Dnsmasq: DNS cache poisoning Use of insufficient randomness in Dnsmasq might lead to DNS Cache Poisoning. dnsmasq 2021-05-26 2021-05-26 782130 local, remote 2.85 2.85

Dnsmasq is a lightweight and easily-configurable DNS forwarder and DHCP server.

It was discovered that Dnsmasq, when configured with --server=<address>@ or similar (e.g. through dbus), configured a fixed UDP port for all outgoing queries to the specified upstream DNS server.

An attacker, by sending malicious crafted DNS responses, could perform a DNS Cache Poisoning attack.

There is no known workaround at this time.

All Dnsmasq users should upgrade to the latest version:

# emerge --sync # emerge --ask --oneshot --verbose ">=net-dns/dnsmasq-2.85"
CVE-2021-3448 whissi whissi