The tcprequest function in Dnsmasq before 2.73rc4 does not properly handle the return value of the setupreply function, which allows remote attackers to read process memory and cause a denial of service (out-of-bounds read and crash) via a malformed DNS request.
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "2.68-1ubuntu0.1", "binary_name": "dnsmasq" }, { "binary_version": "2.68-1ubuntu0.1", "binary_name": "dnsmasq-base" }, { "binary_version": "2.68-1ubuntu0.1", "binary_name": "dnsmasq-utils" } ] }