0-9.el8.x86_64", "product_id": "sssd-common-pac-debuginfo-0:2.3.0-9.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/sssd-common-pac-debuginfo@2.3.0-9.el8?arch=x86_64" } } }, { "category": "product_version", "name": "sssd-dbus-debuginfo-0:2.3.0-9.el8.x86_64", "product": { "name": "sssd-dbus-debuginfo-0:2.3.0-9.el8.x86_64", "product_id": "sssd-dbus-debuginfo-0:2.3.0-9.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/sssd-dbus-debuginfo@2.3.0-9.el8?arch=x86_64" } } }, { "category": "product_version", "name": "sssd-debuginfo-0:2.3.0-9.el8.x86_64", "product": { "name": "sssd-debuginfo-0:2.3.0-9.el8.x86_64", "product_id": "sssd-debuginfo-0:2.3.0-9.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/sssd-debuginfo@2.3.0-9.el8?arch=x86_64" } } }, { "category": "product_version", "name": "sssd-ipa-debuginfo-0:2.3.0-9.el8.x86_64", "product": { "name": "sssd-ipa-debuginfo-0:2.3.0-9.el8.x86_64", "product_id": "sssd-ipa-debuginfo-0:2.3.0-9.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/sssd-ipa-debuginfo@2.3.0-9.el8?arch=x86_64" } } }, { "category": "product_version", "name": "sssd-kcm-debuginfo-0:2.3.0-9.el8.x86_64", "product": { "name": "sssd-kcm-debuginfo-0:2.3.0-9.el8.x86_64", "product_id": "sssd-kcm-debuginfo-0:2.3.0-9.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/sssd-kcm-debuginfo@2.3.0-9.el8?arch=x86_64" } } }, { "category": "product_version", "name": "sssd-krb5-common-debuginfo-0:2.3.0-9.el8.x86_64", "product": { "name": "sssd-krb5-common-debuginfo-0:2.3.0-9.el8.x86_64", "product_id": "sssd-krb5-common-debuginfo-0:2.3.0-9.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/sssd-krb5-common-debuginfo@2.3.0-9.el8?arch=x86_64" } } }, { "category": "product_version", "name": "sssd-krb5-debuginfo-0:2.3.0-9.el8.x86_64", "product": { "name": "sssd-krb5-debuginfo-0:2.3.0-9.el8.x86_64", "product_id": "sssd-krb5-debuginfo-0:2.3.0-9.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/sssd-krb5-debuginfo@2.3.0-9.el8?arch=x86_64" } } }, { "category": "product_version", "name": "sssd-ldap-debuginfo-0:2.3.0-9.el8.x86_64", "product": { "name": "sssd-ldap-debuginfo-0:2.3.0-9.el8.x86_64", "product_id": "sssd-ldap-debuginfo-0:2.3.0-9.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/sssd-ldap-debuginfo@2.3.0-9.el8?arch=x86_64" } } }, { "category": "product_version", "name": "sssd-libwbclient-debuginfo-0:2.3.0-9.el8.x86_64", "product": { "name": "sssd-libwbclient-debuginfo-0:2.3.0-9.el8.x86_64", "product_id": "sssd-libwbclient-debuginfo-0:2.3.0-9.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/sssd-libwbclient-debuginfo@2.3.0-9.el8?arch=x86_64" } } }, { "category": "product_version", "name": "sssd-nfs-idmap-debuginfo-0:2.3.0-9.el8.x86_64", "product": { "name": "sssd-nfs-idmap-debuginfo-0:2.3.0-9.el8.x86_64", "product_id": "sssd-nfs-idmap-debuginfo-0:2.3.0-9.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/sssd-nfs-idmap-debuginfo@2.3.0-9.el8?arch=x86_64" } } }, { "category": "product_version", "name": "sssd-proxy-debuginfo-0:2.3.0-9.el8.x86_64", "product": { "name": "sssd-proxy-debuginfo-0:2.3.0-9.el8.x86_64", "product_id": "sssd-proxy-debuginfo-0:2.3.0-9.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/sssd-proxy-debuginfo@2.3.0-9.el8?arch=x86_64" } } }, { "category": "product_version", "name": "sssd-tools-debuginfo-0:2.3.0-9.el8.x86_64", "product": { "name": "sssd-tools-debuginfo-0:2.3.0-9.el8.x86_64", "product_id": "sssd-tools-debuginfo-0:2.3.0-9.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/sssd-tools-debuginfo@2.3.0-9.el8?arch=x86_64" } } }, { "category": "product_version", "name": "sssd-winbind-idmap-debuginfo-0:2.3.0-9.el8.x86_64", "product": { "name": "sssd-winbind-idmap-debuginfo-0:2.3.0-9.el8.x86_64", "product_id": "sssd-winbind-idmap-debuginfo-0:2.3.0-9.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/sssd-winbind-idmap-debuginfo@2.3.0-9.el8?arch=x86_64" } } }, { "category": "product_version", "name": "redhat-release-virtualization-host-0:4.4.4-1.el8ev.x86_64", "product": { "name": "redhat-release-virtualization-host-0:4.4.4-1.el8ev.x86_64", "product_id": "redhat-release-virtualization-host-0:4.4.4-1.el8ev.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/redhat-release-virtualization-host@4.4.4-1.el8ev?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "samba-0:4.12.3-12.el8.3.src", "product": { "name": "samba-0:4.12.3-12.el8.3.src", "product_id": "samba-0:4.12.3-12.el8.3.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/samba@4.12.3-12.el8.3?arch=src" } } }, { "category": "product_version", "name": "sssd-0:2.3.0-9.el8.src", "product": { "name": "sssd-0:2.3.0-9.el8.src", "product_id": "sssd-0:2.3.0-9.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/sssd@2.3.0-9.el8?arch=src" } } }, { "category": "product_version", "name": "redhat-release-virtualization-host-0:4.4.4-1.el8ev.src", "product": { "name": "redhat-release-virtualization-host-0:4.4.4-1.el8ev.src", "product_id": "redhat-release-virtualization-host-0:4.4.4-1.el8ev.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/redhat-release-virtualization-host@4.4.4-1.el8ev?arch=src" } } }, { "category": "product_version", "name": "cockpit-ovirt-0:0.14.17-1.el8ev.src", "product": { "name": "cockpit-ovirt-0:0.14.17-1.el8ev.src", "product_id": "cockpit-ovirt-0:0.14.17-1.el8ev.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/cockpit-ovirt@0.14.17-1.el8ev?arch=src" } } }, { "category": "product_version", "name": "imgbased-0:1.2.16-0.1.el8ev.src", "product": { "name": "imgbased-0:1.2.16-0.1.el8ev.src", "product_id": "imgbased-0:1.2.16-0.1.el8ev.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/imgbased@1.2.16-0.1.el8ev?arch=src" } } }, { "category": "product_version", "name": "redhat-virtualization-host-0:4.4.4-20210201.0.el8_3.src", "product": { "name": "redhat-virtualization-host-0:4.4.4-20210201.0.el8_3.src", "product_id": "redhat-virtualization-host-0:4.4.4-20210201.0.el8_3.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/redhat-virtualization-host@4.4.4-20210201.0.el8_3?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "python3-sssdconfig-0:2.3.0-9.el8.noarch", "product": { "name": "python3-sssdconfig-0:2.3.0-9.el8.noarch", "product_id": "python3-sssdconfig-0:2.3.0-9.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-sssdconfig@2.3.0-9.el8?arch=noarch" } } }, { "category": "product_version", "name": "redhat-virtualization-host-image-update-placeholder-0:4.4.4-1.el8ev.noarch", "product": { "name": "redhat-virtualization-host-image-update-placeholder-0:4.4.4-1.el8ev.noarch", "product_id": "redhat-virtualization-host-image-update-placeholder-0:4.4.4-1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/redhat-virtualization-host-image-update-placeholder@4.4.4-1.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "cockpit-ovirt-dashboard-0:0.14.17-1.el8ev.noarch", "product": { "name": "cockpit-ovirt-dashboard-0:0.14.17-1.el8ev.noarch", "product_id": "cockpit-ovirt-dashboard-0:0.14.17-1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/cockpit-ovirt-dashboard@0.14.17-1.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "imgbased-0:1.2.16-0.1.el8ev.noarch", "product": { "name": "imgbased-0:1.2.16-0.1.el8ev.noarch", "product_id": "imgbased-0:1.2.16-0.1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/imgbased@1.2.16-0.1.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "python3-imgbased-0:1.2.16-0.1.el8ev.noarch", "product": { "name": "python3-imgbased-0:1.2.16-0.1.el8ev.noarch", "product_id": "python3-imgbased-0:1.2.16-0.1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-imgbased@1.2.16-0.1.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "redhat-virtualization-host-image-update-0:4.4.4-20210201.0.el8_3.noarch", "product": { "name": "redhat-virtualization-host-image-update-0:4.4.4-20210201.0.el8_3.noarch", "product_id": "redhat-virtualization-host-image-update-0:4.4.4-20210201.0.el8_3.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/redhat-virtualization-host-image-update@4.4.4-20210201.0.el8_3?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "cockpit-ovirt-0:0.14.17-1.el8ev.src as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "8Base-RHV-Agents-4:cockpit-ovirt-0:0.14.17-1.el8ev.src" }, "product_reference": "cockpit-ovirt-0:0.14.17-1.el8ev.src", "relates_to_product_reference": "8Base-RHV-Agents-4" }, { "category": "default_component_of", "full_product_name": { "name": "cockpit-ovirt-dashboard-0:0.14.17-1.el8ev.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "8Base-RHV-Agents-4:cockpit-ovirt-dashboard-0:0.14.17-1.el8ev.noarch" }, "product_reference": "cockpit-ovirt-dashboard-0:0.14.17-1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-Agents-4" }, { "category": "default_component_of", "full_product_name": { "name": "libipa_hbac-0:2.3.0-9.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:libipa_hbac-0:2.3.0-9.el8.x86_64" }, "product_reference": "libipa_hbac-0:2.3.0-9.el8.x86_64", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "libipa_hbac-debuginfo-0:2.3.0-9.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:libipa_hbac-debuginfo-0:2.3.0-9.el8.x86_64" }, "product_reference": "libipa_hbac-debuginfo-0:2.3.0-9.el8.x86_64", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "libsmbclient-0:4.12.3-12.el8.3.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:libsmbclient-0:4.12.3-12.el8.3.x86_64" }, "product_reference": "libsmbclient-0:4.12.3-12.el8.3.x86_64", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "libsmbclient-debuginfo-0:4.12.3-12.el8.3.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:libsmbclient-debuginfo-0:4.12.3-12.el8.3.x86_64" }, "product_reference": "libsmbclient-debuginfo-0:4.12.3-12.el8.3.x86_64", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "libsss_autofs-0:2.3.0-9.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:libsss_autofs-0:2.3.0-9.el8.x86_64" }, "product_reference": "libsss_autofs-0:2.3.0-9.el8.x86_64", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "libsss_autofs-debuginfo-0:2.3.0-9.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:libsss_autofs-debuginfo-0:2.3.0-9.el8.x86_64" }, "product_reference": "libsss_autofs-debuginfo-0:2.3.0-9.el8.x86_64", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "libsss_certmap-0:2.3.0-9.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:libsss_certmap-0:2.3.0-9.el8.x86_64" }, "product_reference": "libsss_certmap-0:2.3.0-9.el8.x86_64", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "libsss_certmap-debuginfo-0:2.3.0-9.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:libsss_certmap-debuginfo-0:2.3.0-9.el8.x86_64" }, "product_reference": "libsss_certmap-debuginfo-0:2.3.0-9.el8.x86_64", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "libsss_idmap-0:2.3.0-9.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:libsss_idmap-0:2.3.0-9.el8.x86_64" }, "product_reference": "libsss_idmap-0:2.3.0-9.el8.x86_64", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "libsss_idmap-debuginfo-0:2.3.0-9.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:libsss_idmap-debuginfo-0:2.3.0-9.el8.x86_64" }, "product_reference": "libsss_idmap-debuginfo-0:2.3.0-9.el8.x86_64", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "libsss_nss_idmap-0:2.3.0-9.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:libsss_nss_idmap-0:2.3.0-9.el8.x86_64" }, "product_reference": "libsss_nss_idmap-0:2.3.0-9.el8.x86_64", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "libsss_nss_idmap-debuginfo-0:2.3.0-9.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:libsss_nss_idmap-debuginfo-0:2.3.0-9.el8.x86_64" }, "product_reference": "libsss_nss_idmap-debuginfo-0:2.3.0-9.el8.x86_64", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "libsss_nss_idmap-devel-0:2.3.0-9.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:libsss_nss_idmap-devel-0:2.3.0-9.el8.x86_64" }, "product_reference": "libsss_nss_idmap-devel-0:2.3.0-9.el8.x86_64", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "libsss_simpleifp-0:2.3.0-9.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:libsss_simpleifp-0:2.3.0-9.el8.x86_64" }, "product_reference": "libsss_simpleifp-0:2.3.0-9.el8.x86_64", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "libsss_simpleifp-debuginfo-0:2.3.0-9.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:libsss_simpleifp-debuginfo-0:2.3.0-9.el8.x86_64" }, "product_reference": "libsss_simpleifp-debuginfo-0:2.3.0-9.el8.x86_64", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "libsss_sudo-0:2.3.0-9.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:libsss_sudo-0:2.3.0-9.el8.x86_64" }, "product_reference": "libsss_sudo-0:2.3.0-9.el8.x86_64", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "libsss_sudo-debuginfo-0:2.3.0-9.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:libsss_sudo-debuginfo-0:2.3.0-9.el8.x86_64" }, "product_reference": "libsss_sudo-debuginfo-0:2.3.0-9.el8.x86_64", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "python3-libipa_hbac-0:2.3.0-9.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:python3-libipa_hbac-0:2.3.0-9.el8.x86_64" }, "product_reference": "python3-libipa_hbac-0:2.3.0-9.el8.x86_64", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "python3-libipa_hbac-debuginfo-0:2.3.0-9.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:python3-libipa_hbac-debuginfo-0:2.3.0-9.el8.x86_64" }, "product_reference": "python3-libipa_hbac-debuginfo-0:2.3.0-9.el8.x86_64", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "python3-libsss_nss_idmap-0:2.3.0-9.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:python3-libsss_nss_idmap-0:2.3.0-9.el8.x86_64" }, "product_reference": "python3-libsss_nss_idmap-0:2.3.0-9.el8.x86_64", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "python3-libsss_nss_idmap-debuginfo-0:2.3.0-9.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:python3-libsss_nss_idmap-debuginfo-0:2.3.0-9.el8.x86_64" }, "product_reference": "python3-libsss_nss_idmap-debuginfo-0:2.3.0-9.el8.x86_64", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "python3-sss-0:2.3.0-9.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:python3-sss-0:2.3.0-9.el8.x86_64" }, "product_reference": "python3-sss-0:2.3.0-9.el8.x86_64", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "python3-sss-debuginfo-0:2.3.0-9.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:python3-sss-debuginfo-0:2.3.0-9.el8.x86_64" }, "product_reference": "python3-sss-debuginfo-0:2.3.0-9.el8.x86_64", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "python3-sss-murmur-0:2.3.0-9.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:python3-sss-murmur-0:2.3.0-9.el8.x86_64" }, "product_reference": "python3-sss-murmur-0:2.3.0-9.el8.x86_64", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "python3-sss-murmur-debuginfo-0:2.3.0-9.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:python3-sss-murmur-debuginfo-0:2.3.0-9.el8.x86_64" }, "product_reference": "python3-sss-murmur-debuginfo-0:2.3.0-9.el8.x86_64", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "python3-sssdconfig-0:2.3.0-9.el8.noarch as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:python3-sssdconfig-0:2.3.0-9.el8.noarch" }, "product_reference": "python3-sssdconfig-0:2.3.0-9.el8.noarch", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "redhat-virtualization-host-0:4.4.4-20210201.0.el8_3.src as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.4-20210201.0.el8_3.src" }, "product_reference": "redhat-virtualization-host-0:4.4.4-20210201.0.el8_3.src", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "redhat-virtualization-host-image-update-0:4.4.4-20210201.0.el8_3.noarch as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.4-20210201.0.el8_3.noarch" }, "product_reference": "redhat-virtualization-host-image-update-0:4.4.4-20210201.0.el8_3.noarch", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "samba-0:4.12.3-12.el8.3.src as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:samba-0:4.12.3-12.el8.3.src" }, "product_reference": "samba-0:4.12.3-12.el8.3.src", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "samba-debuginfo-0:4.12.3-12.el8.3.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:samba-debuginfo-0:4.12.3-12.el8.3.x86_64" }, "product_reference": "samba-debuginfo-0:4.12.3-12.el8.3.x86_64", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "samba-debugsource-0:4.12.3-12.el8.3.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:samba-debugsource-0:4.12.3-12.el8.3.x86_64" }, "product_reference": "samba-debugsource-0:4.12.3-12.el8.3.x86_64", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "sssd-0:2.3.0-9.el8.src as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:sssd-0:2.3.0-9.el8.src" }, "product_reference": "sssd-0:2.3.0-9.el8.src", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "sssd-0:2.3.0-9.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:sssd-0:2.3.0-9.el8.x86_64" }, "product_reference": "sssd-0:2.3.0-9.el8.x86_64", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "sssd-ad-0:2.3.0-9.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:sssd-ad-0:2.3.0-9.el8.x86_64" }, "product_reference": "sssd-ad-0:2.3.0-9.el8.x86_64", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "sssd-ad-debuginfo-0:2.3.0-9.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:sssd-ad-debuginfo-0:2.3.0-9.el8.x86_64" }, "product_reference": "sssd-ad-debuginfo-0:2.3.0-9.el8.x86_64", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "sssd-client-0:2.3.0-9.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:sssd-client-0:2.3.0-9.el8.x86_64" }, "product_reference": "sssd-client-0:2.3.0-9.el8.x86_64", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "sssd-client-debuginfo-0:2.3.0-9.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:sssd-client-debuginfo-0:2.3.0-9.el8.x86_64" }, "product_reference": "sssd-client-debuginfo-0:2.3.0-9.el8.x86_64", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "sssd-common-0:2.3.0-9.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:sssd-common-0:2.3.0-9.el8.x86_64" }, "product_reference": "sssd-common-0:2.3.0-9.el8.x86_64", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "sssd-common-debuginfo-0:2.3.0-9.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:sssd-common-debuginfo-0:2.3.0-9.el8.x86_64" }, "product_reference": "sssd-common-debuginfo-0:2.3.0-9.el8.x86_64", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "sssd-common-pac-0:2.3.0-9.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:sssd-common-pac-0:2.3.0-9.el8.x86_64" }, "product_reference": "sssd-common-pac-0:2.3.0-9.el8.x86_64", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "sssd-common-pac-debuginfo-0:2.3.0-9.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:sssd-common-pac-debuginfo-0:2.3.0-9.el8.x86_64" }, "product_reference": "sssd-common-pac-debuginfo-0:2.3.0-9.el8.x86_64", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "sssd-dbus-0:2.3.0-9.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:sssd-dbus-0:2.3.0-9.el8.x86_64" }, "product_reference": "sssd-dbus-0:2.3.0-9.el8.x86_64", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "sssd-dbus-debuginfo-0:2.3.0-9.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:sssd-dbus-debuginfo-0:2.3.0-9.el8.x86_64" }, "product_reference": "sssd-dbus-debuginfo-0:2.3.0-9.el8.x86_64", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "sssd-debuginfo-0:2.3.0-9.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:sssd-debuginfo-0:2.3.0-9.el8.x86_64" }, "product_reference": "sssd-debuginfo-0:2.3.0-9.el8.x86_64", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "sssd-debugsource-0:2.3.0-9.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:sssd-debugsource-0:2.3.0-9.el8.x86_64" }, "product_reference": "sssd-debugsource-0:2.3.0-9.el8.x86_64", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "sssd-ipa-0:2.3.0-9.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:sssd-ipa-0:2.3.0-9.el8.x86_64" }, "product_reference": "sssd-ipa-0:2.3.0-9.el8.x86_64", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "sssd-ipa-debuginfo-0:2.3.0-9.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:sssd-ipa-debuginfo-0:2.3.0-9.el8.x86_64" }, "product_reference": "sssd-ipa-debuginfo-0:2.3.0-9.el8.x86_64", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "sssd-kcm-0:2.3.0-9.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:sssd-kcm-0:2.3.0-9.el8.x86_64" }, "product_reference": "sssd-kcm-0:2.3.0-9.el8.x86_64", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "sssd-kcm-debuginfo-0:2.3.0-9.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:sssd-kcm-debuginfo-0:2.3.0-9.el8.x86_64" }, "product_reference": "sssd-kcm-debuginfo-0:2.3.0-9.el8.x86_64", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "sssd-krb5-0:2.3.0-9.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:sssd-krb5-0:2.3.0-9.el8.x86_64" }, "product_reference": "sssd-krb5-0:2.3.0-9.el8.x86_64", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "sssd-krb5-common-0:2.3.0-9.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:sssd-krb5-common-0:2.3.0-9.el8.x86_64" }, "product_reference": "sssd-krb5-common-0:2.3.0-9.el8.x86_64", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "sssd-krb5-common-debuginfo-0:2.3.0-9.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:sssd-krb5-common-debuginfo-0:2.3.0-9.el8.x86_64" }, "product_reference": "sssd-krb5-common-debuginfo-0:2.3.0-9.el8.x86_64", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "sssd-krb5-debuginfo-0:2.3.0-9.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:sssd-krb5-debuginfo-0:2.3.0-9.el8.x86_64" }, "product_reference": "sssd-krb5-debuginfo-0:2.3.0-9.el8.x86_64", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "sssd-ldap-0:2.3.0-9.