VYPR

rpm package

suse/dnsmasq&distro=SUSE Linux Enterprise Micro 5.1

pkg:rpm/suse/dnsmasq&distro=SUSE%20Linux%20Enterprise%20Micro%205.1

Vulnerabilities (6)

  • CVE-2023-50868Feb 14, 2024
    affected < 2.90-150100.7.28.1fixed 2.90-150100.7.28.1

    The Closest Encloser Proof aspect of the DNS protocol (in RFC 5155 when RFC 9276 guidance is skipped) allows remote attackers to cause a denial of service (CPU consumption for SHA-1 computations) via DNSSEC responses in a random subdomain attack, aka the "NSEC3" issue. The RFC 51

  • CVE-2023-50387Feb 14, 2024
    affected < 2.90-150100.7.28.1fixed 2.90-150100.7.28.1

    Certain DNSSEC aspects of the DNS protocol (in RFC 4033, 4034, 4035, 6840, and related RFCs) allow remote attackers to cause a denial of service (CPU consumption) via one or more DNSSEC responses, aka the "KeyTrap" issue. One of the concerns is that, when there is a zone with man

  • CVE-2023-28450Mar 15, 2023
    affected < 2.86-150100.7.23.1fixed 2.86-150100.7.23.1

    An issue was discovered in Dnsmasq before 2.90. The default maximum EDNS.0 UDP packet size was set to 4096 but should be 1232 because of DNS Flag Day 2020.

  • CVE-2022-0934Aug 29, 2022
    affected < 2.86-150100.7.20.1fixed 2.86-150100.7.20.1

    A single-byte, non-arbitrary write/use-after-free flaw was found in dnsmasq. This flaw allows an attacker who sends a crafted packet processed by dnsmasq, potentially causing a denial of service.

  • CVE-2021-3448Apr 8, 2021
    affected < 2.86-7.14.1fixed 2.86-7.14.1

    A flaw was found in dnsmasq in versions before 2.85. When configured to use a specific server for a given network interface, dnsmasq uses a fixed port while forwarding queries. An attacker on the network, able to find the outgoing port used by dnsmasq, only needs to guess the ran

  • CVE-2020-14312Feb 5, 2021
    affected < 2.86-7.14.1fixed 2.86-7.14.1

    A flaw was found in the default configuration of dnsmasq, as shipped with Fedora versions prior to 31 and in all versions Red Hat Enterprise Linux, where it listens on any interface and accepts queries from addresses outside of its local subnet. In particular, the option `local-s