CVE-2015-3294
Publication date 27 April 2015
Last updated 24 July 2024
Ubuntu priority
The tcp_request function in Dnsmasq before 2.73rc4 does not properly handle the return value of the setup_reply function, which allows remote attackers to read process memory and cause a denial of service (out-of-bounds read and crash) via a malformed DNS request.
Status
Package | Ubuntu Release | Status |
---|---|---|
dnsmasq | ||
14.04 LTS trusty |
Fixed 2.68-1ubuntu0.1
|
|
Patch details
Package | Patch details |
---|---|
dnsmasq |
References
Related Ubuntu Security Notices (USN)
- USN-2593-1
- Dnsmasq vulnerability
- 4 May 2015