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:sssd-ldap-0:2.3.0-9.el8.x86_64" }, "product_reference": "sssd-ldap-0:2.3.0-9.el8.x86_64", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "sssd-ldap-debuginfo-0:2.3.0-9.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:sssd-ldap-debuginfo-0:2.3.0-9.el8.x86_64" }, "product_reference": "sssd-ldap-debuginfo-0:2.3.0-9.el8.x86_64", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "sssd-libwbclient-0:2.3.0-9.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:sssd-libwbclient-0:2.3.0-9.el8.x86_64" }, "product_reference": "sssd-libwbclient-0:2.3.0-9.el8.x86_64", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "sssd-libwbclient-debuginfo-0:2.3.0-9.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:sssd-libwbclient-debuginfo-0:2.3.0-9.el8.x86_64" }, "product_reference": "sssd-libwbclient-debuginfo-0:2.3.0-9.el8.x86_64", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "sssd-nfs-idmap-0:2.3.0-9.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:sssd-nfs-idmap-0:2.3.0-9.el8.x86_64" }, "product_reference": "sssd-nfs-idmap-0:2.3.0-9.el8.x86_64", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "sssd-nfs-idmap-debuginfo-0:2.3.0-9.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:sssd-nfs-idmap-debuginfo-0:2.3.0-9.el8.x86_64" }, "product_reference": "sssd-nfs-idmap-debuginfo-0:2.3.0-9.el8.x86_64", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "sssd-polkit-rules-0:2.3.0-9.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:sssd-polkit-rules-0:2.3.0-9.el8.x86_64" }, "product_reference": "sssd-polkit-rules-0:2.3.0-9.el8.x86_64", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "sssd-proxy-0:2.3.0-9.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:sssd-proxy-0:2.3.0-9.el8.x86_64" }, "product_reference": "sssd-proxy-0:2.3.0-9.el8.x86_64", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "sssd-proxy-debuginfo-0:2.3.0-9.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:sssd-proxy-debuginfo-0:2.3.0-9.el8.x86_64" }, "product_reference": "sssd-proxy-debuginfo-0:2.3.0-9.el8.x86_64", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "sssd-tools-0:2.3.0-9.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:sssd-tools-0:2.3.0-9.el8.x86_64" }, "product_reference": "sssd-tools-0:2.3.0-9.el8.x86_64", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "sssd-tools-debuginfo-0:2.3.0-9.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:sssd-tools-debuginfo-0:2.3.0-9.el8.x86_64" }, "product_reference": "sssd-tools-debuginfo-0:2.3.0-9.el8.x86_64", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "sssd-winbind-idmap-0:2.3.0-9.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:sssd-winbind-idmap-0:2.3.0-9.el8.x86_64" }, "product_reference": "sssd-winbind-idmap-0:2.3.0-9.el8.x86_64", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "sssd-winbind-idmap-debuginfo-0:2.3.0-9.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:sssd-winbind-idmap-debuginfo-0:2.3.0-9.el8.x86_64" }, "product_reference": "sssd-winbind-idmap-debuginfo-0:2.3.0-9.el8.x86_64", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "imgbased-0:1.2.16-0.1.el8ev.noarch as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)", "product_id": "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.16-0.1.el8ev.noarch" }, "product_reference": "imgbased-0:1.2.16-0.1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-HypervisorBuild-4" }, { "category": "default_component_of", "full_product_name": { "name": "imgbased-0:1.2.16-0.1.el8ev.src as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)", "product_id": "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.16-0.1.el8ev.src" }, "product_reference": "imgbased-0:1.2.16-0.1.el8ev.src", "relates_to_product_reference": "8Base-RHV-HypervisorBuild-4" }, { "category": "default_component_of", "full_product_name": { "name": "python3-imgbased-0:1.2.16-0.1.el8ev.noarch as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)", "product_id": "8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.16-0.1.el8ev.noarch" }, "product_reference": "python3-imgbased-0:1.2.16-0.1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-HypervisorBuild-4" }, { "category": "default_component_of", "full_product_name": { "name": "redhat-release-virtualization-host-0:4.4.4-1.el8ev.src as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)", "product_id": "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.4-1.el8ev.src" }, "product_reference": "redhat-release-virtualization-host-0:4.4.4-1.el8ev.src", "relates_to_product_reference": "8Base-RHV-HypervisorBuild-4" }, { "category": "default_component_of", "full_product_name": { "name": "redhat-release-virtualization-host-0:4.4.4-1.el8ev.x86_64 as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)", "product_id": "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.4-1.el8ev.x86_64" }, "product_reference": "redhat-release-virtualization-host-0:4.4.4-1.el8ev.x86_64", "relates_to_product_reference": "8Base-RHV-HypervisorBuild-4" }, { "category": "default_component_of", "full_product_name": { "name": "redhat-virtualization-host-image-update-placeholder-0:4.4.4-1.el8ev.noarch as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)", "product_id": "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.4-1.el8ev.noarch" }, "product_reference": "redhat-virtualization-host-image-update-placeholder-0:4.4.4-1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-HypervisorBuild-4" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Moshe Kol", "Shlomi Oberman" ], "organization": "JSOF" } ], "cve": "CVE-2020-25684", "cwe": { "id": "CWE-358", "name": "Improperly Implemented Security Check for Standard" }, "discovery_date": "2020-09-03T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHV-Agents-4:cockpit-ovirt-0:0.14.17-1.el8ev.src", "8Base-RHV-Agents-4:cockpit-ovirt-dashboard-0:0.14.17-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:libipa_hbac-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libipa_hbac-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsmbclient-0:4.12.3-12.el8.3.x86_64", "8Base-RHV-Hypervisor-4:libsmbclient-debuginfo-0:4.12.3-12.el8.3.x86_64", "8Base-RHV-Hypervisor-4:libsss_autofs-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_autofs-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_certmap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_certmap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_idmap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_idmap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_nss_idmap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_nss_idmap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_nss_idmap-devel-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_simpleifp-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_simpleifp-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_sudo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_sudo-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-libipa_hbac-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-libipa_hbac-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-libsss_nss_idmap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-libsss_nss_idmap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-sss-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-sss-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-sss-murmur-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-sss-murmur-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-sssdconfig-0:2.3.0-9.el8.noarch", "8Base-RHV-Hypervisor-4:samba-0:4.12.3-12.el8.3.src", "8Base-RHV-Hypervisor-4:samba-debuginfo-0:4.12.3-12.el8.3.x86_64", "8Base-RHV-Hypervisor-4:samba-debugsource-0:4.12.3-12.el8.3.x86_64", "8Base-RHV-Hypervisor-4:sssd-0:2.3.0-9.el8.src", "8Base-RHV-Hypervisor-4:sssd-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-ad-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-ad-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-client-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-client-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-common-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-common-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-common-pac-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-common-pac-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-dbus-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-dbus-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-debugsource-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-ipa-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-ipa-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-kcm-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-kcm-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-krb5-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-krb5-common-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-krb5-common-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-krb5-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-ldap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-ldap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-libwbclient-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-libwbclient-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-nfs-idmap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-nfs-idmap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-polkit-rules-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-proxy-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-proxy-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-tools-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-tools-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-winbind-idmap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-winbind-idmap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.16-0.1.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.16-0.1.el8ev.src", "8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.16-0.1.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.4-1.el8ev.src", "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.4-1.el8ev.x86_64", "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.4-1.el8ev.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1889686" } ], "notes": [ { "category": "description", "text": "A flaw was found in dnsmasq. When getting a reply from a forwarded query, dnsmasq checks in the forward.c:reply_query() if the reply destination address/port is used by the pending forwarded queries. However, it does not use the address/port to retrieve the exact forwarded query, substantially reducing the number of attempts an attacker on the network would have to perform to forge a reply and get it accepted by dnsmasq. This issue contrasts with RFC5452, which specifies a query\u0027s attributes that all must be used to match a reply. This flaw allows an attacker to perform a DNS Cache Poisoning attack. If chained with CVE-2020-25685 or CVE-2020-25686, the attack complexity of a successful attack is reduced. The highest threat from this vulnerability is to data integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "dnsmasq: loose address/port check in reply_query() makes forging replies easier for an off-path attacker", "title": "Vulnerability summary" }, { "category": "other", "text": "Dnsmasq may be run by libvirt and/or NetworkManager. libvirt uses dnsmasq by default to provide DNS service to its guests. NetworkManager may be configured to use dnsmasq to provide DNS service to the system, if a line `dns=dnsmasq` is present in the `[main]` section of the configuration file /etc/NetworkManager/NetworkManager.conf.\n\nIn Red Hat OpenStack Platform (RHOSP) and Red Hat Virtualization (RHV), the dnsmasq package is provided by the underlying Red Hat Enterprise Linux (RHEL) product. RHOSP and RHV are therefore indirectly affected, so please ensure that the underlying RHEL dnsmasq package is updated.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.4-20210201.0.el8_3.src", "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.4-20210201.0.el8_3.noarch" ], "known_not_affected": [ "8Base-RHV-Agents-4:cockpit-ovirt-0:0.14.17-1.el8ev.src", "8Base-RHV-Agents-4:cockpit-ovirt-dashboard-0:0.14.17-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:libipa_hbac-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libipa_hbac-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsmbclient-0:4.12.3-12.el8.3.x86_64", "8Base-RHV-Hypervisor-4:libsmbclient-debuginfo-0:4.12.3-12.el8.3.x86_64", "8Base-RHV-Hypervisor-4:libsss_autofs-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_autofs-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_certmap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_certmap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_idmap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_idmap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_nss_idmap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_nss_idmap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_nss_idmap-devel-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_simpleifp-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_simpleifp-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_sudo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_sudo-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-libipa_hbac-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-libipa_hbac-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-libsss_nss_idmap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-libsss_nss_idmap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-sss-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-sss-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-sss-murmur-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-sss-murmur-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-sssdconfig-0:2.3.0-9.el8.noarch", "8Base-RHV-Hypervisor-4:samba-0:4.12.3-12.el8.3.src", "8Base-RHV-Hypervisor-4:samba-debuginfo-0:4.12.3-12.el8.3.x86_64", "8Base-RHV-Hypervisor-4:samba-debugsource-0:4.12.3-12.el8.3.x86_64", "8Base-RHV-Hypervisor-4:sssd-0:2.3.0-9.el8.src", "8Base-RHV-Hypervisor-4:sssd-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-ad-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-ad-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-client-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-client-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-common-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-common-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-common-pac-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-common-pac-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-dbus-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-dbus-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-debugsource-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-ipa-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-ipa-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-kcm-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-kcm-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-krb5-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-krb5-common-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-krb5-common-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-krb5-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-ldap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-ldap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-libwbclient-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-libwbclient-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-nfs-idmap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-nfs-idmap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-polkit-rules-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-proxy-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-proxy-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-tools-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-tools-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-winbind-idmap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-winbind-idmap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.16-0.1.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.16-0.1.el8ev.src", "8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.16-0.1.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.4-1.el8ev.src", "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.4-1.el8ev.x86_64", "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.4-1.el8ev.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-25684" }, { "category": "external", "summary": "RHBZ#1889686", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889686" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-25684", "url": "https://www.cve.org/CVERecord?id=CVE-2020-25684" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25684", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25684" }, { "category": "external", "summary": "https://www.jsof-tech.com/disclosures/dnspooq/", "url": "https://www.jsof-tech.com/disclosures/dnspooq/" } ], "release_date": "2021-01-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891\n\nAfter installing this update, the smb service will be restarted automatically.", "product_ids": [ "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.4-20210201.0.el8_3.src", "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.4-20210201.0.el8_3.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0401" }, { "category": "workaround", "details": "The impact of this flaw can be reduced by disabling the dnsmasq cache by adding `--cache-size=0` when calling dnsmasq or by adding a line with `cache-size=0` to the dnsmasq configuration file (/etc/dnsmasq.conf by default).\n\nWhen using Red Hat Enterprise Linux 8.3 with libvirt through a virt:rhel module, use `virsh net-edit \u003cnetwork-name\u003e` and reference https://libvirt.org/formatnetwork.html#elementsNamespaces to add the suggested option `cache-size=0`. \n\nThere is no way to customize the dnsmasq configuration generated by libvirt, when using versions of Red Hat Enterprise Linux prior to version 8.3. If dnsmasq is being run through NetworkManager, create a new file in /etc/NetworkManager/dnsmasq.d/ and add `cache-size=0` to it.\n\nIn all cases, by disabling the cache, you may experience a performance loss in your environment due to all DNS queries being forwarded to the upstream servers. Please evaluate if the mitigation is appropriate for the system\u2019s environment before applying.", "product_ids": [ "8Base-RHV-Agents-4:cockpit-ovirt-0:0.14.17-1.el8ev.src", "8Base-RHV-Agents-4:cockpit-ovirt-dashboard-0:0.14.17-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:libipa_hbac-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libipa_hbac-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsmbclient-0:4.12.3-12.el8.3.x86_64", "8Base-RHV-Hypervisor-4:libsmbclient-debuginfo-0:4.12.3-12.el8.3.x86_64", "8Base-RHV-Hypervisor-4:libsss_autofs-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_autofs-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_certmap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_certmap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_idmap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_idmap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_nss_idmap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_nss_idmap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_nss_idmap-devel-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_simpleifp-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_simpleifp-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_sudo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_sudo-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-libipa_hbac-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-libipa_hbac-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-libsss_nss_idmap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-libsss_nss_idmap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-sss-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-sss-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-sss-murmur-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-sss-murmur-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-sssdconfig-0:2.3.0-9.el8.noarch", "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.4-20210201.0.el8_3.src", "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.4-20210201.0.el8_3.noarch", "8Base-RHV-Hypervisor-4:samba-0:4.12.3-12.el8.3.src", "8Base-RHV-Hypervisor-4:samba-debuginfo-0:4.12.3-12.el8.3.x86_64", "8Base-RHV-Hypervisor-4:samba-debugsource-0:4.12.3-12.el8.3.x86_64", "8Base-RHV-Hypervisor-4:sssd-0:2.3.0-9.el8.src", "8Base-RHV-Hypervisor-4:sssd-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-ad-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-ad-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-client-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-client-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-common-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-common-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-common-pac-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-common-pac-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-dbus-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-dbus-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-debugsource-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-ipa-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-ipa-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-kcm-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-kcm-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-krb5-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-krb5-common-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-krb5-common-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-krb5-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-ldap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-ldap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-libwbclient-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-libwbclient-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-nfs-idmap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-nfs-idmap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-polkit-rules-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-proxy-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-proxy-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-tools-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-tools-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-winbind-idmap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-winbind-idmap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.16-0.1.