Bugzilla – Bug 1226091
VUL-0: CVE-2023-49441: dnsmasq: integer overflow via forward_query
Last modified: 2024-07-02 13:44:51 UTC
dnsmasq 2.9 is vulnerable to Integer Overflow via forward_query. References: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-49441 https://www.cve.org/CVERecord?id=CVE-2023-49441 https://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2023q4/017332.html https://thekelleys.org.uk/gitweb/?p=dnsmasq.git%3Ba=commit%3Bh=65c2d6afd67a032f45f40d7e4d620f5d73e5f07d https://bugzilla.redhat.com/show_bug.cgi?id=2290849
Version 2.9 got released in 2004 and is NOT the one affected by this bug. The CVE description and the RH bug also got this wrong. I found the affected line of code in Versions 2.83 (where the respective source file got introduced) through 2.89, but in the current version 2.90 it is already fixed. We already have 2.90 in Factory, SLE-15-SP2 and SLE-15-SP4. Version 2.78 on SLE-12-SP1 does not yet contain the affected piece of code. Only ALP and SLFO contain the affected version 2.89. I just submitted 2.90 to SUSE:SLFO:Main. Please let me know if I shall also submit it to ALP. BTW, in the mail thread linked above upstream did not consider this to be a security issue.
This is an autogenerated message for OBS integration: This bug (1226091) was mentioned in https://build.opensuse.org/request/show/1179330 Factory / dnsmasq