dnsmasq is vulnerable to DNS cache poisoning. The vulnerability exists as dnsmasq uses a fixed port while forwarding queries, allowing to easily forge a reply with the same transmission ID to get accepted by dnsmasq.
bugzilla.redhat.com/show_bug.cgi?id=1939368
lists.fedoraproject.org/archives/list/[email protected]/message/CVTJUOFFFHINLKWAOC2ZSC5MOPD4SJ24/
lists.fedoraproject.org/archives/list/[email protected]/message/FHG7GWSQWKF7JXIMLOGJBKZWBB4VIAJ7/
lists.fedoraproject.org/archives/list/[email protected]/message/GHURNEHHUBSW45KMIZ4FNBCSUPWPGV5V/
security-tracker.debian.org/tracker/CVE-2021-3448
security.gentoo.org/glsa/202105-20
www.oracle.com/security-alerts/cpujan2022.html