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.16-0.1.el8ev.src", "8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.16-0.1.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.4-1.el8ev.src", "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.4-1.el8ev.x86_64", "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.4-1.el8ev.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N", "version": "3.1" }, "products": [ "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.4-20210201.0.el8_3.src", "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.4-20210201.0.el8_3.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "dnsmasq: loose address/port check in reply_query() makes forging replies easier for an off-path attacker" }, { "acknowledgments": [ { "names": [ "Moshe Kol", "Shlomi Oberman" ], "organization": "JSOF" } ], "cve": "CVE-2020-25685", "cwe": { "id": "CWE-326", "name": "Inadequate Encryption Strength" }, "discovery_date": "2020-09-03T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHV-Agents-4:cockpit-ovirt-0:0.14.17-1.el8ev.src", "8Base-RHV-Agents-4:cockpit-ovirt-dashboard-0:0.14.17-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:libipa_hbac-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libipa_hbac-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsmbclient-0:4.12.3-12.el8.3.x86_64", "8Base-RHV-Hypervisor-4:libsmbclient-debuginfo-0:4.12.3-12.el8.3.x86_64", "8Base-RHV-Hypervisor-4:libsss_autofs-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_autofs-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_certmap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_certmap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_idmap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_idmap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_nss_idmap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_nss_idmap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_nss_idmap-devel-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_simpleifp-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_simpleifp-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_sudo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_sudo-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-libipa_hbac-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-libipa_hbac-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-libsss_nss_idmap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-libsss_nss_idmap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-sss-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-sss-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-sss-murmur-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-sss-murmur-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-sssdconfig-0:2.3.0-9.el8.noarch", "8Base-RHV-Hypervisor-4:samba-0:4.12.3-12.el8.3.src", "8Base-RHV-Hypervisor-4:samba-debuginfo-0:4.12.3-12.el8.3.x86_64", "8Base-RHV-Hypervisor-4:samba-debugsource-0:4.12.3-12.el8.3.x86_64", "8Base-RHV-Hypervisor-4:sssd-0:2.3.0-9.el8.src", "8Base-RHV-Hypervisor-4:sssd-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-ad-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-ad-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-client-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-client-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-common-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-common-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-common-pac-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-common-pac-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-dbus-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-dbus-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-debugsource-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-ipa-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-ipa-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-kcm-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-kcm-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-krb5-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-krb5-common-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-krb5-common-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-krb5-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-ldap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-ldap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-libwbclient-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-libwbclient-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-nfs-idmap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-nfs-idmap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-polkit-rules-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-proxy-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-proxy-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-tools-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-tools-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-winbind-idmap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-winbind-idmap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.16-0.1.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.16-0.1.el8ev.src", "8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.16-0.1.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.4-1.el8ev.src", "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.4-1.el8ev.x86_64", "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.4-1.el8ev.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1889688" } ], "notes": [ { "category": "description", "text": "A flaw was found in dnsmasq. When getting a reply from a forwarded query, dnsmasq checks in forward.c:reply_query(), which is the forwarded query that matches the reply, by only using a weak hash of the query name. Due to the weak hash (CRC32 when dnsmasq is compiled without DNSSEC, SHA-1 when it is) this flaw allows an off-path attacker to find several different domains all having the same hash, substantially reducing the number of attempts they would have to perform to forge a reply and get it accepted by dnsmasq. This is in contrast with RFC5452, which specifies that the query name is one of the attributes of a query that must be used to match a reply. This flaw could be abused to perform a DNS Cache Poisoning attack. If chained with CVE-2020-25684 the attack complexity of a successful attack is reduced. The highest threat from this vulnerability is to data integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "dnsmasq: loose query name check in reply_query() makes forging replies easier for an off-path attacker", "title": "Vulnerability summary" }, { "category": "other", "text": "Dnsmasq may be run by libvirt and/or NetworkManager. libvirt uses dnsmasq by default to provide DNS service to its guests. NetworkManager may be configured to use dnsmasq to provide DNS service to the system, if a line `dns=dnsmasq` is present in the `[main]` section of the configuration file /etc/NetworkManager/NetworkManager.conf.\n\nIn Red Hat OpenStack Platform (RHOSP) and Red Hat Virtualization (RHV), the dnsmasq package is provided by the underlying Red Hat Enterprise Linux (RHEL) product. RHOSP and RHV are therefore indirectly affected, so please ensure that the underlying RHEL dnsmasq package is updated.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.4-20210201.0.el8_3.src", "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.4-20210201.0.el8_3.noarch" ], "known_not_affected": [ "8Base-RHV-Agents-4:cockpit-ovirt-0:0.14.17-1.el8ev.src", "8Base-RHV-Agents-4:cockpit-ovirt-dashboard-0:0.14.17-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:libipa_hbac-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libipa_hbac-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsmbclient-0:4.12.3-12.el8.3.x86_64", "8Base-RHV-Hypervisor-4:libsmbclient-debuginfo-0:4.12.3-12.el8.3.x86_64", "8Base-RHV-Hypervisor-4:libsss_autofs-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_autofs-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_certmap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_certmap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_idmap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_idmap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_nss_idmap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_nss_idmap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_nss_idmap-devel-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_simpleifp-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_simpleifp-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_sudo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_sudo-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-libipa_hbac-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-libipa_hbac-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-libsss_nss_idmap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-libsss_nss_idmap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-sss-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-sss-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-sss-murmur-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-sss-murmur-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-sssdconfig-0:2.3.0-9.el8.noarch", "8Base-RHV-Hypervisor-4:samba-0:4.12.3-12.el8.3.src", "8Base-RHV-Hypervisor-4:samba-debuginfo-0:4.12.3-12.el8.3.x86_64", "8Base-RHV-Hypervisor-4:samba-debugsource-0:4.12.3-12.el8.3.x86_64", "8Base-RHV-Hypervisor-4:sssd-0:2.3.0-9.el8.src", "8Base-RHV-Hypervisor-4:sssd-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-ad-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-ad-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-client-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-client-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-common-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-common-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-common-pac-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-common-pac-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-dbus-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-dbus-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-debugsource-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-ipa-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-ipa-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-kcm-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-kcm-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-krb5-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-krb5-common-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-krb5-common-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-krb5-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-ldap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-ldap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-libwbclient-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-libwbclient-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-nfs-idmap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-nfs-idmap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-polkit-rules-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-proxy-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-proxy-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-tools-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-tools-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-winbind-idmap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-winbind-idmap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.16-0.1.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.16-0.1.el8ev.src", "8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.16-0.1.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.4-1.el8ev.src", "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.4-1.el8ev.x86_64", "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.4-1.el8ev.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-25685" }, { "category": "external", "summary": "RHBZ#1889688", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889688" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-25685", "url": "https://www.cve.org/CVERecord?id=CVE-2020-25685" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25685", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25685" }, { "category": "external", "summary": "https://www.jsof-tech.com/disclosures/dnspooq/", "url": "https://www.jsof-tech.com/disclosures/dnspooq/" } ], "release_date": "2021-01-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891\n\nAfter installing this update, the smb service will be restarted automatically.", "product_ids": [ "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.4-20210201.0.el8_3.src", "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.4-20210201.0.el8_3.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0401" }, { "category": "workaround", "details": "The impact of this flaw can be reduced by disabling the dnsmasq cache by adding `--cache-size=0` when calling dnsmasq or by adding a line with `cache-size=0` to the dnsmasq configuration file (/etc/dnsmasq.conf by default). \n\nWhen using Red Hat Enterprise Linux 8.3 with libvirt through a virt:rhel module, use `virsh net-edit \u003cnetwork-name\u003e` and reference https://libvirt.org/formatnetwork.html#elementsNamespaces to add the suggested option `cache-size=0`. \n\nThere is no way to customize the dnsmasq configuration generated by libvirt, when using versions of Red Hat Enterprise Linux prior to version 8.3. If dnsmasq is being run through NetworkManager, create a new file in /etc/NetworkManager/dnsmasq.d/ and add `cache-size=0` to it.\n\nIn all cases, by disabling the cache, you may experience a performance loss in your environment due to all DNS queries being forwarded to the upstream servers. Please evaluate if the mitigation is appropriate for the system\u2019s environment before applying.", "product_ids": [ "8Base-RHV-Agents-4:cockpit-ovirt-0:0.14.17-1.el8ev.src", "8Base-RHV-Agents-4:cockpit-ovirt-dashboard-0:0.14.17-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:libipa_hbac-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libipa_hbac-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsmbclient-0:4.12.3-12.el8.3.x86_64", "8Base-RHV-Hypervisor-4:libsmbclient-debuginfo-0:4.12.3-12.el8.3.x86_64", "8Base-RHV-Hypervisor-4:libsss_autofs-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_autofs-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_certmap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_certmap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_idmap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_idmap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_nss_idmap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_nss_idmap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_nss_idmap-devel-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_simpleifp-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_simpleifp-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_sudo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_sudo-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-libipa_hbac-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-libipa_hbac-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-libsss_nss_idmap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-libsss_nss_idmap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-sss-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-sss-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-sss-murmur-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-sss-murmur-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-sssdconfig-0:2.3.0-9.el8.noarch", "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.4-20210201.0.el8_3.src", "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.4-20210201.0.el8_3.noarch", "8Base-RHV-Hypervisor-4:samba-0:4.12.3-12.el8.3.src", "8Base-RHV-Hypervisor-4:samba-debuginfo-0:4.12.3-12.el8.3.x86_64", "8Base-RHV-Hypervisor-4:samba-debugsource-0:4.12.3-12.el8.3.x86_64", "8Base-RHV-Hypervisor-4:sssd-0:2.3.0-9.el8.src", "8Base-RHV-Hypervisor-4:sssd-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-ad-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-ad-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-client-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-client-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-common-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-common-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-common-pac-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-common-pac-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-dbus-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-dbus-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-debugsource-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-ipa-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-ipa-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-kcm-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-kcm-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-krb5-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-krb5-common-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-krb5-common-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-krb5-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-ldap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-ldap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-libwbclient-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-libwbclient-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-nfs-idmap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-nfs-idmap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-polkit-rules-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-proxy-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-proxy-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-tools-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-tools-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-winbind-idmap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-winbind-idmap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.16-0.1.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.16-0.1.el8ev.src", "8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.16-0.1.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.4-1.el8ev.src", "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.4-1.el8ev.x86_64", "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.4-1.el8ev.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N", "version": "3.1" }, "products": [ "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.4-20210201.0.el8_3.src", "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.4-20210201.0.el8_3.