You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
dnsmasq, dnsmasq-full are vulnerable to remote code execution and other severe attacks.
dnsmasq in openwrt is below 2.83,
e.g. 2.80 which renders nearly all openwrt-deployments vulnerable.
Page 19:
"
Update your dnsmasq software to the latest version (2.83 or above). This is the best and only complete mitigation.
"
So please
-update dnsmasq and its flavors (-full, etc) asap to higher than 2.83 for all platforms of openwrt.
-notify the users by adding a big notice on the openwrt.org homepage, that they should
update their openwrt deployments.
Thanks in advance.
The text was updated successfully, but these errors were encountered:
levush:
dnsmasq, dnsmasq-full, CVE-2020-25681, CVE-2020-25687, CVE-2020-25684, CVCVE-2020-25685, RCE
dnsmasq, dnsmasq-full are vulnerable to remote code execution and other severe attacks.
dnsmasq in openwrt is below 2.83,
e.g. 2.80 which renders nearly all openwrt-deployments vulnerable.
mitigation:
see
https://www.jsof-tech.com/wp-content/uploads/2021/01/DNSpooq_Technical-Whitepaper.pdf
Page 19:
"
Update your dnsmasq software to the latest version (2.83 or above). This is the best and only complete mitigation.
"
So please
-update dnsmasq and its flavors (-full, etc) asap to higher than 2.83 for all platforms of openwrt.
-notify the users by adding a big notice on the openwrt.org homepage, that they should
update their openwrt deployments.
Thanks in advance.
The text was updated successfully, but these errors were encountered: