CVE-2022-0934

A single-byte, non-arbitrary write/use-after-free flaw was found in dnsmasq. This flaw allows an attacker who sends a crafted packet processed by dnsmasq, potentially causing a denial of service.
Configurations

Configuration 1 (hide)

cpe:2.3:a:thekelleys:dnsmasq:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*

History

21 Nov 2024, 06:39

Type Values Removed Values Added
References () https://access.redhat.com/security/cve/CVE-2022-0934 - Third Party Advisory () https://access.redhat.com/security/cve/CVE-2022-0934 - Third Party Advisory
References () https://bugzilla.redhat.com/show_bug.cgi?id=2057075 - Issue Tracking, Patch, Third Party Advisory () https://bugzilla.redhat.com/show_bug.cgi?id=2057075 - Issue Tracking, Patch, Third Party Advisory
References () https://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2022q1/016272.html - Mailing List, Vendor Advisory () https://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2022q1/016272.html - Mailing List, Vendor Advisory
References () https://thekelleys.org.uk/gitweb/?p=dnsmasq.git%3Ba=commit%3Bh=03345ecefeb0d82e3c3a4c28f27c3554f0611b39 - Broken Link () https://thekelleys.org.uk/gitweb/?p=dnsmasq.git%3Ba=commit%3Bh=03345ecefeb0d82e3c3a4c28f27c3554f0611b39 - Broken Link

Information

Published : 2022-08-29 15:15

Updated : 2024-11-21 06:39


NVD link : CVE-2022-0934

Mitre link : CVE-2022-0934

CVE.ORG link : CVE-2022-0934


JSON object : View

Products Affected

redhat

  • enterprise_linux

thekelleys

  • dnsmasq
CWE
CWE-416

Use After Free