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "dnsmasq: loose query name check in reply_query() makes forging replies easier for an off-path attacker" }, { "acknowledgments": [ { "names": [ "Moshe Kol", "Shlomi Oberman" ], "organization": "JSOF" } ], "cve": "CVE-2020-25686", "cwe": { "id": "CWE-290", "name": "Authentication Bypass by Spoofing" }, "discovery_date": "2020-09-03T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHV-Agents-4:cockpit-ovirt-0:0.14.17-1.el8ev.src", "8Base-RHV-Agents-4:cockpit-ovirt-dashboard-0:0.14.17-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:libipa_hbac-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libipa_hbac-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsmbclient-0:4.12.3-12.el8.3.x86_64", "8Base-RHV-Hypervisor-4:libsmbclient-debuginfo-0:4.12.3-12.el8.3.x86_64", "8Base-RHV-Hypervisor-4:libsss_autofs-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_autofs-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_certmap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_certmap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_idmap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_idmap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_nss_idmap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_nss_idmap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_nss_idmap-devel-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_simpleifp-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_simpleifp-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_sudo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_sudo-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-libipa_hbac-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-libipa_hbac-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-libsss_nss_idmap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-libsss_nss_idmap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-sss-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-sss-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-sss-murmur-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-sss-murmur-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-sssdconfig-0:2.3.0-9.el8.noarch", "8Base-RHV-Hypervisor-4:samba-0:4.12.3-12.el8.3.src", "8Base-RHV-Hypervisor-4:samba-debuginfo-0:4.12.3-12.el8.3.x86_64", "8Base-RHV-Hypervisor-4:samba-debugsource-0:4.12.3-12.el8.3.x86_64", "8Base-RHV-Hypervisor-4:sssd-0:2.3.0-9.el8.src", "8Base-RHV-Hypervisor-4:sssd-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-ad-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-ad-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-client-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-client-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-common-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-common-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-common-pac-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-common-pac-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-dbus-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-dbus-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-debugsource-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-ipa-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-ipa-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-kcm-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-kcm-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-krb5-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-krb5-common-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-krb5-common-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-krb5-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-ldap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-ldap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-libwbclient-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-libwbclient-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-nfs-idmap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-nfs-idmap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-polkit-rules-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-proxy-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-proxy-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-tools-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-tools-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-winbind-idmap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-winbind-idmap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.16-0.1.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.16-0.1.el8ev.src", "8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.16-0.1.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.4-1.el8ev.src", "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.4-1.el8ev.x86_64", "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.4-1.el8ev.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1890125" } ], "notes": [ { "category": "description", "text": "A flaw was found in dnsmasq. When receiving a query, dnsmasq does not check for an existing pending request for the same name and forwards a new request. By default, a maximum of 150 pending queries can be sent to upstream servers, so there can be at most 150 queries for the same name. This flaw allows an off-path attacker on the network to substantially reduce the number of attempts that it would have to perform to forge a reply and have it accepted by dnsmasq. This issue is mentioned in the \"Birthday Attacks\" section of RFC5452. If chained with CVE-2020-25684, the attack complexity of a successful attack is reduced. The highest threat from this vulnerability is to data integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "dnsmasq: multiple queries forwarded for the same name makes forging replies easier for an off-path attacker", "title": "Vulnerability summary" }, { "category": "other", "text": "Dnsmasq may be run by libvirt and/or NetworkManager. libvirt uses dnsmasq by default to provide DNS service to its guests. NetworkManager may be configured to use dnsmasq to provide DNS service to the system, if a line `dns=dnsmasq` is present in the `[main]` section of the configuration file /etc/NetworkManager/NetworkManager.conf.\n\nIn Red Hat OpenStack Platform (RHOSP) and Red Hat Virtualization (RHV), the dnsmasq package is provided by the underlying Red Hat Enterprise Linux (RHEL) product. RHOSP and RHV are therefore indirectly affected, so please ensure that the underlying RHEL dnsmasq package is updated.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.4-20210201.0.el8_3.src", "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.4-20210201.0.el8_3.noarch" ], "known_not_affected": [ "8Base-RHV-Agents-4:cockpit-ovirt-0:0.14.17-1.el8ev.src", "8Base-RHV-Agents-4:cockpit-ovirt-dashboard-0:0.14.17-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:libipa_hbac-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libipa_hbac-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsmbclient-0:4.12.3-12.el8.3.x86_64", "8Base-RHV-Hypervisor-4:libsmbclient-debuginfo-0:4.12.3-12.el8.3.x86_64", "8Base-RHV-Hypervisor-4:libsss_autofs-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_autofs-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_certmap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_certmap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_idmap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_idmap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_nss_idmap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_nss_idmap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_nss_idmap-devel-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_simpleifp-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_simpleifp-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_sudo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_sudo-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-libipa_hbac-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-libipa_hbac-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-libsss_nss_idmap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-libsss_nss_idmap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-sss-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-sss-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-sss-murmur-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-sss-murmur-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-sssdconfig-0:2.3.0-9.el8.noarch", "8Base-RHV-Hypervisor-4:samba-0:4.12.3-12.el8.3.src", "8Base-RHV-Hypervisor-4:samba-debuginfo-0:4.12.3-12.el8.3.x86_64", "8Base-RHV-Hypervisor-4:samba-debugsource-0:4.12.3-12.el8.3.x86_64", "8Base-RHV-Hypervisor-4:sssd-0:2.3.0-9.el8.src", "8Base-RHV-Hypervisor-4:sssd-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-ad-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-ad-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-client-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-client-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-common-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-common-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-common-pac-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-common-pac-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-dbus-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-dbus-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-debugsource-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-ipa-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-ipa-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-kcm-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-kcm-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-krb5-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-krb5-common-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-krb5-common-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-krb5-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-ldap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-ldap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-libwbclient-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-libwbclient-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-nfs-idmap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-nfs-idmap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-polkit-rules-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-proxy-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-proxy-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-tools-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-tools-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-winbind-idmap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-winbind-idmap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.16-0.1.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.16-0.1.el8ev.src", "8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.16-0.1.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.4-1.el8ev.src", "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.4-1.el8ev.x86_64", "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.4-1.el8ev.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-25686" }, { "category": "external", "summary": "RHBZ#1890125", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890125" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-25686", "url": "https://www.cve.org/CVERecord?id=CVE-2020-25686" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25686", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25686" }, { "category": "external", "summary": "https://www.jsof-tech.com/disclosures/dnspooq/", "url": "https://www.jsof-tech.com/disclosures/dnspooq/" } ], "release_date": "2021-01-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891\n\nAfter installing this update, the smb service will be restarted automatically.", "product_ids": [ "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.4-20210201.0.el8_3.src", "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.4-20210201.0.el8_3.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0401" }, { "category": "workaround", "details": "The impact of this flaw can be reduced by disabling the dnsmasq cache by adding `--cache-size=0` when calling dnsmasq or by adding a line with `cache-size=0` to the dnsmasq configuration file (/etc/dnsmasq.conf by default). \n\nWhen using Red Hat Enterprise Linux 8.3 with libvirt through a virt:rhel module, use `virsh net-edit \u003cnetwork-name\u003e` and reference https://libvirt.org/formatnetwork.html#elementsNamespaces to add the suggested option `cache-size=0`. \n\nThere is no way to customize the dnsmasq configuration generated by libvirt, when using versions of Red Hat Enterprise Linux prior to version 8.3. If dnsmasq is being run through NetworkManager, create a new file in /etc/NetworkManager/dnsmasq.d/ and add `cache-size=0` to it.\n\nIn all cases, by disabling the cache, you may experience a performance loss in your environment due to all DNS queries being forwarded to the upstream servers. Please evaluate if the mitigation is appropriate for the system\u2019s environment before applying.", "product_ids": [ "8Base-RHV-Agents-4:cockpit-ovirt-0:0.14.17-1.el8ev.src", "8Base-RHV-Agents-4:cockpit-ovirt-dashboard-0:0.14.17-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:libipa_hbac-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libipa_hbac-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsmbclient-0:4.12.3-12.el8.3.x86_64", "8Base-RHV-Hypervisor-4:libsmbclient-debuginfo-0:4.12.3-12.el8.3.x86_64", "8Base-RHV-Hypervisor-4:libsss_autofs-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_autofs-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_certmap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_certmap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_idmap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_idmap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_nss_idmap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_nss_idmap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_nss_idmap-devel-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_simpleifp-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_simpleifp-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_sudo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_sudo-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-libipa_hbac-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-libipa_hbac-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-libsss_nss_idmap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-libsss_nss_idmap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-sss-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-sss-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-sss-murmur-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-sss-murmur-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-sssdconfig-0:2.3.0-9.el8.noarch", "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.4-20210201.0.el8_3.src", "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.4-20210201.0.el8_3.noarch", "8Base-RHV-Hypervisor-4:samba-0:4.12.3-12.el8.3.src", "8Base-RHV-Hypervisor-4:samba-debuginfo-0:4.12.3-12.el8.3.x86_64", "8Base-RHV-Hypervisor-4:samba-debugsource-0:4.12.3-12.el8.3.x86_64", "8Base-RHV-Hypervisor-4:sssd-0:2.3.0-9.el8.src", "8Base-RHV-Hypervisor-4:sssd-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-ad-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-ad-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-client-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-client-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-common-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-common-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-common-pac-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-common-pac-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-dbus-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-dbus-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-debugsource-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-ipa-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-ipa-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-kcm-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-kcm-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-krb5-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-krb5-common-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-krb5-common-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-krb5-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-ldap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-ldap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-libwbclient-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-libwbclient-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-nfs-idmap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-nfs-idmap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-polkit-rules-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-proxy-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-proxy-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-tools-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-tools-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-winbind-idmap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-winbind-idmap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.16-0.1.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.16-0.1.el8ev.src", "8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.16-0.1.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.4-1.el8ev.src", "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.4-1.el8ev.x86_64", "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.4-1.el8ev.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N", "version": "3.1" }, "products": [ "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.4-20210201.0.el8_3.src", "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.4-20210201.0.el8_3.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "dnsmasq: multiple queries forwarded for the same name makes forging replies easier for an off-path attacker" }, { "cve": "CVE-2021-3156", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2021-01-19T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHV-Agents-4:cockpit-ovirt-0:0.14.17-1.el8ev.src", "8Base-RHV-Agents-4:cockpit-ovirt-dashboard-0:0.14.17-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:libipa_hbac-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libipa_hbac-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsmbclient-0:4.12.3-12.el8.3.x86_64", "8Base-RHV-Hypervisor-4:libsmbclient-debuginfo-0:4.12.3-12.el8.3.x86_64", "8Base-RHV-Hypervisor-4:libsss_autofs-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_autofs-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_certmap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_certmap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_idmap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_idmap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_nss_idmap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_nss_idmap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_nss_idmap-devel-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_simpleifp-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_simpleifp-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_sudo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_sudo-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-libipa_hbac-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-libipa_hbac-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-libsss_nss_idmap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-libsss_nss_idmap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-sss-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-sss-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-sss-murmur-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-sss-murmur-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-sssdconfig-0:2.3.0-9.el8.noarch", "8Base-RHV-Hypervisor-4:samba-0:4.12.3-12.el8.3.src", "8Base-RHV-Hypervisor-4:samba-debuginfo-0:4.12.3-12.el8.3.x86_64", "8Base-RHV-Hypervisor-4:samba-debugsource-0:4.12.3-12.el8.3.x86_64", "8Base-RHV-Hypervisor-4:sssd-0:2.3.0-9.el8.src", "8Base-RHV-Hypervisor-4:sssd-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-ad-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-ad-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-client-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-client-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-common-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-common-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-common-pac-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-common-pac-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-dbus-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-dbus-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-debugsource-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-ipa-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-ipa-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-kcm-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-kcm-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-krb5-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-krb5-common-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-krb5-common-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-krb5-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-ldap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-ldap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-libwbclient-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-libwbclient-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-nfs-idmap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-nfs-idmap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-polkit-rules-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-proxy-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-proxy-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-tools-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-tools-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-winbind-idmap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-winbind-idmap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.16-0.1.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.16-0.1.el8ev.src", "8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.16-0.1.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.4-1.el8ev.src", "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.4-1.el8ev.x86_64", "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.4-1.el8ev.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1917684" } ], "notes": [ { "category": "description", "text": "A flaw was found in sudo. A heap-based buffer overflow was found in the way sudo parses command line arguments. This flaw is exploitable by any local user who can execute the sudo command (by default, any local user can execute sudo) without authentication. Successful exploitation of this flaw could lead to privilege escalation. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "sudo: Heap buffer overflow in argument parsing", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw does not affect the versions of sudo shipped with Red Hat Enterprise Linux 5, because the vulnerable code was not present in these versions.