Hide Forgot
It was found that if a DNS query request (qlen) is either larger than 512, or includes an EDNS0 packet size field, and the request is larger than what it specifies, then the size parameter to memset will overflow and become negative. An attacker could use this for a remote denial of service attack. References: http://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2017q3/011729.html Upstream patch: http://thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=commit;h=63437ffbb58837b214b4b92cb1c54bc5f3279928
Upstream CHANGELOG notes this issue is a regression introduced in dnsmasq version 2.77 and is getting fixed in version 2.78.