mirror of
https://github.com/pi-hole/dnsmasq.git
synced 2025-12-19 10:18:25 +00:00
Check destination of DNS UDP query replies.
At any time, dnsmasq will have a set of sockets open, bound to random ports, on which it sends queries to upstream nameservers. This patch fixes the existing problem that a reply for ANY in-flight query would be accepted via ANY open port, which increases the chances of an attacker flooding answers "in the blind" in an attempt to poison the DNS cache. CERT VU#434904 refers.
This commit is contained in:
@@ -6,8 +6,12 @@ version 2.83
|
||||
dnsmasq with DNSSEC compiled in and enabled is vulnerable to this,
|
||||
referenced by CERT VU#434904.
|
||||
|
||||
Be sure to only accept UDP DNS query replies at the address
|
||||
from which the query was originated. This keeps as much entropy
|
||||
in the {query-ID, random-port} tuple as possible, help defeat
|
||||
cache poisoning attacks. Refer: CERT VU#434904.
|
||||
|
||||
|
||||
>>>>>>> Fix remote buffer overflow CERT VU#434904
|
||||
version 2.82
|
||||
Improve behaviour in the face of network interfaces which come
|
||||
and go and change index. Thanks to Petr Mensik for the patch.
|
||||
|
||||
Reference in New Issue
Block a user