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.4-20210201.0.el8_3.src", "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.4-20210201.0.el8_3.noarch" ], "known_not_affected": [ "8Base-RHV-Agents-4:cockpit-ovirt-0:0.14.17-1.el8ev.src", "8Base-RHV-Agents-4:cockpit-ovirt-dashboard-0:0.14.17-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:libipa_hbac-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libipa_hbac-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsmbclient-0:4.12.3-12.el8.3.x86_64", "8Base-RHV-Hypervisor-4:libsmbclient-debuginfo-0:4.12.3-12.el8.3.x86_64", "8Base-RHV-Hypervisor-4:libsss_autofs-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_autofs-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_certmap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_certmap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_idmap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_idmap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_nss_idmap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_nss_idmap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_nss_idmap-devel-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_simpleifp-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_simpleifp-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_sudo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_sudo-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-libipa_hbac-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-libipa_hbac-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-libsss_nss_idmap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-libsss_nss_idmap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-sss-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-sss-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-sss-murmur-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-sss-murmur-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-sssdconfig-0:2.3.0-9.el8.noarch", "8Base-RHV-Hypervisor-4:samba-0:4.12.3-12.el8.3.src", "8Base-RHV-Hypervisor-4:samba-debuginfo-0:4.12.3-12.el8.3.x86_64", "8Base-RHV-Hypervisor-4:samba-debugsource-0:4.12.3-12.el8.3.x86_64", "8Base-RHV-Hypervisor-4:sssd-0:2.3.0-9.el8.src", "8Base-RHV-Hypervisor-4:sssd-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-ad-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-ad-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-client-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-client-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-common-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-common-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-common-pac-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-common-pac-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-dbus-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-dbus-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-debugsource-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-ipa-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-ipa-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-kcm-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-kcm-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-krb5-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-krb5-common-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-krb5-common-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-krb5-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-ldap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-ldap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-libwbclient-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-libwbclient-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-nfs-idmap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-nfs-idmap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-polkit-rules-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-proxy-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-proxy-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-tools-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-tools-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-winbind-idmap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-winbind-idmap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.16-0.1.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.16-0.1.el8ev.src", "8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.16-0.1.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.4-1.el8ev.src", "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.4-1.el8ev.x86_64", "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.4-1.el8ev.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3156" }, { "category": "external", "summary": "RHBZ#1917684", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1917684" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3156", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3156" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3156", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3156" }, { "category": "external", "summary": "https://www.qualys.com/2021/01/26/cve-2021-3156/baron-samedit-heap-based-overflow-sudo.txt", "url": "https://www.qualys.com/2021/01/26/cve-2021-3156/baron-samedit-heap-based-overflow-sudo.txt" }, { "category": "external", "summary": "https://www.sudo.ws/alerts/unescape_overflow.html", "url": "https://www.sudo.ws/alerts/unescape_overflow.html" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2021-01-26T18:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891\n\nAfter installing this update, the smb service will be restarted automatically.", "product_ids": [ "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.4-20210201.0.el8_3.src", "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.4-20210201.0.el8_3.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0401" }, { "category": "workaround", "details": "Red Hat Product Security strongly recommends customers to update to fixed sudo packages once they are available. For customers who cannot update immediately, the following interim partial mitigation using systemtap is suggested:\n\n1. Install required systemtap packages and dependencies: \n```\nsystemtap yum-utils kernel-devel-\"$(uname -r)\"\n```\n\nThen for RHEL 7 install kernel debuginfo, using:\n```\ndebuginfo-install -y kernel-\"$(uname -r)\" \n```\nThen for RHEL 8 \u0026 6 install sudo debuginfo, using:\n```\ndebuginfo-install sudo\n```\n \n2. Create the following systemtap script: (call the file as sudoedit-block.stap)\n```\nprobe process(\"/usr/bin/sudo\").function(\"main\") {\n command = cmdline_args(0,0,\"\");\n if (isinstr(command, \"edit\")) {\n raise(9);\n }\n}\n```\n3. Install the script using the following command: (using root)\n```\n# nohup stap -g sudoedit-block.stap \u0026\n```\n(This should output the PID number of the systemtap script)\n\nThis script will cause the vulnerable sudoedit binary to stop working. The sudo command will still work as usual.\nThe above change does not persist across reboots and must be applied after each reboot.\n\nPlease consult How to make a systemtap kernel module load persistently across reboots? (https://access.redhat.com/solutions/5752521) to learn how to\nturn this into a service managed by initd. \n\n4. Once the new fixed packages are installed, the systemtap script can be removed by killing the systemtap process. For example, by using:\n```\n# kill -s SIGTERM 7590\n```\n(where 7590 is the PID of the systemtap process)", "product_ids": [ "8Base-RHV-Agents-4:cockpit-ovirt-0:0.14.17-1.el8ev.src", "8Base-RHV-Agents-4:cockpit-ovirt-dashboard-0:0.14.17-1.el8ev.noarch", "8Base-RHV-Hypervisor-4:libipa_hbac-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libipa_hbac-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsmbclient-0:4.12.3-12.el8.3.x86_64", "8Base-RHV-Hypervisor-4:libsmbclient-debuginfo-0:4.12.3-12.el8.3.x86_64", "8Base-RHV-Hypervisor-4:libsss_autofs-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_autofs-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_certmap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_certmap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_idmap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_idmap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_nss_idmap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_nss_idmap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_nss_idmap-devel-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_simpleifp-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_simpleifp-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_sudo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:libsss_sudo-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-libipa_hbac-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-libipa_hbac-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-libsss_nss_idmap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-libsss_nss_idmap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-sss-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-sss-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-sss-murmur-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-sss-murmur-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:python3-sssdconfig-0:2.3.0-9.el8.noarch", "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.4-20210201.0.el8_3.src", "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.4-20210201.0.el8_3.noarch", "8Base-RHV-Hypervisor-4:samba-0:4.12.3-12.el8.3.src", "8Base-RHV-Hypervisor-4:samba-debuginfo-0:4.12.3-12.el8.3.x86_64", "8Base-RHV-Hypervisor-4:samba-debugsource-0:4.12.3-12.el8.3.x86_64", "8Base-RHV-Hypervisor-4:sssd-0:2.3.0-9.el8.src", "8Base-RHV-Hypervisor-4:sssd-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-ad-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-ad-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-client-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-client-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-common-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-common-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-common-pac-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-common-pac-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-dbus-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-dbus-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-debugsource-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-ipa-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-ipa-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-kcm-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-kcm-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-krb5-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-krb5-common-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-krb5-common-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-krb5-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-ldap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-ldap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-libwbclient-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-libwbclient-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-nfs-idmap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-nfs-idmap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-polkit-rules-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-proxy-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-proxy-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-tools-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-tools-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-winbind-idmap-0:2.3.0-9.el8.x86_64", "8Base-RHV-Hypervisor-4:sssd-winbind-idmap-debuginfo-0:2.3.0-9.el8.x86_64", "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.16-0.1.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.16-0.1.el8ev.src", "8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.16-0.1.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.4-1.el8ev.src", "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.4-1.el8ev.x86_64", "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.4-1.el8ev.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.4-20210201.0.el8_3.src", "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.4-20210201.0.el8_3.noarch" ] } ], "threats": [ { "category": "exploit_status", "date": "2022-04-06T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Important" } ], "title": "sudo: Heap buffer overflow in argument parsing" } ] }
var-202101-0221
Vulnerability from variot
A flaw was found in dnsmasq before version 2.83. When getting a reply from a forwarded query, dnsmasq checks in forward.c:reply_query(), which is the forwarded query that matches the reply, by only using a weak hash of the query name. Due to the weak hash (CRC32 when dnsmasq is compiled without DNSSEC, SHA-1 when it is) this flaw allows an off-path attacker to find several different domains all having the same hash, substantially reducing the number of attempts they would have to perform to forge a reply and get it accepted by dnsmasq. This is in contrast with RFC5452, which specifies that the query name is one of the attributes of a query that must be used to match a reply. This flaw could be abused to perform a DNS Cache Poisoning attack. If chained with CVE-2020-25684 the attack complexity of a successful attack is reduced. The highest threat from this vulnerability is to data integrity. Dnsmasq is vulnerable to a set of memory corruption issues handling DNSSEC data and a second set of issues validating DNS responses. These vulnerabilities could allow an attacker to corrupt memory on a vulnerable system and perform cache poisoning attacks against a vulnerable environment.CVE-2020-25681 Not Affected CVE-2020-25682 Not Affected CVE-2020-25683 Not Affected CVE-2020-25684 Affected CVE-2020-25685 Affected CVE-2020-25686 Affected CVE-2020-25687 Not AffectedCVE-2020-25681 Not Affected CVE-2020-25682 Not Affected CVE-2020-25683 Not Affected CVE-2020-25684 Affected CVE-2020-25685 Affected CVE-2020-25686 Affected CVE-2020-25687 Not Affected. Dnsmasq is a lightweight DNS forwarding and DHCP and TFTP server written in C language.
Dnsmasq has a security vulnerability, which stems from the use of a weak hash algorithm (CRC32) to verify DNS responses when compiling without dnnssec. No detailed vulnerability details are currently provided. ========================================================================== Ubuntu Security Notice USN-4698-2 February 24, 2021
dnsmasq regression
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 20.10
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS
Summary:
USN-4698-1 introduced regressions in Dnsmasq.
Software Description: - dnsmasq: Small caching DNS proxy and DHCP/TFTP server
Details:
USN-4698-1 fixed vulnerabilities in Dnsmasq. The updates introduced regressions in certain environments related to issues with multiple queries, and issues with retries. This update fixes the problem.
Original advisory details:
Moshe Kol and Shlomi Oberman discovered that Dnsmasq incorrectly handled memory when sorting RRsets. A remote attacker could use this issue to cause Dnsmasq to hang, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2020-25681, CVE-2020-25687) Moshe Kol and Shlomi Oberman discovered that Dnsmasq incorrectly handled extracting certain names. A remote attacker could use this issue to cause Dnsmasq to hang, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2020-25682, CVE-2020-25683) Moshe Kol and Shlomi Oberman discovered that Dnsmasq incorrectly implemented address/port checks. (CVE-2020-25684) Moshe Kol and Shlomi Oberman discovered that Dnsmasq incorrectly implemented query resource name checks. (CVE-2020-25685) Moshe Kol and Shlomi Oberman discovered that Dnsmasq incorrectly handled multiple query requests for the same resource name. (CVE-2020-25686) It was discovered that Dnsmasq incorrectly handled memory during DHCP response creation. A remote attacker could possibly use this issue to cause Dnsmasq to consume resources, leading to a denial of service. This issue only affected Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, and Ubuntu 20.04 LTS. (CVE-2019-14834)
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 20.10: dnsmasq 2.82-1ubuntu1.2 dnsmasq-base 2.82-1ubuntu1.2 dnsmasq-utils 2.82-1ubuntu1.2
Ubuntu 20.04 LTS: dnsmasq 2.80-1.1ubuntu1.3 dnsmasq-base 2.80-1.1ubuntu1.3 dnsmasq-utils 2.80-1.1ubuntu1.3
Ubuntu 18.04 LTS: dnsmasq 2.79-1ubuntu0.3 dnsmasq-base 2.79-1ubuntu0.3 dnsmasq-utils 2.79-1ubuntu0.3
Ubuntu 16.04 LTS: dnsmasq 2.75-1ubuntu0.16.04.8 dnsmasq-base 2.75-1ubuntu0.16.04.8 dnsmasq-utils 2.75-1ubuntu0.16.04.8
After a standard system update you need to reboot your computer to make all the necessary changes. 8) - aarch64, ppc64le, s390x, x86_64
-
7) - aarch64, ppc64le, s390x
-
Description:
Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments.
This advisory contains the container images for Red Hat OpenShift Container Platform 4.4.33. See the following advisory for the RPM packages for this release:
https://access.redhat.com/errata/RHSA-2021:0282
Space precludes documenting all of the container images in this advisory. See the following Release Notes documentation, which will be updated shortly for this release, for details about these changes:
https://docs.openshift.com/container-platform/4.4/release_notes/ocp-4-4-rel ease-notes.html
This update fixes the following bugs among others:
-
Previously, there were broken connections to the API server that caused nodes to remain in the NotReady state. Detecting a broken network connection could take up to 15 minutes, during which the platform would remain unavailable. This is now fixed by setting the TCP_USER_TIMEOUT socket option, which controls how long transmitted data can be unacknowledged before the connection is forcefully closed. (BZ#1907939)
-
Previously, the quota controllers only worked on resources retrieved from the discovery endpoint, which might contain only a fraction of all resources due to a network error. This is now fixed by having the quota controllers periodically resync when new resources are observed from the discovery endpoint. (BZ#1910096)
-
Previously, the kuryr-controller was comparing security groups related to network policies incorrectly. This caused security rules related to a network policy to be recreated on every minor update of that network policy. This bug has been fixed, allowing network policy updates that already have existing rules to be preserved; network policy additions or deletions are performed, if needed. (BZ#1910221)
You may download the oc tool and use it to inspect release image metadata as follows:
(For x86_64 architecture)
$ oc adm release info quay.io/openshift-release-dev/ocp-release:4.4.33-x86_64
The image digest is sha256:a035dddd8a5e5c99484138951ef4aba021799b77eb9046f683a5466c23717738
(For s390x architecture)
$ oc adm release info quay.io/openshift-release-dev/ocp-release:4.4.33-s390x
The image digest is sha256:ecc1e5aaf8496dd60a7703562fd6c65541172a56ae9008fce6db5d55e43371dc
(For ppc64le architecture)
$ oc adm release info quay.io/openshift-release-dev/ocp-release:4.4.33-ppc64le
The image digest is sha256:567bf8031c80b08e3e56a57e1c8e5b0b01a2f922e01b36ee333f6ab5bff95495
All OpenShift Container Platform 4.4 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift Console or the CLI oc command. Instructions for upgrading a cluster are available at https://docs.openshift.com/container-platform/4.4/updating/updating-cluster - -between-minor.html#understanding-upgrade-channels_updating-cluster-between - -minor. Solution:
For OpenShift Container Platform 4.4 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:
https://docs.openshift.com/container-platform/4.4/release_notes/ocp-4-4-rel ease-notes.html
Details on how to access this content are available at https://docs.openshift.com/container-platform/4.4/updating/updating-cluster - -cli.html. Bugs fixed (https://bugzilla.redhat.com/):
1848516 - [4.4] Unresponsive OpenShift 4.4 cluster on Azure (UPI) 1851422 - CVE-2020-8559 kubernetes: compromised node could escalate to cluster level privileges 1886637 - CVE-2020-8564 kubernetes: Docker config secrets leaked when file is malformed and loglevel >= 4 1895332 - NP CRD unable to be patched because of missing sg rule ID 1897546 - Backup taken on one master cannot be restored on other masters 1900727 - Using shareProcessNamespace with default pod image leaves unreaped processes 1904413 - (release 4.4) Hostsubnet gatherer produces wrong output 1905891 - genericapiserver library must wait for server.Shutdown 1906484 - Etcd container leaves grep and lsof zombie processes 1907939 - Nodes goes into NotReady state (VMware) 1910096 - [release-4.4] The quota controllers should resync on new resources and make progress 1910221 - kuryr tempest plugin test test_ipblock_network_policy_sg_rules fails 1915110 - CVE-2021-20182 openshift: builder allows read and write of block devices 1916952 - OperatorExited, Pending marketplace-operator-... pod for several weeks 1917416 - e2e: should be able to pull image from docker hub is failing permanently 1918609 - ARO/Azure: excessive pod memory allocation causes node lockup 1918974 - [sig-devex][Feature:ImageEcosystem][Slow] openshift images should be SCL enabled returning s2i usage when running the image
- These packages include redhat-release-virtualization-host. RHVH features a Cockpit user interface for monitoring the host's resources and performing administrative tasks.
