dnsmasq 2.9 is vulnerable to Integer Overflow via forward_query. https://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2023q4/017332.html https://thekelleys.org.uk/gitweb/?p=dnsmasq.git%3Ba=commit%3Bh=65c2d6afd67a032f45f40d7e4d620f5d73e5f07d
Created dnsmasq tracking bugs for this issue: Affects: fedora-all [bug 2290850]
This issue should be fixed by upstream commit: https://thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=commit;h=65c2d6afd67a032f45f40d7e4d620f5d73e5f07d Which is not used by our code, because we use HAVE_DNSSEC usually and HAVE_CRYPTOHASH in rhel7. Therefore we do not use built-in sha256 implementation, which needed the fix.