Red Hat Bugzilla – Bug 1495510
CVE-2017-13704 dnsmasq: Size parameter overflow via large DNS query
Last modified: 2017-10-02 10:23:27 EDT
It was found that if a DNS query request (qlen) is either larger than 512, or includes an EDNS0 packet size field, and the request is larger than what it specifies, then the size parameter to memset will overflow and become negative. An attacker could use this for a remote denial of service attack. References: http://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2017q3/011729.html Upstream patch: http://thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=commit;h=63437ffbb58837b214b4b92cb1c54bc5f3279928
Upstream CHANGELOG notes this issue is a regression introduced in dnsmasq version 2.77 and is getting fixed in version 2.78.