First published: Tue Feb 22 2022(Updated: )
A flaw was found in dnsmasq. A heap use after free issue in the dhcp6 server may lead to remote denial of service via crafted packet. References: <a href="https://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2022q1/016272.html">https://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2022q1/016272.html</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Thekelleys Dnsmasq | <2.87 | |
Redhat Enterprise Linux | =8.0 | |
Redhat Enterprise Linux | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-0934 is a single-byte non-arbitrary write/use-after-free flaw found in dnsmasq.
The severity of CVE-2022-0934 is high, with a CVSS score of 7.5.
The affected software includes Thekelleys Dnsmasq and Redhat Enterprise Linux 8.0 and 9.0.
CVE-2022-0934 could potentially cause a denial of service if an attacker sends a crafted packet processed by dnsmasq.
Yes, you can find more information about CVE-2022-0934 at the following references: [link 1](https://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2022q1/016272.html), [link 2](https://thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=commit;h=03345ecefeb0d82e3c3a4c28f27c3554f0611b39), [link 3](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0934).