Search CVE reports
1 – 10 of 47 results
A vulnerability was determined in dnsmasq up to 2.73rc6. Affected by this issue is the function parse_dhcp_opt of the file src/option.c of the component Config File Handler. This manipulation of the argument m causes null pointer...
1 affected package
dnsmasq
| Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|
| dnsmasq | Needs evaluation | Needs evaluation | Needs evaluation | Needs evaluation |
A vulnerability was found in dnsmasq up to 2.73rc6. Affected by this vulnerability is the function check_servers of the file src/network.c of the component Config File Handler. The manipulation results in null pointer dereference....
1 affected package
dnsmasq
| Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|
| dnsmasq | Needs evaluation | Needs evaluation | Needs evaluation | Needs evaluation |
A vulnerability has been found in dnsmasq up to 2.73rc6. Affected is the function parse_hex of the file src/util.c of the component Config File Handler. The manipulation of the argument i leads to heap-based buffer overflow. Local...
1 affected package
dnsmasq
| Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|
| dnsmasq | Needs evaluation | Needs evaluation | Needs evaluation | Needs evaluation |
dnsmasq 2.9 is vulnerable to Integer Overflow via forward_query.
1 affected package
dnsmasq
| Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|
| dnsmasq | Not affected | Fixed | Fixed | Fixed |
Some fixes available 26 of 47
The Closest Encloser Proof aspect of the DNS protocol (in RFC 5155 when RFC 9276 guidance is skipped) allows remote attackers to cause a denial of service (CPU consumption for SHA-1 computations) via DNSSEC responses in a random...
7 affected packages
bind9, isc-dhcp, unbound, pdns-recursor, dnsmasq...
| Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|
| bind9 | Fixed | Fixed | Fixed | Fixed |
| isc-dhcp | Needs evaluation | Not affected | Not affected | Not affected |
| unbound | Fixed | Fixed | Fixed | Needs evaluation |
| pdns-recursor | Not affected | Needs evaluation | Needs evaluation | Needs evaluation |
| dnsmasq | Fixed | Fixed | Fixed | Fixed |
| knot-resolver | Not affected | Needs evaluation | Needs evaluation | Needs evaluation |
| bind9-libs | Not in release | Needs evaluation | Needs evaluation | Not in release |
Some fixes available 26 of 46
Certain DNSSEC aspects of the DNS protocol (in RFC 4033, 4034, 4035, 6840, and related RFCs) allow remote attackers to cause a denial of service (CPU consumption) via one or more DNSSEC responses, aka the "KeyTrap" issue. One of...
7 affected packages
bind9, isc-dhcp, unbound, pdns-recursor, dnsmasq...
| Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|
| bind9 | Fixed | Fixed | Fixed | Fixed |
| isc-dhcp | Needs evaluation | Not affected | Not affected | Not affected |
| unbound | Fixed | Fixed | Fixed | Needs evaluation |
| pdns-recursor | Not affected | Needs evaluation | Needs evaluation | Needs evaluation |
| dnsmasq | Fixed | Fixed | Fixed | Fixed |
| knot-resolver | Not affected | Needs evaluation | Needs evaluation | Needs evaluation |
| bind9-libs | Not in release | Needs evaluation | Needs evaluation | Not in release |
Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2019-14834. Reason: This candidate is a reservation duplicate of CVE-2019-14834. Notes: All CVE users should reference CVE-2019-14834 instead of this candidate....
1 affected package
dnsmasq
| Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|
| dnsmasq | — | Not affected | Not affected | Not affected |
Some fixes available 8 of 9
An issue was discovered in Dnsmasq before 2.90. The default maximum EDNS.0 UDP packet size was set to 4096 but should be 1232 because of DNS Flag Day 2020.
1 affected package
dnsmasq
| Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|
| dnsmasq | Fixed | Fixed | Fixed | Fixed |
A single-byte, non-arbitrary write/use-after-free flaw was found in dnsmasq. This flaw allows an attacker who sends a crafted packet processed by dnsmasq, potentially causing a denial of service.
1 affected package
dnsmasq
| Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|
| dnsmasq | — | Fixed | Fixed | Fixed |
Dnsmasq 2.86 has a heap-based buffer overflow in answer_request (called from FuzzAnswerTheRequest and fuzz_rfc1035.c). NOTE: the vendor's position is that CVE-2021-45951 through CVE-2021-45957 "do not represent...
1 affected package
dnsmasq
| Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|
| dnsmasq | — | Not affected | Not affected | Not affected |