Check destination of DNS UDP query replies. 51/252551/1
authorSeonah Moon <seonah1.moon@samsung.com>
Wed, 27 Jan 2021 11:32:53 +0000 (20:32 +0900)
committerSeonah Moon <seonah1.moon@samsung.com>
Fri, 29 Jan 2021 07:45:45 +0000 (16:45 +0900)
commit02295c49aa8ffccef0cc4a55cfdd08a542134ea9
tree651f554865f2dfad8cf8ec0bd30cbf5802d849bf
parent185007ba90f4f1c0bf7c6b3988db241a78c34a0f
Check destination of DNS UDP query replies.

At any time, dnsmasq will have a set of sockets open, bound to
random ports, on which it sends queries to upstream nameservers.
This patch fixes the existing problem that a reply for ANY in-flight
query would be accepted via ANY open port, which increases the
chances of an attacker flooding answers "in the blind" in an
attempt to poison the DNS cache. CERT VU#434904 refers.

Backported for CVE-2020-25684

Change-Id: I11790b18ad6e179a6f3f47fee310cd00ab3c7cdd
CHANGELOG
src/forward.c