Bug Fix(es):
- When performing an upgrade of the Red Hat Virtualization Host using the
command
yum update
, the yum repository for RHV 4.3 EUS is unreachable
As a workaround, run the following command:
# yum update --releasever=7Server
(BZ#1899378)
- -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256
====================================================================
Red Hat Security Advisory
Synopsis: Moderate: dnsmasq security update Advisory ID: RHSA-2021:0153-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2021:0153 Issue date: 2021-01-19 CVE Names: CVE-2020-25684 CVE-2020-25685 CVE-2020-25686 ==================================================================== 1. Summary:
An update for dnsmasq is now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
- Relevant releases/architectures:
Red Hat Enterprise Linux Client (v. 7) - x86_64 Red Hat Enterprise Linux Client Optional (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64 Red Hat Enterprise Linux Server (v. 7) - ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 7) - ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - x86_64 Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64
Security Fix(es):
-
dnsmasq: loose address/port check in reply_query() makes forging replies easier for an off-path attacker (CVE-2020-25684)
-
dnsmasq: loose query name check in reply_query() makes forging replies easier for an off-path attacker (CVE-2020-25685)
-
dnsmasq: multiple queries forwarded for the same name makes forging replies easier for an off-path attacker (CVE-2020-25686)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
- Solution:
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
- Bugs fixed (https://bugzilla.redhat.com/):
1889686 - CVE-2020-25684 dnsmasq: loose address/port check in reply_query() makes forging replies easier for an off-path attacker 1889688 - CVE-2020-25685 dnsmasq: loose query name check in reply_query() makes forging replies easier for an off-path attacker 1890125 - CVE-2020-25686 dnsmasq: multiple queries forwarded for the same name makes forging replies easier for an off-path attacker
- Package List:
Red Hat Enterprise Linux Client (v. 7):
Source: dnsmasq-2.76-16.el7_9.1.src.rpm
x86_64: dnsmasq-2.76-16.el7_9.1.x86_64.rpm dnsmasq-debuginfo-2.76-16.el7_9.1.x86_64.rpm
Red Hat Enterprise Linux Client Optional (v. 7):
x86_64: dnsmasq-debuginfo-2.76-16.el7_9.1.x86_64.rpm dnsmasq-utils-2.76-16.el7_9.1.x86_64.rpm
Red Hat Enterprise Linux ComputeNode (v. 7):
Source: dnsmasq-2.76-16.el7_9.1.src.rpm
x86_64: dnsmasq-2.76-16.el7_9.1.x86_64.rpm dnsmasq-debuginfo-2.76-16.el7_9.1.x86_64.rpm
Red Hat Enterprise Linux ComputeNode Optional (v. 7):
x86_64: dnsmasq-debuginfo-2.76-16.el7_9.1.x86_64.rpm dnsmasq-utils-2.76-16.el7_9.1.x86_64.rpm
Red Hat Enterprise Linux Server (v. 7):
Source: dnsmasq-2.76-16.el7_9.1.src.rpm
ppc64: dnsmasq-2.76-16.el7_9.1.ppc64.rpm dnsmasq-debuginfo-2.76-16.el7_9.1.ppc64.rpm
ppc64le: dnsmasq-2.76-16.el7_9.1.ppc64le.rpm dnsmasq-debuginfo-2.76-16.el7_9.1.ppc64le.rpm
s390x: dnsmasq-2.76-16.el7_9.1.s390x.rpm dnsmasq-debuginfo-2.76-16.el7_9.1.s390x.rpm
x86_64: dnsmasq-2.76-16.el7_9.1.x86_64.rpm dnsmasq-debuginfo-2.76-16.el7_9.1.x86_64.rpm
Red Hat Enterprise Linux Server Optional (v. 7):
ppc64: dnsmasq-debuginfo-2.76-16.el7_9.1.ppc64.rpm dnsmasq-utils-2.76-16.el7_9.1.ppc64.rpm
ppc64le: dnsmasq-debuginfo-2.76-16.el7_9.1.ppc64le.rpm dnsmasq-utils-2.76-16.el7_9.1.ppc64le.rpm
s390x: dnsmasq-debuginfo-2.76-16.el7_9.1.s390x.rpm dnsmasq-utils-2.76-16.el7_9.1.s390x.rpm
x86_64: dnsmasq-debuginfo-2.76-16.el7_9.1.x86_64.rpm dnsmasq-utils-2.76-16.el7_9.1.x86_64.rpm
Red Hat Enterprise Linux Workstation (v. 7):
Source: dnsmasq-2.76-16.el7_9.1.src.rpm
x86_64: dnsmasq-2.76-16.el7_9.1.x86_64.rpm dnsmasq-debuginfo-2.76-16.el7_9.1.x86_64.rpm
Red Hat Enterprise Linux Workstation Optional (v. 7):
x86_64: dnsmasq-debuginfo-2.76-16.el7_9.1.x86_64.rpm dnsmasq-utils-2.76-16.el7_9.1.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/
- References:
https://access.redhat.com/security/cve/CVE-2020-25684 https://access.redhat.com/security/cve/CVE-2020-25685 https://access.redhat.com/security/cve/CVE-2020-25686 https://access.redhat.com/security/updates/classification/#moderate https://access.redhat.com/security/vulnerabilities/RHSB-2021-001
- Contact:
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/
Copyright 2021 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1
iQIVAwUBYAblHdzjgjWX9erEAQg6Xg//fXZBawqLgCXhC7jToJJgUA+WoERkMbil Vs5+OP4vp+nT2iA92mQ84rLTQG2tL2xhPfMxLVl+9aCH44RjJjmQ8F/ODvYxRCe4 MopmumQIwfGMAFK/n16jHAmkg+qMZa3ehUp+LuawnsIuGtC7BmiohLTZqjxFj754 6h79AhB8/zeX1buyqEBgo8kCTy/L+TRW/Xg/ENi6a6NTnwG3f2n89oxUOCASm2cA YF2Qc1L8yqd/5YXBA8E3gRouBe2caThWUo0qrG9ois7lYIJKlxzo9sq3n6qfc8bN hZ/OAKvNSnRSrC4AW8kHVskv0hR8kC+iX05ryujBdGRLiafHl9hLGy2E0qRR3mm3 hNyjhKzBNxwZZ3gF8nOQJyWtxSYJSwbl6n01ElEs+QexMKi/f+x8hML1BS1rf/tG JuOOyLTUGjWIdmmLEKNQa/A5h0rWwJhNhVKuK+iNGXTey8C1JmeNaYpeOn8JdK1E iS8ZT48mfu8MxvGVVbv8ARfMQtsWSo1IOMD/ttUh2SPflZ1Qpd2sGTR5sIJrq2JD XlWePyzEQSL0UEJ8FgYOeJJEt9Q/gWgiug7ZBZrmanzLaNv0DA0dLsD8kE/p2mml j6kxe9R0XnpTxnDTzKmmCaEXCFsrJIg872+57VfVbCeFcwV6pZMNMFACmMI6DJgX sGV/jc2cn78=iw2j -----END PGP SIGNATURE-----
-- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202101-0221", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "fedora", "scope": "eq", "trust": 1.0, "vendor": "fedoraproject", "version": "32" }, { "model": "eos", "scope": "gte", "trust": 1.0, "vendor": "arista", "version": "4.24" }, { "model": "eos", "scope": "lt", "trust": 1.0, "vendor": "arista", "version": "4.21.14m" }, { "model": "eos", "scope": "gte", "trust": 1.0, "vendor": "arista", "version": "4.25" }, { "model": "eos", "scope": "gte", "trust": 1.0, "vendor": "arista", "version": "4.21" }, { "model": "eos", "scope": "gte", "trust": 1.0, "vendor": "arista", "version": "4.22" }, { "model": "eos", "scope": "lt", "trust": 1.0, "vendor": "arista", "version": "4.23.7m" }, { "model": "eos", "scope": "lt", "trust": 1.0, "vendor": "arista", "version": "4.24.5m" }, { "model": "eos", "scope": "gte", "trust": 1.0, "vendor": "arista", "version": "4.23" }, { "model": "linux", "scope": "eq", "trust": 1.0, "vendor": "debian", "version": "10.0" }, { "model": "eos", "scope": "lt", "trust": 1.0, "vendor": "arista", "version": "4.25.2f" }, { "model": "eos", "scope": "lt", "trust": 1.0, "vendor": "arista", "version": "4.22.9m" }, { "model": "dnsmasq", "scope": "lt", "trust": 1.0, "vendor": "thekelleys", "version": "2.83" }, { "model": "fedora", "scope": "eq", "trust": 1.0, "vendor": "fedoraproject", "version": "33" }, { "model": "dnsmasq", "scope": "lt", "trust": 0.6, "vendor": "dnsmasq", "version": "2.83" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-16430" }, { "db": "NVD", "id": "CVE-2020-25685" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "This document was written by Vijay Sarvepalli.Statement Date:\u00a0\u00a0 January 04, 2021", "sources": [ { "db": "CERT/CC", "id": "VU#434904" } ], "trust": 0.8 }, "cve": "CVE-2020-25685", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "CVE-2020-25685", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.1, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "CNVD-2021-16430", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "HIGH", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "exploitabilityScore": 2.2, "id": "CVE-2020-25685", "impactScore": 1.4, "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2020-25685", "trust": 1.0, "value": "LOW" }, { "author": "CNVD", "id": "CNVD-2021-16430", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2020-25685", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-16430" }, { "db": "VULMON", "id": "CVE-2020-25685" }, { "db": "NVD", "id": "CVE-2020-25685" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A flaw was found in dnsmasq before version 2.83. When getting a reply from a forwarded query, dnsmasq checks in forward.c:reply_query(), which is the forwarded query that matches the reply, by only using a weak hash of the query name. Due to the weak hash (CRC32 when dnsmasq is compiled without DNSSEC, SHA-1 when it is) this flaw allows an off-path attacker to find several different domains all having the same hash, substantially reducing the number of attempts they would have to perform to forge a reply and get it accepted by dnsmasq. This is in contrast with RFC5452, which specifies that the query name is one of the attributes of a query that must be used to match a reply. This flaw could be abused to perform a DNS Cache Poisoning attack. If chained with CVE-2020-25684 the attack complexity of a successful attack is reduced. The highest threat from this vulnerability is to data integrity. Dnsmasq is vulnerable to a set of memory corruption issues handling DNSSEC data and a second set of issues validating DNS responses. These vulnerabilities could allow an attacker to corrupt memory on a vulnerable system and perform cache poisoning attacks against a vulnerable environment.CVE-2020-25681 Not Affected\nCVE-2020-25682 Not Affected\nCVE-2020-25683 Not Affected\nCVE-2020-25684 Affected\nCVE-2020-25685 Affected\nCVE-2020-25686 Affected\nCVE-2020-25687 Not AffectedCVE-2020-25681 Not Affected\nCVE-2020-25682 Not Affected\nCVE-2020-25683 Not Affected\nCVE-2020-25684 Affected\nCVE-2020-25685 Affected\nCVE-2020-25686 Affected\nCVE-2020-25687 Not Affected. Dnsmasq is a lightweight DNS forwarding and DHCP and TFTP server written in C language. \n\r\n\r\nDnsmasq has a security vulnerability, which stems from the use of a weak hash algorithm (CRC32) to verify DNS responses when compiling without dnnssec. No detailed vulnerability details are currently provided. ==========================================================================\nUbuntu Security Notice USN-4698-2\nFebruary 24, 2021\n\ndnsmasq regression\n==========================================================================\n\nA security issue affects these releases of Ubuntu and its derivatives:\n\n- Ubuntu 20.10\n- Ubuntu 20.04 LTS\n- Ubuntu 18.04 LTS\n- Ubuntu 16.04 LTS\n\nSummary:\n\nUSN-4698-1 introduced regressions in Dnsmasq. \n\nSoftware Description:\n- dnsmasq: Small caching DNS proxy and DHCP/TFTP server\n\nDetails:\n\nUSN-4698-1 fixed vulnerabilities in Dnsmasq. The updates introduced\nregressions in certain environments related to issues with multiple\nqueries, and issues with retries. This update fixes the problem. \n\nOriginal advisory details:\n\n Moshe Kol and Shlomi Oberman discovered that Dnsmasq incorrectly handled\n memory when sorting RRsets. A remote attacker could use this issue to cause\n Dnsmasq to hang, resulting in a denial of service, or possibly execute\n arbitrary code. (CVE-2020-25681, CVE-2020-25687)\n Moshe Kol and Shlomi Oberman discovered that Dnsmasq incorrectly handled\n extracting certain names. A remote attacker could use this issue to cause\n Dnsmasq to hang, resulting in a denial of service, or possibly execute\n arbitrary code. (CVE-2020-25682, CVE-2020-25683)\n Moshe Kol and Shlomi Oberman discovered that Dnsmasq incorrectly\n implemented address/port checks. (CVE-2020-25684)\n Moshe Kol and Shlomi Oberman discovered that Dnsmasq incorrectly\n implemented query resource name checks. (CVE-2020-25685)\n Moshe Kol and Shlomi Oberman discovered that Dnsmasq incorrectly handled\n multiple query requests for the same resource name. (CVE-2020-25686)\n It was discovered that Dnsmasq incorrectly handled memory during DHCP\n response creation. A remote attacker could possibly use this issue to\n cause Dnsmasq to consume resources, leading to a denial of service. This\n issue only affected Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, and Ubuntu 20.04\n LTS. (CVE-2019-14834)\n\nUpdate instructions:\n\nThe problem can be corrected by updating your system to the following\npackage versions:\n\nUbuntu 20.10:\n dnsmasq 2.82-1ubuntu1.2\n dnsmasq-base 2.82-1ubuntu1.2\n dnsmasq-utils 2.82-1ubuntu1.2\n\nUbuntu 20.04 LTS:\n dnsmasq 2.80-1.1ubuntu1.3\n dnsmasq-base 2.80-1.1ubuntu1.3\n dnsmasq-utils 2.80-1.1ubuntu1.3\n\nUbuntu 18.04 LTS:\n dnsmasq 2.79-1ubuntu0.3\n dnsmasq-base 2.79-1ubuntu0.3\n dnsmasq-utils 2.79-1ubuntu0.3\n\nUbuntu 16.04 LTS:\n dnsmasq 2.75-1ubuntu0.16.04.8\n dnsmasq-base 2.75-1ubuntu0.16.04.8\n dnsmasq-utils 2.75-1ubuntu0.16.04.8\n\nAfter a standard system update you need to reboot your computer to make\nall the necessary changes. 8) - aarch64, ppc64le, s390x, x86_64\n\n3. 7) - aarch64, ppc64le, s390x\n\n3. Description:\n\nRed Hat OpenShift Container Platform is Red Hat\u0027s cloud computing\nKubernetes application platform solution designed for on-premise or private\ncloud deployments. \n\nThis advisory contains the container images for Red Hat OpenShift Container\nPlatform 4.4.33. See the following advisory for the RPM packages for this\nrelease:\n\nhttps://access.redhat.com/errata/RHSA-2021:0282\n\nSpace precludes documenting all of the container images in this advisory. \nSee the following Release Notes documentation, which will be updated\nshortly for this release, for details about these changes:\n\nhttps://docs.openshift.com/container-platform/4.4/release_notes/ocp-4-4-rel\nease-notes.html\n\nThis update fixes the following bugs among others:\n\n* Previously, there were broken connections to the API server that caused\nnodes to remain in the NotReady state. Detecting a broken network\nconnection could take up to 15 minutes, during which the platform would\nremain unavailable. This is now fixed by setting the TCP_USER_TIMEOUT\nsocket option, which controls how long transmitted data can be\nunacknowledged before the connection is forcefully closed. (BZ#1907939)\n\n* Previously, the quota controllers only worked on resources retrieved from\nthe discovery endpoint, which might contain only a fraction of all\nresources due to a network error. This is now fixed by having the quota\ncontrollers periodically resync when new resources are observed from the\ndiscovery endpoint. (BZ#1910096)\n\n* Previously, the kuryr-controller was comparing security groups related to\nnetwork policies incorrectly. This caused security rules related to a\nnetwork policy to be recreated on every minor update of that network\npolicy. This bug has been fixed, allowing network policy updates that\nalready have existing rules to be preserved; network policy additions or\ndeletions are performed, if needed. (BZ#1910221)\n\nYou may download the oc tool and use it to inspect release image metadata\nas follows:\n\n(For x86_64 architecture)\n\n $ oc adm release info\nquay.io/openshift-release-dev/ocp-release:4.4.33-x86_64\n\nThe image digest is\nsha256:a035dddd8a5e5c99484138951ef4aba021799b77eb9046f683a5466c23717738\n\n(For s390x architecture)\n\n $ oc adm release info\nquay.io/openshift-release-dev/ocp-release:4.4.33-s390x\n\nThe image digest is\nsha256:ecc1e5aaf8496dd60a7703562fd6c65541172a56ae9008fce6db5d55e43371dc\n\n(For ppc64le architecture)\n\n $ oc adm release info\nquay.io/openshift-release-dev/ocp-release:4.4.33-ppc64le\n\nThe image digest is\nsha256:567bf8031c80b08e3e56a57e1c8e5b0b01a2f922e01b36ee333f6ab5bff95495\n\nAll OpenShift Container Platform 4.4 users are advised to upgrade to these\nupdated packages and images when they are available in the appropriate\nrelease channel. To check for available updates, use the OpenShift Console\nor the CLI oc command. Instructions for upgrading a cluster are available\nat\nhttps://docs.openshift.com/container-platform/4.4/updating/updating-cluster\n- -between-minor.html#understanding-upgrade-channels_updating-cluster-between\n- -minor. Solution:\n\nFor OpenShift Container Platform 4.4 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.4/release_notes/ocp-4-4-rel\nease-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.4/updating/updating-cluster\n- -cli.html. Bugs fixed (https://bugzilla.redhat.com/):\n\n1848516 - [4.4] Unresponsive OpenShift 4.4 cluster on Azure (UPI)\n1851422 - CVE-2020-8559 kubernetes: compromised node could escalate to cluster level privileges\n1886637 - CVE-2020-8564 kubernetes: Docker config secrets leaked when file is malformed and loglevel \u003e= 4\n1895332 - NP CRD unable to be patched because of missing sg rule ID\n1897546 - Backup taken on one master cannot be restored on other masters\n1900727 - Using shareProcessNamespace with default pod image leaves unreaped processes\n1904413 - (release 4.4) Hostsubnet gatherer produces wrong output\n1905891 - genericapiserver library must wait for server.Shutdown\n1906484 - Etcd container leaves grep and lsof zombie processes\n1907939 - Nodes goes into NotReady state (VMware)\n1910096 - [release-4.4] The quota controllers should resync on new resources and make progress\n1910221 - kuryr tempest plugin test test_ipblock_network_policy_sg_rules fails\n1915110 - CVE-2021-20182 openshift: builder allows read and write of block devices\n1916952 - OperatorExited, Pending marketplace-operator-... pod for several weeks\n1917416 - e2e: should be able to pull image from docker hub is failing permanently\n1918609 - ARO/Azure: excessive pod memory allocation causes node lockup\n1918974 - [sig-devex][Feature:ImageEcosystem][Slow] openshift images should be SCL enabled returning s2i usage when running the image\n\n5. These packages include redhat-release-virtualization-host. \nRHVH features a Cockpit user interface for monitoring the host\u0027s resources\nand performing administrative tasks. \n\nBug Fix(es):\n\n* When performing an upgrade of the Red Hat Virtualization Host using the\ncommand `yum update`, the yum repository for RHV 4.3 EUS is unreachable\n\nAs a workaround, run the following command:\n`# yum update --releasever=7Server` (BZ#1899378)\n\n4. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA256\n\n==================================================================== \nRed Hat Security Advisory\n\nSynopsis: Moderate: dnsmasq security update\nAdvisory ID: RHSA-2021:0153-01\nProduct: Red Hat Enterprise Linux\nAdvisory URL: https://access.redhat.com/errata/RHSA-2021:0153\nIssue date: 2021-01-19\nCVE Names: CVE-2020-25684 CVE-2020-25685 CVE-2020-25686\n====================================================================\n1. Summary:\n\nAn update for dnsmasq is now available for Red Hat Enterprise Linux 7. \n\nRed Hat Product Security has rated this update as having a security impact\nof Moderate. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available for each vulnerability from\nthe CVE link(s) in the References section. \n\n2. Relevant releases/architectures:\n\nRed Hat Enterprise Linux Client (v. 7) - x86_64\nRed Hat Enterprise Linux Client Optional (v. 7) - x86_64\nRed Hat Enterprise Linux ComputeNode (v. 7) - x86_64\nRed Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64\nRed Hat Enterprise Linux Server (v. 7) - ppc64, ppc64le, s390x, x86_64\nRed Hat Enterprise Linux Server Optional (v. 7) - ppc64, ppc64le, s390x, x86_64\nRed Hat Enterprise Linux Workstation (v. 7) - x86_64\nRed Hat Enterprise Linux Workstation Optional (v. 7) - x86_64\n\n3. \n\nSecurity Fix(es):\n\n* dnsmasq: loose address/port check in reply_query() makes forging replies\neasier for an off-path attacker (CVE-2020-25684)\n\n* dnsmasq: loose query name check in reply_query() makes forging replies\neasier for an off-path attacker (CVE-2020-25685)\n\n* dnsmasq: multiple queries forwarded for the same name makes forging\nreplies easier for an off-path attacker (CVE-2020-25686)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE\npage(s) listed in the References section. \n\n4. Solution:\n\nFor details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\n5. Bugs fixed (https://bugzilla.redhat.com/):\n\n1889686 - CVE-2020-25684 dnsmasq: loose address/port check in reply_query() makes forging replies easier for an off-path attacker\n1889688 - CVE-2020-25685 dnsmasq: loose query name check in reply_query() makes forging replies easier for an off-path attacker\n1890125 - CVE-2020-25686 dnsmasq: multiple queries forwarded for the same name makes forging replies easier for an off-path attacker\n\n6. Package List:\n\nRed Hat Enterprise Linux Client (v. 7):\n\nSource:\ndnsmasq-2.76-16.el7_9.1.src.rpm\n\nx86_64:\ndnsmasq-2.76-16.el7_9.1.x86_64.rpm\ndnsmasq-debuginfo-2.76-16.el7_9.1.x86_64.rpm\n\nRed Hat Enterprise Linux Client Optional (v. 7):\n\nx86_64:\ndnsmasq-debuginfo-2.76-16.el7_9.1.x86_64.rpm\ndnsmasq-utils-2.76-16.el7_9.1.x86_64.rpm\n\nRed Hat Enterprise Linux ComputeNode (v. 7):\n\nSource:\ndnsmasq-2.76-16.el7_9.1.src.rpm\n\nx86_64:\ndnsmasq-2.76-16.el7_9.1.x86_64.rpm\ndnsmasq-debuginfo-2.76-16.el7_9.1.x86_64.rpm\n\nRed Hat Enterprise Linux ComputeNode Optional (v. 7):\n\nx86_64:\ndnsmasq-debuginfo-2.76-16.el7_9.1.x86_64.rpm\ndnsmasq-utils-2.76-16.el7_9.1.x86_64.rpm\n\nRed Hat Enterprise Linux Server (v. 7):\n\nSource:\ndnsmasq-2.76-16.el7_9.1.src.rpm\n\nppc64:\ndnsmasq-2.76-16.el7_9.1.ppc64.rpm\ndnsmasq-debuginfo-2.76-16.el7_9.1.ppc64.rpm\n\nppc64le:\ndnsmasq-2.76-16.el7_9.1.ppc64le.rpm\ndnsmasq-debuginfo-2.76-16.el7_9.1.ppc64le.rpm\n\ns390x:\ndnsmasq-2.76-16.el7_9.1.s390x.rpm\ndnsmasq-debuginfo-2.76-16.el7_9.1.s390x.rpm\n\nx86_64:\ndnsmasq-2.76-16.el7_9.1.x86_64.rpm\ndnsmasq-debuginfo-2.76-16.el7_9.1.x86_64.rpm\n\nRed Hat Enterprise Linux Server Optional (v. 7):\n\nppc64:\ndnsmasq-debuginfo-2.76-16.el7_9.1.ppc64.rpm\ndnsmasq-utils-2.76-16.el7_9.1.ppc64.rpm\n\nppc64le:\ndnsmasq-debuginfo-2.76-16.el7_9.1.ppc64le.rpm\ndnsmasq-utils-2.76-16.el7_9.1.ppc64le.rpm\n\ns390x:\ndnsmasq-debuginfo-2.76-16.el7_9.1.s390x.rpm\ndnsmasq-utils-2.76-16.el7_9.1.s390x.rpm\n\nx86_64:\ndnsmasq-debuginfo-2.76-16.el7_9.1.x86_64.rpm\ndnsmasq-utils-2.76-16.el7_9.1.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation (v. 7):\n\nSource:\ndnsmasq-2.76-16.el7_9.1.src.rpm\n\nx86_64:\ndnsmasq-2.76-16.el7_9.1.x86_64.rpm\ndnsmasq-debuginfo-2.76-16.el7_9.1.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation Optional (v. 7):\n\nx86_64:\ndnsmasq-debuginfo-2.76-16.el7_9.1.x86_64.rpm\ndnsmasq-utils-2.76-16.el7_9.1.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security. Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/\n\n7. References:\n\nhttps://access.redhat.com/security/cve/CVE-2020-25684\nhttps://access.redhat.com/security/cve/CVE-2020-25685\nhttps://access.redhat.com/security/cve/CVE-2020-25686\nhttps://access.redhat.com/security/updates/classification/#moderate\nhttps://access.redhat.com/security/vulnerabilities/RHSB-2021-001\n\n8. Contact:\n\nThe Red Hat security contact is \u003csecalert@redhat.com\u003e. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2021 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1\n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\nsGV/jc2cn78=iw2j\n-----END PGP SIGNATURE-----\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://www.redhat.com/mailman/listinfo/rhsa-announce\n", "sources": [ { "db": "NVD", "id": "CVE-2020-25685" }, { "db": "CERT/CC", "id": "VU#434904" }, { "db": "CNVD", "id": "CNVD-2021-16430" }, { "db": "VULMON", "id": "CVE-2020-25685" }, { "db": "PACKETSTORM", "id": "161535" }, { "db": "PACKETSTORM", "id": "161100" }, { "db": "PACKETSTORM", "id": "161012" }, { "db": "PACKETSTORM", "id": "161020" }, { "db": "PACKETSTORM", "id": "161269" }, { "db": "PACKETSTORM", "id": "161272" }, { "db": "PACKETSTORM", "id": "161017" }, { "db": "PACKETSTORM", "id": "161014" } ], "trust": 2.97 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2020-25685", "trust": 3.3 }, { "db": "CERT/CC", "id": "VU#434904", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2021-16430", "trust": 0.6 }, { "db": "VULMON", "id": "CVE-2020-25685", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "161535", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "161100", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "161012", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "161020", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "161269", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "161272", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "161017", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "161014", "trust": 0.1 } ], "sources": [ { "db": "CERT/CC", "id": "VU#434904" }, { "db": "CNVD", "id": "CNVD-2021-16430" }, { "db": "VULMON", "id": "CVE-2020-25685" }, { "db": "PACKETSTORM", "id": "161535" }, { "db": "PACKETSTORM", "id": "161100" }, { "db": "PACKETSTORM", "id": "161012" }, { "db": "PACKETSTORM", "id": "161020" }, { "db": "PACKETSTORM", "id": "161269" }, { "db": "PACKETSTORM", "id": "161272" }, { "db": "PACKETSTORM", "id": "161017" }, { "db": "PACKETSTORM", "id": "161014" }, { "db": "NVD", "id": "CVE-2020-25685" } ] }, "id": "VAR-202101-0221", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2021-16430" } ], "trust": 0.85396827 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-16430" } ] }, "last_update_date": "2024-09-19T21:49:06.838000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Patch for Dnsmasq security feature issue vulnerability (CNVD-2021-16430)", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/251936" }, { "title": "Red Hat: Moderate: dnsmasq security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20210156 - Security Advisory" }, { "title": "Red Hat: Moderate: dnsmasq security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20210240 - Security Advisory" }, { "title": "Red Hat: Moderate: dnsmasq security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20210245 - Security Advisory" }, { "title": "Red Hat: Moderate: dnsmasq security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20210153 - Security Advisory" }, { "title": "Red Hat: Moderate: dnsmasq security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20210154 - Security Advisory" }, { "title": "Red Hat: Moderate: dnsmasq security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20210155 - Security Advisory" }, { "title": "Red Hat: Important: Red Hat Virtualization Host security bug fix and enhancement update [ovirt-4.4.4]", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20210401 - Security Advisory" }, { "title": "Red Hat: Important: RHV-H security, bug fix, enhancement update (redhat-virtualization-host) 4.3.13", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20210395 - Security Advisory" }, { "title": "Red Hat: Important: dnsmasq security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20210151 - Security Advisory" }, { "title": "Red Hat: Important: dnsmasq security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20210150 - Security Advisory" }, { "title": "Red Hat: Important: dnsmasq security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20210152 - Security Advisory" }, { "title": "Arch Linux Issues: ", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=arch_linux_issues\u0026qid=CVE-2020-25685 log" }, { "title": "Amazon Linux 2: ALAS2-2021-1587", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux2\u0026qid=ALAS2-2021-1587" }, { "title": "Debian Security Advisories: DSA-4844-1 dnsmasq -- security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories\u0026qid=6bdd82a7af8c0333eca753b3b7b02111" }, { "title": "Red Hat: Important: OpenShift Container Platform 4.4.33 bug fix and security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20210281 - Security Advisory" }, { "title": "Cisco: Multiple Vulnerabilities in dnsmasq DNS Forwarder Affecting Cisco Products: January 2021", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=cisco_security_advisories_and_alerts_ciscoproducts\u0026qid=cisco-sa-dnsmasq-dns-2021-c5mrdf3g" }, { "title": "dnspooq", "trust": 0.1, "url": "https://github.com/knqyf263/dnspooq " }, { "title": "multironic\nRequirements:\nInstall libvirt and prepare nodes\nhave to check why we need this\nTODO download ironic images later\nPull images\nTag images\nPush images\nrun httpd\nCheck that two vbmcs are running for the two nodes\nPlay with vbmc and ipmitools\nRun management cluster\nFirewall\nLaunch ironic\nrun capm3\nFirewall\nRef", "trust": 0.1, "url": "https://github.com/mboukhalfa/multironic " }, { "title": "Criminal IP NSE Script", "trust": 0.1, "url": "https://github.com/criminalip/CIP-NSE-Script " }, { "title": "Intro: What\u0027s pique or repique\n\n\nOverview", "trust": 0.1, "url": "https://github.com/AZ-X/pique " }, { "title": "https://github.com/klcheung99/CSCM28CW2", "trust": 0.1, "url": "https://github.com/klcheung99/CSCM28CW2 " }, { "title": "Kaosagnt\u0027s Ansible Everyday Utils", "trust": 0.1, "url": "https://github.com/kaosagnt/ansible-everyday " }, { "title": "F5\u306e\u8106\u5f31\u6027\u60c5\u5831", "trust": 0.1, "url": "https://github.com/DNTYO/F5_Vulnerability " }, { "title": "Vulnerability", "trust": 0.1, "url": "https://github.com/tzwlhack/Vulnerability " }, { "title": "TOP\nTable of Contents\nDonation", "trust": 0.1, "url": "https://github.com/JERRY123S/all-poc " }, { "title": "SecBooks\nSecBooks\u76ee\u5f55", "trust": 0.1, "url": "https://github.com/SexyBeast233/SecBooks " }, { "title": "Table of Contents", "trust": 0.1, "url": "https://github.com/CVEDB/top " }, { "title": "Table of Contents", "trust": 0.1, "url": "https://github.com/CVEDB/awesome-cve-repo " }, { "title": "TOP\nTable of Contents\nDonation", "trust": 0.1, "url": "https://github.com/hktalent/TOP " }, { "title": "TOP\nTable of Contents\nDonation", "trust": 0.1, "url": "https://github.com/cyberanand1337x/bug-bounty-2022 " }, { "title": "TOP\nTable of Contents\nDonation", "trust": 0.1, "url": "https://github.com/weeka10/-hktalent-TOP " }, { "title": "The Register", "trust": 0.1, "url": "https://www.theregister.co.uk/2021/01/20/dns_cache_poisoning/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-16430" }, { "db": "VULMON", "id": "CVE-2020-25685" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-326", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2020-25685" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://www.jsof-tech.com/disclosures/dnspooq/" }, { "trust": 1.1, "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889688" }, { "trust": 1.1, "url": "https://security.gentoo.org/glsa/202101-17" }, { "trust": 1.1, "url": "https://www.debian.org/security/2021/dsa-4844" }, { "trust": 1.1, "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/12135-security-advisory-61" }, { "trust": 1.1, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/wyw3ir6apuskoykl5ft3actihwhgqy32/" }, { "trust": 1.1, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/qgb7hl3owhtlepsmldgomxqkg3km2qme/" }, { "trust": 0.8, "url": "cve-2020-25681 " }, { "trust": 0.8, "url": "cve-2020-25682 " }, { "trust": 0.8, "url": "cve-2020-25683 " }, { "trust": 0.8, "url": "cve-2020-25684 " }, { "trust": 0.8, "url": "cve-2020-25685 " }, { "trust": 0.8, "url": "cve-2020-25686 " }, { "trust": 0.8, "url": "cve-2020-25687 " }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-25686" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-25684" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-25685" }, { "trust": 0.7, "url": "https://www.redhat.com/mailman/listinfo/rhsa-announce" }, { "trust": 0.7, "url": "https://access.redhat.com/security/cve/cve-2020-25685" }, { "trust": 0.7, "url": "https://bugzilla.redhat.com/):" }, { "trust": 0.7, "url": "https://access.redhat.com/security/cve/cve-2020-25686" }, { "trust": 0.7, "url": "https://access.redhat.com/security/cve/cve-2020-25684" }, { "trust": 0.7, "url": "https://access.redhat.com/security/team/contact/" }, { "trust": 0.6, "url": "https://access.redhat.com/security/vulnerabilities/rhsb-2021-001" }, { "trust": 0.6, "url": "https://access.redhat.com/security/team/key/" }, { "trust": 0.5, "url": "https://access.redhat.com/articles/11258" }, { "trust": 0.4, "url": "https://access.redhat.com/security/updates/classification/#important" }, { "trust": 0.3, "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-25682" }, { "trust": 0.3, "url": "https://access.redhat.com/security/cve/cve-2020-25682" }, { "trust": 0.3, "url": "https://access.redhat.com/security/cve/cve-2020-25687" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-25687" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-25683" }, { "trust": 0.3, "url": "https://access.redhat.com/security/cve/cve-2020-25681" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-25681" }, { "trust": 0.3, "url": "https://access.redhat.com/security/cve/cve-2020-25683" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/326.