|
|
Subscribe / Log in / New account

dnsmasq: information disclosure

Package(s):dnsmasq CVE #(s):CVE-2015-3294
Created:May 5, 2015 Updated:December 18, 2015
Description: From the CVE entry:

The tcp_request function in Dnsmasq before 2.73rc4 does not properly handle the return value of the setup_reply function, which allows remote attackers to read process memory and cause a denial of service (out-of-bounds read and crash) via a malformed DNS request.

Alerts:
Gentoo 201512-01 dnsmasq 2015-12-17
Mageia MGASA-2015-0214 dnsmasq 2015-05-12
openSUSE openSUSE-SU-2015:0857-1 dnsmasq 2015-05-12
Debian DSA-3251-2 dnsmasq 2015-05-07
Debian DSA-3251-1 dnsmasq 2015-05-05
Ubuntu USN-2593-1 dnsmasq 2015-05-04
Debian-LTS DLA-225-1 dnsmasq 2015-05-20

to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds