uClibc-ng through 1.0.40 and uClibc through 0.9.33.2 use predictable DNS transaction IDs that may lead to DNS cache poisoning. This is related to a reset of a value to 0x2.
{ "versions": [ { "introduced": "0" }, { "last_affected": "1.0.40" } ] }
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-30295.json"
[ { "events": [ { "introduced": "0" }, { "last_affected": "0.9.33.2" } ] } ]