rpm package
suse/dnsmasq&distro=SUSE Linux Enterprise Micro 5.1
pkg:rpm/suse/dnsmasq&distro=SUSE%20Linux%20Enterprise%20Micro%205.1
Vulnerabilities (6)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2023-50868 | — | < 2.90-150100.7.28.1 | 2.90-150100.7.28.1 | Feb 14, 2024 | The Closest Encloser Proof aspect of the DNS protocol (in RFC 5155 when RFC 9276 guidance is skipped) allows remote attackers to cause a denial of service (CPU consumption for SHA-1 computations) via DNSSEC responses in a random subdomain attack, aka the "NSEC3" issue. The RFC 51 | ||
| CVE-2023-50387 | — | < 2.90-150100.7.28.1 | 2.90-150100.7.28.1 | Feb 14, 2024 | Certain DNSSEC aspects of the DNS protocol (in RFC 4033, 4034, 4035, 6840, and related RFCs) allow remote attackers to cause a denial of service (CPU consumption) via one or more DNSSEC responses, aka the "KeyTrap" issue. One of the concerns is that, when there is a zone with man | ||
| CVE-2023-28450 | — | < 2.86-150100.7.23.1 | 2.86-150100.7.23.1 | Mar 15, 2023 | An issue was discovered in Dnsmasq before 2.90. The default maximum EDNS.0 UDP packet size was set to 4096 but should be 1232 because of DNS Flag Day 2020. | ||
| CVE-2022-0934 | — | < 2.86-150100.7.20.1 | 2.86-150100.7.20.1 | Aug 29, 2022 | A single-byte, non-arbitrary write/use-after-free flaw was found in dnsmasq. This flaw allows an attacker who sends a crafted packet processed by dnsmasq, potentially causing a denial of service. | ||
| CVE-2021-3448 | — | < 2.86-7.14.1 | 2.86-7.14.1 | Apr 8, 2021 | A flaw was found in dnsmasq in versions before 2.85. When configured to use a specific server for a given network interface, dnsmasq uses a fixed port while forwarding queries. An attacker on the network, able to find the outgoing port used by dnsmasq, only needs to guess the ran | ||
| CVE-2020-14312 | — | < 2.86-7.14.1 | 2.86-7.14.1 | Feb 5, 2021 | A flaw was found in the default configuration of dnsmasq, as shipped with Fedora versions prior to 31 and in all versions Red Hat Enterprise Linux, where it listens on any interface and accepts queries from addresses outside of its local subnet. In particular, the option `local-s |
- CVE-2023-50868Feb 14, 2024affected < 2.90-150100.7.28.1fixed 2.90-150100.7.28.1
The Closest Encloser Proof aspect of the DNS protocol (in RFC 5155 when RFC 9276 guidance is skipped) allows remote attackers to cause a denial of service (CPU consumption for SHA-1 computations) via DNSSEC responses in a random subdomain attack, aka the "NSEC3" issue. The RFC 51
- CVE-2023-50387Feb 14, 2024affected < 2.90-150100.7.28.1fixed 2.90-150100.7.28.1
Certain DNSSEC aspects of the DNS protocol (in RFC 4033, 4034, 4035, 6840, and related RFCs) allow remote attackers to cause a denial of service (CPU consumption) via one or more DNSSEC responses, aka the "KeyTrap" issue. One of the concerns is that, when there is a zone with man
- CVE-2023-28450Mar 15, 2023affected < 2.86-150100.7.23.1fixed 2.86-150100.7.23.1
An issue was discovered in Dnsmasq before 2.90. The default maximum EDNS.0 UDP packet size was set to 4096 but should be 1232 because of DNS Flag Day 2020.
- CVE-2022-0934Aug 29, 2022affected < 2.86-150100.7.20.1fixed 2.86-150100.7.20.1
A single-byte, non-arbitrary write/use-after-free flaw was found in dnsmasq. This flaw allows an attacker who sends a crafted packet processed by dnsmasq, potentially causing a denial of service.
- CVE-2021-3448Apr 8, 2021affected < 2.86-7.14.1fixed 2.86-7.14.1
A flaw was found in dnsmasq in versions before 2.85. When configured to use a specific server for a given network interface, dnsmasq uses a fixed port while forwarding queries. An attacker on the network, able to find the outgoing port used by dnsmasq, only needs to guess the ran
- CVE-2020-14312Feb 5, 2021affected < 2.86-7.14.1fixed 2.86-7.14.1
A flaw was found in the default configuration of dnsmasq, as shipped with Fedora versions prior to 31 and in all versions Red Hat Enterprise Linux, where it listens on any interface and accepts queries from addresses outside of its local subnet. In particular, the option `local-s