Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2021:0152 - Security Advisory
Issued:
2021-01-19
Updated:
2021-01-19

RHSA-2021:0152 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: dnsmasq security update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for dnsmasq is now available for Red Hat Enterprise Linux 8.1 Extended Update Support.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

The dnsmasq packages contain Dnsmasq, a lightweight DNS (Domain Name Server) forwarder and DHCP (Dynamic Host Configuration Protocol) server.

Security Fix(es):

  • dnsmasq: heap-based buffer overflow in sort_rrset() when DNSSEC is enabled (CVE-2020-25681)
  • dnsmasq: buffer overflow in extract_name() due to missing length check when DNSSEC is enabled (CVE-2020-25682)
  • dnsmasq: heap-based buffer overflow with large memcpy in get_rdata() when DNSSEC is enabled (CVE-2020-25683)
  • dnsmasq: loose address/port check in reply_query() makes forging replies easier for an off-path attacker (CVE-2020-25684)
  • dnsmasq: loose query name check in reply_query() makes forging replies easier for an off-path attacker (CVE-2020-25685)
  • dnsmasq: multiple queries forwarded for the same name makes forging replies easier for an off-path attacker (CVE-2020-25686)
  • dnsmasq: heap-based buffer overflow with large memcpy in sort_rrset() when DNSSEC is enabled (CVE-2020-25687)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

Affected Products

  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.1 x86_64
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.1 s390x
  • Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.1 ppc64le
  • Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.1 aarch64
  • Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.1 ppc64le
  • Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.1 x86_64

Fixes

  • BZ - 1881875 - CVE-2020-25681 dnsmasq: heap-based buffer overflow in sort_rrset() when DNSSEC is enabled
  • BZ - 1882014 - CVE-2020-25682 dnsmasq: buffer overflow in extract_name() due to missing length check when DNSSEC is enabled
  • BZ - 1882018 - CVE-2020-25683 dnsmasq: heap-based buffer overflow with large memcpy in get_rdata() when DNSSEC is enabled
  • BZ - 1889686 - CVE-2020-25684 dnsmasq: loose address/port check in reply_query() makes forging replies easier for an off-path attacker
  • BZ - 1889688 - CVE-2020-25685 dnsmasq: loose query name check in reply_query() makes forging replies easier for an off-path attacker
  • BZ - 1890125 - CVE-2020-25686 dnsmasq: multiple queries forwarded for the same name makes forging replies easier for an off-path attacker
  • BZ - 1891568 - CVE-2020-25687 dnsmasq: heap-based buffer overflow with large memcpy in sort_rrset() when DNSSEC is enabled

CVEs

  • CVE-2020-25681
  • CVE-2020-25682
  • CVE-2020-25683
  • CVE-2020-25684
  • CVE-2020-25685
  • CVE-2020-25686
  • CVE-2020-25687

References

  • https://access.redhat.com/security/updates/classification/#important
  • https://access.redhat.com/security/vulnerabilities/RHSB-2021-001
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.1

SRPM
dnsmasq-2.79-6.el8_1.1.src.rpm SHA-256: 882fd91d107112a40309152baf8fe3dd4465fd54cd781e2feb3a03ec8c6cdbd8
x86_64
dnsmasq-2.79-6.el8_1.1.x86_64.rpm SHA-256: b3731665c3ba36eb7a96542e4d3a7983cce986ac8d7766e46832656be0d99cda
dnsmasq-debuginfo-2.79-6.el8_1.1.x86_64.rpm SHA-256: 2f9a4621a8bc944b9899d898f9b1cfba6b5c8cf10497b5bf7026f5692e582941
dnsmasq-debugsource-2.79-6.el8_1.1.x86_64.rpm SHA-256: b64fef7cfbc49f97c2715c78d89fd081fb680b23b58ccd41e2da1f0542c5f856
dnsmasq-utils-2.79-6.el8_1.1.x86_64.rpm SHA-256: 8d5974490282df9ab290be5e9f47496bede5949bc0d6e41afa3b4fb4c9b4cf44
dnsmasq-utils-debuginfo-2.79-6.el8_1.1.x86_64.rpm SHA-256: aea0b17d05d361d860147c7296a7042510982e5312ed2d00b798b1422c91677a

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.1

SRPM
dnsmasq-2.79-6.el8_1.1.src.rpm SHA-256: 882fd91d107112a40309152baf8fe3dd4465fd54cd781e2feb3a03ec8c6cdbd8
s390x
dnsmasq-2.79-6.el8_1.1.s390x.rpm SHA-256: 0f06ed910620d30a22ee72a526858dddf0dcae17d2fb7b172944568b28363c34
dnsmasq-debuginfo-2.79-6.el8_1.1.s390x.rpm SHA-256: ca9387221d3fd3a9955ebd74b40c36c736b1917195a618857fb826fb38bb6065
dnsmasq-debugsource-2.79-6.el8_1.1.s390x.rpm SHA-256: 22052be0d679446595f7956f40b74ebcfc9362ecbb16ba7621a1e176b30384e9
dnsmasq-utils-2.79-6.el8_1.1.s390x.rpm SHA-256: 4512f6725f30bc8db3f6e26d1757c360151be2d9486c836584a329179bf2fd73
dnsmasq-utils-debuginfo-2.79-6.el8_1.1.s390x.rpm SHA-256: 5c028894e4990facadf6d8e7e72679d6ec2ffd21ce12c4705cfdfbe88689e371

Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.1

SRPM
dnsmasq-2.79-6.el8_1.1.src.rpm SHA-256: 882fd91d107112a40309152baf8fe3dd4465fd54cd781e2feb3a03ec8c6cdbd8
ppc64le
dnsmasq-2.79-6.el8_1.1.ppc64le.rpm SHA-256: c97da65722e50d4b570150a70180e7ccd8e1e63f9d9708fd244cdb0513795e54
dnsmasq-debuginfo-2.79-6.el8_1.1.ppc64le.rpm SHA-256: 91d180d8c9719de1a2282b487693e2ea63a00ca036b97a17fa42bf70b0de72e9
dnsmasq-debugsource-2.79-6.el8_1.1.ppc64le.rpm SHA-256: c39def9ca735dc717d328c69353b865b11f5ddb9d7852c5ba33258dccc9eb545
dnsmasq-utils-2.79-6.el8_1.1.ppc64le.rpm SHA-256: b0e9789a5f66192de85167dd928b9d95f0bb3a9bfdba07b5a78f2eb58222dc34
dnsmasq-utils-debuginfo-2.79-6.el8_1.1.ppc64le.rpm SHA-256: 5b2d6d46aae1ddb067569064d65b0401575ccf93ecc8951eccc5fde5efe48130

Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.1

SRPM
dnsmasq-2.79-6.el8_1.1.src.rpm SHA-256: 882fd91d107112a40309152baf8fe3dd4465fd54cd781e2feb3a03ec8c6cdbd8
aarch64
dnsmasq-2.79-6.el8_1.1.aarch64.rpm SHA-256: d264d284fe92675f831045b0215232c67daaaaaaad8361932569dd8b8cba4f9d
dnsmasq-debuginfo-2.79-6.el8_1.1.aarch64.rpm SHA-256: 989911b76a3e6c722425c710cd850560e31d88a8dfbffc462190e8fcff70db59
dnsmasq-debugsource-2.79-6.el8_1.1.aarch64.rpm SHA-256: e692f991cffd517d2180390fe47a24b19450bc98118413f1ed46e18d640464c1
dnsmasq-utils-2.79-6.el8_1.1.aarch64.rpm SHA-256: ee5f05c8301e771a78d1982e0441cdf32620603f7056244aaf88387c66db8f0e
dnsmasq-utils-debuginfo-2.79-6.el8_1.1.aarch64.rpm SHA-256: 453225101f6a2f2216fd9d5de51c0bf652d289d05e06d44f129ea2ff9cbabd11

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.1

SRPM
dnsmasq-2.79-6.el8_1.1.src.rpm SHA-256: 882fd91d107112a40309152baf8fe3dd4465fd54cd781e2feb3a03ec8c6cdbd8
ppc64le
dnsmasq-2.79-6.el8_1.1.ppc64le.rpm SHA-256: c97da65722e50d4b570150a70180e7ccd8e1e63f9d9708fd244cdb0513795e54
dnsmasq-debuginfo-2.79-6.el8_1.1.ppc64le.rpm SHA-256: 91d180d8c9719de1a2282b487693e2ea63a00ca036b97a17fa42bf70b0de72e9
dnsmasq-debugsource-2.79-6.el8_1.1.ppc64le.rpm SHA-256: c39def9ca735dc717d328c69353b865b11f5ddb9d7852c5ba33258dccc9eb545
dnsmasq-utils-2.79-6.el8_1.1.ppc64le.rpm SHA-256: b0e9789a5f66192de85167dd928b9d95f0bb3a9bfdba07b5a78f2eb58222dc34
dnsmasq-utils-debuginfo-2.79-6.el8_1.1.ppc64le.rpm SHA-256: 5b2d6d46aae1ddb067569064d65b0401575ccf93ecc8951eccc5fde5efe48130

Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.1

SRPM
dnsmasq-2.79-6.el8_1.1.src.rpm SHA-256: 882fd91d107112a40309152baf8fe3dd4465fd54cd781e2feb3a03ec8c6cdbd8
x86_64
dnsmasq-2.79-6.el8_1.1.x86_64.rpm SHA-256: b3731665c3ba36eb7a96542e4d3a7983cce986ac8d7766e46832656be0d99cda
dnsmasq-debuginfo-2.79-6.el8_1.1.x86_64.rpm SHA-256: 2f9a4621a8bc944b9899d898f9b1cfba6b5c8cf10497b5bf7026f5692e582941
dnsmasq-debugsource-2.79-6.el8_1.1.x86_64.rpm SHA-256: b64fef7cfbc49f97c2715c78d89fd081fb680b23b58ccd41e2da1f0542c5f856
dnsmasq-utils-2.79-6.el8_1.1.x86_64.rpm SHA-256: 8d5974490282df9ab290be5e9f47496bede5949bc0d6e41afa3b4fb4c9b4cf44
dnsmasq-utils-debuginfo-2.79-6.el8_1.1.x86_64.rpm SHA-256: aea0b17d05d361d860147c7296a7042510982e5312ed2d00b798b1422c91677a

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility