Search CVE reports
1 – 10 of 50 results
Source checks inoperative when RFC7871 client subnet information is used.
1 affected package
dnsmasq
| Package | 26.04 LTS | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|---|
| dnsmasq | Vulnerable | Vulnerable | Vulnerable | Vulnerable | Vulnerable |
Heap OOB write on crafted DHCPv6 packet, exploitable from adjacent networks, when --dhcp-script is used. Write limited to [0-9a-z:] characters.
1 affected package
dnsmasq
| Package | 26.04 LTS | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|---|
| dnsmasq | Vulnerable | Vulnerable | Vulnerable | Vulnerable | Vulnerable |
Heap OOB read on crafted DNS packet when DNSSEC validation is enabled.
1 affected package
dnsmasq
| Package | 26.04 LTS | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|---|
| dnsmasq | Vulnerable | Vulnerable | Vulnerable | Vulnerable | Vulnerable |
heap buffer overflow in union bigname
1 affected package
dnsmasq
| Package | 26.04 LTS | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|---|
| dnsmasq | Vulnerable | Vulnerable | Vulnerable | Vulnerable | Vulnerable |
(A flaw was found in dnsmasq. A remote attacker could exploit an out-of ...)
1 affected package
dnsmasq
| Package | 26.04 LTS | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|---|
| dnsmasq | Needs evaluation | Needs evaluation | Needs evaluation | Needs evaluation | Needs evaluation |
Some fixes available 2 of 5
Dnsmasq-utils 2.79-1 contains a buffer overflow vulnerability in the dhcp_release utility that allows attackers to cause a denial of service by supplying excessive input. Attackers can trigger a core dump and terminate the...
1 affected package
dnsmasq
| Package | 26.04 LTS | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|---|
| dnsmasq | Not affected | Not affected | Fixed | Fixed | Needs evaluation |
dnsmasq 2.9 is vulnerable to Integer Overflow via forward_query.
1 affected package
dnsmasq
| Package | 26.04 LTS | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|---|
| dnsmasq | — | Not affected | Fixed | Fixed | Fixed |
Some fixes available 29 of 40
The Closest Encloser Proof aspect of the DNS protocol (in RFC 5155 when RFC 9276 guidance is skipped) allows remote attackers to cause a denial of service (CPU consumption for SHA-1 computations) via DNSSEC responses in a random...
7 affected packages
bind9, isc-dhcp, pdns-recursor, dnsmasq, unbound...
| Package | 26.04 LTS | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|---|
| bind9 | Fixed | Fixed | Fixed | Fixed | Fixed |
| isc-dhcp | Needs evaluation | Needs evaluation | Not affected | Not affected | Not affected |
| pdns-recursor | Not affected | Not affected | Needs evaluation | Ignored | Ignored |
| dnsmasq | Fixed | Fixed | Fixed | Fixed | Fixed |
| unbound | Fixed | Fixed | Fixed | Fixed | Ignored |
| knot-resolver | Not affected | Not affected | Needs evaluation | Ignored | Ignored |
| bind9-libs | Not in release | Not in release | Needs evaluation | Ignored | Not in release |
Some fixes available 29 of 40
Certain DNSSEC aspects of the DNS protocol (in RFC 4033, 4034, 4035, 6840, and related RFCs) allow remote attackers to cause a denial of service (CPU consumption) via one or more DNSSEC responses, aka the "KeyTrap" issue. One of...
7 affected packages
bind9, isc-dhcp, pdns-recursor, dnsmasq, unbound...
| Package | 26.04 LTS | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|---|
| bind9 | Fixed | Fixed | Fixed | Fixed | Fixed |
| isc-dhcp | Needs evaluation | Needs evaluation | Not affected | Not affected | Not affected |
| pdns-recursor | Not affected | Not affected | Needs evaluation | Ignored | Ignored |
| dnsmasq | Fixed | Fixed | Fixed | Fixed | Fixed |
| unbound | Fixed | Fixed | Fixed | Fixed | Ignored |
| knot-resolver | Not affected | Not affected | Needs evaluation | Ignored | Ignored |
| bind9-libs | Not in release | Not in release | Needs evaluation | Ignored | Not in release |
Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2019-14834. Reason: This candidate is a reservation duplicate of CVE-2019-14834. Notes: All CVE users should reference CVE-2019-14834 instead of this candidate....
1 affected package
dnsmasq
| Package | 26.04 LTS | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|---|
| dnsmasq | — | — | Not affected | Not affected | Not affected |