Vulnerability Description
A single-byte, non-arbitrary write/use-after-free flaw was found in dnsmasq. This flaw allows an attacker who sends a crafted packet processed by dnsmasq, potentially causing a denial of service.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Thekelleys | Dnsmasq | < 2.87 |
| Redhat | Enterprise Linux | 8.0 |
Related Weaknesses (CWE)
References
- https://access.redhat.com/security/cve/CVE-2022-0934Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2057075Issue TrackingPatchThird Party Advisory
- https://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2022q1/016272.htmlMailing ListVendor Advisory
- https://thekelleys.org.uk/gitweb/?p=dnsmasq.git%3Ba=commit%3Bh=03345ecefeb0d82e3Broken Link
- https://access.redhat.com/security/cve/CVE-2022-0934Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2057075Issue TrackingPatchThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2024/11/msg00035.html
- https://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2022q1/016272.htmlMailing ListVendor Advisory
- https://thekelleys.org.uk/gitweb/?p=dnsmasq.git%3Ba=commit%3Bh=03345ecefeb0d82e3Broken Link
FAQ
What is CVE-2022-0934?
CVE-2022-0934 is a vulnerability with a CVSS score of 7.5 (HIGH). A single-byte, non-arbitrary write/use-after-free flaw was found in dnsmasq. This flaw allows an attacker who sends a crafted packet processed by dnsmasq, potentially causing a denial of service.
How severe is CVE-2022-0934?
CVE-2022-0934 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-0934?
Check the references section above for vendor advisories and patch information. Affected products include: Thekelleys Dnsmasq, Redhat Enterprise Linux.