2022-03-11 19:01:10 +00:00
{
"data_type" : "CVE" ,
"data_format" : "MITRE" ,
"data_version" : "4.0" ,
"CVE_data_meta" : {
"ID" : "CVE-2022-0934" ,
2022-08-29 15:00:39 +00:00
"ASSIGNER" : "secalert@redhat.com" ,
"STATE" : "PUBLIC"
} ,
"affects" : {
"vendor" : {
"vendor_data" : [
{
"vendor_name" : "n/a" ,
"product" : {
"product_data" : [
{
"product_name" : "dnsmasq" ,
"version" : {
"version_data" : [
{
"version_value" : "Not-Known"
}
]
}
}
]
}
}
]
}
} ,
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng" ,
"value" : "CWE-416 - Use After Free"
}
]
}
]
} ,
"references" : {
"reference_data" : [
{
"refsource" : "MISC" ,
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=2057075" ,
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2057075"
} ,
{
"refsource" : "MISC" ,
"name" : "https://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2022q1/016272.html" ,
"url" : "https://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2022q1/016272.html"
} ,
{
"refsource" : "MISC" ,
"name" : "https://thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=commit;h=03345ecefeb0d82e3c3a4c28f27c3554f0611b39" ,
"url" : "https://thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=commit;h=03345ecefeb0d82e3c3a4c28f27c3554f0611b39"
} ,
{
"refsource" : "MISC" ,
"name" : "https://access.redhat.com/security/cve/CVE-2022-0934" ,
"url" : "https://access.redhat.com/security/cve/CVE-2022-0934"
}
]
2022-03-11 19:01:10 +00:00
} ,
"description" : {
"description_data" : [
{
"lang" : "eng" ,
2022-08-29 15:00:39 +00:00
"value" : "A single-byte, non-arbitrary write/use-after-free flaw was found in dnsmasq. This flaw allows an attacker who sends a crafted packet processed by dnsmasq, potentially causing a denial of service."
2022-03-11 19:01:10 +00:00
}
]
}
}