Bug 2441855 (CVE-2026-2966)
| Summary: | CVE-2026-2966 Mongoose: Mongoose: Information disclosure due to insufficiently random values in DNS transaction ID handling | ||
|---|---|---|---|
| Product: | [Other] Security Response | Reporter: | OSIDB Bzimport <bzimport> |
| Component: | vulnerability | Assignee: | Product Security DevOps Team <prodsec-dev> |
| Status: | NEW --- | QA Contact: | |
| Severity: | medium | Docs Contact: | |
| Priority: | medium | ||
| Version: | unspecified | Keywords: | Security |
| Target Milestone: | --- | ||
| Target Release: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| Whiteboard: | |||
| Fixed In Version: | Doc Type: | --- | |
| Doc Text: |
A flaw was found in Cesanta Mongoose. A remote attacker could exploit a weakness in the mg_sendnsreq function within the DNS Transaction ID Handler component. By manipulating the random argument, an attacker can cause the generation of insufficiently random values. This vulnerability can lead to information disclosure.
|
Story Points: | --- |
| Clone Of: | Environment: | ||
| Last Closed: | Type: | --- | |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
| Bug Depends On: | 2441887, 2441888, 2441889, 2441890, 2441891, 2441892, 2441893 | ||
| Bug Blocks: | |||
|
Description
OSIDB Bzimport
2026-02-23 03:01:34 UTC
|