Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 18 Mar 2021 00:09:51 +0000 (UTC)
From:      Matthias Andree <mandree@FreeBSD.org>
To:        ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org
Subject:   svn commit: r568701 - head/security/vuxml
Message-ID:  <202103180009.12I09p8l050187@repo.freebsd.org>

next in thread | raw e-mail | index | archive | help
Author: mandree
Date: Thu Mar 18 00:09:50 2021
New Revision: 568701
URL: https://svnweb.freebsd.org/changeset/ports/568701

Log:
  vuxml: Add dnsmasq < 2.85 cache poisoning vulnerability.
  
  This affects only certain dnsmasq configurations,
  and use of dnsmasq with NetworkManager.
  
  Security:	CVE-2021-3448

Modified:
  head/security/vuxml/vuln.xml

Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml	Wed Mar 17 23:47:53 2021	(r568700)
+++ head/security/vuxml/vuln.xml	Thu Mar 18 00:09:50 2021	(r568701)
@@ -78,6 +78,47 @@ Notes:
   * Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
 -->
 <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">;
+  <vuln vid="5b72b1ff-877c-11eb-bd4f-2f1d57dafe46">
+    <topic>dnsmasq -- cache poisoning vulnerability in certain configurations</topic>
+    <affects>
+      <package>
+	<name>dnsmasq</name>
+	<range><lt>2.85r1,1</lt></range>
+      </package>
+      <package>
+	<name>dnsmasq-devel</name>
+	<range><lt>2.85r1,1</lt></range>
+      </package>
+    </affects>
+    <description>
+      <body xmlns="http://www.w3.org/1999/xhtml">;
+	<p>Simon Kelley reports:</p>
+	<blockquote cite="https://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2021q1/014835.html">;
+	  <p>
+	    [In configurations where the forwarding server address contains an @
+	    character for specifying a sending interface or source address, the]
+	    random source port behavior was disabled, making cache poisoning
+	    attacks possible.
+	  </p>
+	</blockquote>
+	<p>
+	  This only affects configurations of the form server=1.1.1.1@em0 or
+	  server=1.1.1.1@192.0.2.1, i. e. those that specify an interface to
+	  send through, or an IP address to send from, or use together with
+	  NetworkManager.
+	</p>
+      </body>
+    </description>
+    <references>
+      <url>https://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2021q1/014835.html</url>;
+      <cvename>CVE-2021-3448</cvename>
+    </references>
+    <dates>
+      <discovery>2021-03-17</discovery>
+      <entry>2021-03-18</entry>
+    </dates>
+  </vuln>
+
   <vuln vid="b073677f-253a-41f9-bf2b-2d16072a25f6">
     <topic>minio -- MITM attack</topic>
     <affects>



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?202103180009.12I09p8l050187>