Bug 1199288 - (CVE-2022-30295) VUL-1: CVE-2022-30295: klee-uclibc: uClibc-ng through 1.0.40 and uClibc through 0.9.33.2 use predictable DNS transaction IDs
(CVE-2022-30295)
VUL-1: CVE-2022-30295: klee-uclibc: uClibc-ng through 1.0.40 and uClibc throu...
Status: NEW
Classification: openSUSE
Product: openSUSE Distribution
Classification: openSUSE
Component: Security
Leap 15.4
Other Other
: P4 - Low : Minor (vote)
: ---
Assigned To: Security Team bot
Security Team bot
https://smash.suse.de/issue/330978/
:
Depends on:
Blocks:
  Show dependency treegraph
 
Reported: 2022-05-06 15:28 UTC by Hu
Modified: 2022-06-07 14:31 UTC (History)
1 user (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Hu 2022-05-06 15:28:46 UTC
CVE-2022-30295

uClibc-ng through 1.0.40 and uClibc through 0.9.33.2 use predictable DNS
transaction IDs that may lead to DNS cache poisoning. This is related to a reset
of a value to 0x2.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-30295
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30295
https://www.nozominetworks.com/blog/nozomi-networks-discovers-unpatched-dns-bug-in-popular-c-standard-library-putting-iot-at-risk/
Comment 1 Hu 2022-05-06 15:29:01 UTC
klee-uclibc could be affected in:
- openSUSE:Factory/klee-uclibc 1.2