summaryrefslogtreecommitdiffstats
path: root/active/CVE-2021-20322
blob: bfaad8482cfe41ad8f062a5394d661f98d58582f (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
Description: new DNS Cache Poisoning Attack based on ICMP fragment needed packets replies
References:
 https://bugzilla.redhat.com/show_bug.cgi?id=2014230
Notes:
 carnil> Backports for 4.19.y and 4.9.y seems incomplete for the time
 carnil> beeing and only have the "ipv4: make exception cache less
 carnil> predictible" patch.
Bugs:
upstream: released (5.14) [4785305c05b25a242e5314cc821f54ade4c18810, 6457378fe796815c973f631a1904e147d6ee33b1], released (5.15-rc1) [a00df2caffed3883c341d5685f830434312e4a43, 67d6d681e15b578c1725bad8ad079e05d1c48a8e]
5.10-upstream-stable: released (5.10.62) ]dced8347a727528b388f04820f48166f1e651af6, beefd5f0c63a31a83bc5a99e6888af884745684b], released (5.10.65) [8692f0bb29927d13a871b198adff1d336a8d2d00, 5867e20e1808acd0c832ddea2587e5ee49813874]
4.19-upstream-stable: released (4.19.207) [3e6bd2b583f18da9856fc9741ffa200a74a52cba]
4.9-upstream-stable: released (4.9.283) [f10ce783bcc4d8ea454563a7d56ae781640e7dcb]
sid: released (5.14.6-1)
5.10-bullseye-security: released (5.10.70-1)
4.19-buster-security:
4.9-stretch-security:

© 2014-2024 Faster IT GmbH | imprint | privacy policy