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2021:0156" }, { "trust": 0.1, "url": "https://github.com/knqyf263/dnspooq" }, { "trust": 0.1, "url": "https://security.archlinux.org/cve-2020-25685" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/dnsmasq/2.80-1.1ubuntu1.3" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/dnsmasq/2.79-1ubuntu0.3" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/dnsmasq/2.75-1ubuntu0.16.04.8" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-14834" }, { "trust": 0.1, "url": "https://usn.ubuntu.com/4698-1" }, { "trust": 0.1, "url": "https://usn.ubuntu.com/4698-2" }, { "trust": 0.1, "url": "https://launchpad.net/bugs/1916462" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/dnsmasq/2.82-1ubuntu1.2" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2021:0240" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2021:0150" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2021:0155" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-25696" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-20182" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-25696" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-25694" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2021:0281" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-25694" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-2304" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-20182" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-14382" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-2305" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-8559" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-8559" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-14382" }, { "trust": 0.1, "url": "https://docs.openshift.com/container-platform/4.4/release_notes/ocp-4-4-rel" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-2305" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-2304" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-8564" }, { "trust": 0.1, "url": "https://docs.openshift.com/container-platform/4.4/updating/updating-cluster" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-8564" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2021:0282" }, { "trust": 0.1, "url": "https://access.redhat.com/articles/2974891" }, { "trust": 0.1, "url": "https://access.redhat.com/security/vulnerabilities/rhsb-2021-002" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-3156" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-3156" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2021:0395" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2021:0153" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2021:0151" } ], "sources": [ { "db": "CERT/CC", "id": "VU#434904" }, { "db": "CNVD", "id": "CNVD-2021-16430" }, { "db": "VULMON", "id": "CVE-2020-25685" }, { "db": "PACKETSTORM", "id": "161535" }, { "db": "PACKETSTORM", "id": "161100" }, { "db": "PACKETSTORM", "id": "161012" }, { "db": "PACKETSTORM", "id": "161020" }, { "db": "PACKETSTORM", "id": "161269" }, { "db": "PACKETSTORM", "id": "161272" }, { "db": "PACKETSTORM", "id": "161017" }, { "db": "PACKETSTORM", "id": "161014" }, { "db": "NVD", "id": "CVE-2020-25685" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CERT/CC", "id": "VU#434904" }, { "db": "CNVD", "id": "CNVD-2021-16430" }, { "db": "VULMON", "id": "CVE-2020-25685" }, { "db": "PACKETSTORM", "id": "161535" }, { "db": "PACKETSTORM", "id": "161100" }, { "db": "PACKETSTORM", "id": "161012" }, { "db": "PACKETSTORM", "id": "161020" }, { "db": "PACKETSTORM", "id": "161269" }, { "db": "PACKETSTORM", "id": "161272" }, { "db": "PACKETSTORM", "id": "161017" }, { "db": "PACKETSTORM", "id": "161014" }, { "db": "NVD", "id": "CVE-2020-25685" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-01-19T00:00:00", "db": "CERT/CC", "id": "VU#434904" }, { "date": "2021-03-11T00:00:00", "db": "CNVD", "id": "CNVD-2021-16430" }, { "date": "2021-01-20T00:00:00", "db": "VULMON", "id": "CVE-2020-25685" }, { "date": "2021-02-25T15:26:41", "db": "PACKETSTORM", "id": "161535" }, { "date": "2021-01-25T17:28:49", "db": "PACKETSTORM", "id": "161100" }, { "date": "2021-01-19T14:45:12", "db": "PACKETSTORM", "id": "161012" }, { "date": "2021-01-19T14:46:21", "db": "PACKETSTORM", "id": "161020" }, { "date": "2021-02-03T16:14:39", "db": "PACKETSTORM", "id": "161269" }, { "date": "2021-02-03T16:22:29", "db": "PACKETSTORM", "id": "161272" }, { "date": "2021-01-19T14:45:56", "db": "PACKETSTORM", "id": "161017" }, { "date": "2021-01-19T14:45:29", "db": "PACKETSTORM", "id": "161014" }, { "date": "2021-01-20T16:15:14.303000", "db": "NVD", "id": "CVE-2020-25685" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-10-06T00:00:00", "db": "CERT/CC", "id": "VU#434904" }, { "date": "2021-07-15T00:00:00", "db": "CNVD", "id": "CNVD-2021-16430" }, { "date": "2023-11-07T00:00:00", "db": "VULMON", "id": "CVE-2020-25685" }, { "date": "2023-11-07T03:20:22.197000", "db": "NVD", "id": "CVE-2020-25685" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "PACKETSTORM", "id": "161535" } ], "trust": 0.1 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Dnsmasq is vulnerable to memory corruption and cache poisoning", "sources": [ { "db": "CERT/CC", "id": "VU#434904" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "overflow", "sources": [ { "db": "PACKETSTORM", "id": "161012" }, { "db": "PACKETSTORM", "id": "161272" }, { "db": "PACKETSTORM", "id": "161014" } ], "trust": 0.3 } }
ghsa-9gxq-wfg7-72x4
Vulnerability from github
A flaw was found in dnsmasq before version 2.83. When getting a reply from a forwarded query, dnsmasq checks in forward.c:reply_query(), which is the forwarded query that matches the reply, by only using a weak hash of the query name. Due to the weak hash (CRC32 when dnsmasq is compiled without DNSSEC, SHA-1 when it is) this flaw allows an off-path attacker to find several different domains all having the same hash, substantially reducing the number of attempts they would have to perform to forge a reply and get it accepted by dnsmasq. This is in contrast with RFC5452, which specifies that the query name is one of the attributes of a query that must be used to match a reply. This flaw could be abused to perform a DNS Cache Poisoning attack. If chained with CVE-2020-25684 the attack complexity of a successful attack is reduced. The highest threat from this vulnerability is to data integrity.
{ "affected": [], "aliases": [ "CVE-2020-25685" ], "database_specific": { "cwe_ids": [ "CWE-326", "CWE-358" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2021-01-20T16:15:00Z", "severity": "MODERATE" }, "details": "A flaw was found in dnsmasq before version 2.83. When getting a reply from a forwarded query, dnsmasq checks in forward.c:reply_query(), which is the forwarded query that matches the reply, by only using a weak hash of the query name. Due to the weak hash (CRC32 when dnsmasq is compiled without DNSSEC, SHA-1 when it is) this flaw allows an off-path attacker to find several different domains all having the same hash, substantially reducing the number of attempts they would have to perform to forge a reply and get it accepted by dnsmasq. This is in contrast with RFC5452, which specifies that the query name is one of the attributes of a query that must be used to match a reply. This flaw could be abused to perform a DNS Cache Poisoning attack. If chained with CVE-2020-25684 the attack complexity of a successful attack is reduced. The highest threat from this vulnerability is to data integrity.", "id": "GHSA-9gxq-wfg7-72x4", "modified": "2022-10-07T18:15:55Z", "published": "2022-05-24T17:39:33Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25685" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889688" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGB7HL3OWHTLEPSMLDGOMXQKG3KM2QME" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WYW3IR6APUSKOYKL5FT3ACTIHWHGQY32" }, { "type": "WEB", "url": "https://security.gentoo.org/glsa/202101-17" }, { "type": "WEB", "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/12135-security-advisory-61" }, { "type": "WEB", "url": "https://www.debian.org/security/2021/dsa-4844" }, { "type": "WEB", "url": "https://www.jsof-tech.com/disclosures/dnspooq" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "type": "CVSS_V3" } ] }
gsd-2020-25685
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2020-25685", "description": "A flaw was found in dnsmasq before version 2.83. When getting a reply from a forwarded query, dnsmasq checks in forward.c:reply_query(), which is the forwarded query that matches the reply, by only using a weak hash of the query name. Due to the weak hash (CRC32 when dnsmasq is compiled without DNSSEC, SHA-1 when it is) this flaw allows an off-path attacker to find several different domains all having the same hash, substantially reducing the number of attempts they would have to perform to forge a reply and get it accepted by dnsmasq. This is in contrast with RFC5452, which specifies that the query name is one of the attributes of a query that must be used to match a reply. This flaw could be abused to perform a DNS Cache Poisoning attack. If chained with CVE-2020-25684 the attack complexity of a successful attack is reduced. The highest threat from this vulnerability is to data integrity.", "id": "GSD-2020-25685", "references": [ "https://www.suse.com/security/cve/CVE-2020-25685.html", "https://www.debian.org/security/2021/dsa-4844", "https://access.redhat.com/errata/RHSA-2021:0401", "https://access.redhat.com/errata/RHSA-2021:0395", "https://access.redhat.com/errata/RHSA-2021:0245", "https://access.redhat.com/errata/RHSA-2021:0240", "https://access.redhat.com/errata/RHSA-2021:0156", "https://access.redhat.com/errata/RHSA-2021:0155", "https://access.redhat.com/errata/RHSA-2021:0154", "https://access.redhat.com/errata/RHSA-2021:0153", "https://access.redhat.com/errata/RHSA-2021:0152", "https://access.redhat.com/errata/RHSA-2021:0151", "https://access.redhat.com/errata/RHSA-2021:0150", "https://ubuntu.com/security/CVE-2020-25685", "https://advisories.mageia.org/CVE-2020-25685.html", "https://security.archlinux.org/CVE-2020-25685", "https://linux.oracle.com/cve/CVE-2020-25685.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2020-25685" ], "details": "A flaw was found in dnsmasq before version 2.83. When getting a reply from a forwarded query, dnsmasq checks in forward.c:reply_query(), which is the forwarded query that matches the reply, by only using a weak hash of the query name. Due to the weak hash (CRC32 when dnsmasq is compiled without DNSSEC, SHA-1 when it is) this flaw allows an off-path attacker to find several different domains all having the same hash, substantially reducing the number of attempts they would have to perform to forge a reply and get it accepted by dnsmasq. This is in contrast with RFC5452, which specifies that the query name is one of the attributes of a query that must be used to match a reply. This flaw could be abused to perform a DNS Cache Poisoning attack. If chained with CVE-2020-25684 the attack complexity of a successful attack is reduced. The highest threat from this vulnerability is to data integrity.", "id": "GSD-2020-25685", "modified": "2023-12-13T01:21:56.939180Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2020-25685", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "dnsmasq", "version": { "version_data": [ { "version_value": "dnsmasq 2.83" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A flaw was found in dnsmasq before version 2.83. When getting a reply from a forwarded query, dnsmasq checks in forward.c:reply_query(), which is the forwarded query that matches the reply, by only using a weak hash of the query name. Due to the weak hash (CRC32 when dnsmasq is compiled without DNSSEC, SHA-1 when it is) this flaw allows an off-path attacker to find several different domains all having the same hash, substantially reducing the number of attempts they would have to perform to forge a reply and get it accepted by dnsmasq. This is in contrast with RFC5452, which specifies that the query name is one of the attributes of a query that must be used to match a reply. This flaw could be abused to perform a DNS Cache Poisoning attack. If chained with CVE-2020-25684 the attack complexity of a successful attack is reduced. The highest threat from this vulnerability is to data integrity." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-326" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.jsof-tech.com/disclosures/dnspooq/", "refsource": "MISC", "url": "https://www.jsof-tech.com/disclosures/dnspooq/" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1889688", "refsource": "MISC", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889688" }, { "name": "FEDORA-2021-84440e87ba", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WYW3IR6APUSKOYKL5FT3ACTIHWHGQY32/" }, { "name": "GLSA-202101-17", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/202101-17" }, { "name": "DSA-4844", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4844" }, { "name": "FEDORA-2021-2e4c3d5a9d", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGB7HL3OWHTLEPSMLDGOMXQKG3KM2QME/" }, { "name": "https://www.arista.com/en/support/advisories-notices/security-advisories/12135-security-advisory-61", "refsource": "MISC", "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/12135-security-advisory-61" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:thekelleys:dnsmasq:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.83", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:arista:eos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "4.21.14m", "versionStartIncluding": "4.21", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:arista:eos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "4.22.9m", "versionStartIncluding": "4.22", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:arista:eos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "4.23.7m", "versionStartIncluding": "4.23", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:arista:eos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "4.24.5m", "versionStartIncluding": "4.24", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:arista:eos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "4.25.2f", "versionStartIncluding": "4.25", "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2020-25685" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "A flaw was found in dnsmasq before version 2.83. When getting a reply from a forwarded query, dnsmasq checks in forward.c:reply_query(), which is the forwarded query that matches the reply, by only using a weak hash of the query name. Due to the weak hash (CRC32 when dnsmasq is compiled without DNSSEC, SHA-1 when it is) this flaw allows an off-path attacker to find several different domains all having the same hash, substantially reducing the number of attempts they would have to perform to forge a reply and get it accepted by dnsmasq. This is in contrast with RFC5452, which specifies that the query name is one of the attributes of a query that must be used to match a reply. This flaw could be abused to perform a DNS Cache Poisoning attack. If chained with CVE-2020-25684 the attack complexity of a successful attack is reduced. The highest threat from this vulnerability is to data integrity." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-326" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.jsof-tech.com/disclosures/dnspooq/", "refsource": "MISC", "tags": [ "Third Party Advisory" ], "url": "https://www.jsof-tech.com/disclosures/dnspooq/" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1889688", "refsource": "MISC", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889688" }, { "name": "FEDORA-2021-84440e87ba", "refsource": "FEDORA", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WYW3IR6APUSKOYKL5FT3ACTIHWHGQY32/" }, { "name": "GLSA-202101-17", "refsource": "GENTOO", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202101-17" }, { "name": "DSA-4844", "refsource": "DEBIAN", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2021/dsa-4844" }, { "name": "FEDORA-2021-2e4c3d5a9d", "refsource": "FEDORA", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGB7HL3OWHTLEPSMLDGOMXQKG3KM2QME/" }, { "name": "https://www.arista.com/en/support/advisories-notices/security-advisories/12135-security-advisory-61", "refsource": "MISC", "tags": [ "Third Party Advisory" ], "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/12135-security-advisory-61" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 1.4 } }, "lastModifiedDate": "2022-12-08T03:08Z", "publishedDate": "2021-01-20T16:15Z" } } }
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.