FreshPorts - VuXML

This page displays vulnerability information about FreeBSD Ports.

The VUXML data was last processed by FreshPorts on 2024-03-28 15:43:32 UTC

List all Vulnerabilities, by package

List all Vulnerabilities, by date

k68

These are the vulnerabilities relating to the commit you have selected:

VuXML IDDescription
b77b5646-a778-11e7-ac58-b499baebfeafdnsmasq -- multiple vulnerabilities

Google Project Zero reports:

  • CVE-2017-14491: Heap based overflow (2 bytes). Before 2.76 and this commit overflow was unrestricted.
  • CVE-2017-14492: Heap based overflow.
  • CVE-2017-14493: Stack Based overflow.
  • CVE-2017-14494: Information Leak
  • CVE-2017-14495: Lack of free()
  • CVE-2017-14496: Invalid boundary checks. Integer underflow leading to a huge memcpy.
  • CVE-2017-13704: Crash on large DNS query

Discovery 2017-10-02
Entry 2017-10-02
dnsmasq
< 2.78,1

dnsmasq-devel
< 2.78

https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html
CVE-2017-14491
CVE-2017-14492
CVE-2017-14493
CVE-2017-14494
CVE-2017-14495
CVE-2017-14496
CVE-2017-13704
5b5cf6e5-5b51-11eb-95ac-7f9491278677dnsmasq -- DNS cache poisoning, and DNSSEC buffer overflow, vulnerabilities

Simon Kelley reports:

There are broadly two sets of problems. The first is subtle errors in dnsmasq's protections against the chronic weakness of the DNS protocol to cache-poisoning attacks; the Birthday attack, Kaminsky, etc.[...]

the second set of errors is a good old fashioned buffer overflow in dnsmasq's DNSSEC code. If DNSSEC validation is enabled, an installation is at risk.


Discovery 2020-09-16
Entry 2021-01-20
dnsmasq
< 2.83

dnsmasq-devel
< 2.83

https://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2021q1/014599.html
https://www.jsof-tech.com/disclosures/dnspooq/
CVE-2020-25684
CVE-2020-25685
CVE-2020-25686
CVE-2020-25681
CVE-2020-25682
CVE-2020-25683
CVE-2020-25687
875e4cf8-3f0e-11e6-b3c8-14dae9d210b8dnsmasq -- denial of service

reports:

Dnsmasq before 2.76 allows remote servers to cause a denial of service (crash) via a reply with an empty DNS address that has an (1) A or (2) AAAA record defined locally.


Discovery 2016-04-18
Entry 2016-06-30
Modified 2016-06-30
dnsmasq
< 2.76,1

dnsmasq-devel
< 2.76.0test1

http://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2016q2/010479.html
http://www.openwall.com/lists/oss-security/2016/06/03/7
CVE-2015-8899
3f321a5a-b33b-11ec-80c2-1bb2c6a00592dnsmasq -- heap use-after-free in dhcp6_no_relay

Petr Menšík reports:

Possible vulnerability [...] found in latest dnsmasq. It [was] found with help of oss-fuzz Google project by me and short after that independently also by Richard Johnson of Trellix Threat Labs.

It is affected only by DHCPv6 requests, which could be crafted to modify already freed memory. [...] We think it might be triggered remotely, but we do not think it could be used to execute remote code.


Discovery 2022-03-31
Entry 2022-04-03
dnsmasq
< 2.86_4,1

dnsmasq-devel
< 2.86_4,1

CVE-2022-0934
https://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2022q1/016272.html
7927165a-0126-11e5-9d98-080027ef73ecdnsmasq -- remotely exploitable buffer overflow in release candidate

Simon Kelley reports:

Anyone running 2.[73]rc6 or 2.[73]rc7 should be aware that there's a remotely exploitable buffer overflow in those trees. I just tagged 2.[73]rc8, which includes the fix.

(Corrections from second URL.)


Discovery 2015-05-15
Entry 2015-05-23
dnsmasq-devel
ge 2.73rc6 lt 2.73rc8

http://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2015q2/009529.html
http://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2015q2/009535.html
5b72b1ff-877c-11eb-bd4f-2f1d57dafe46dnsmasq -- cache poisoning vulnerability in certain configurations

Simon Kelley reports:

[In configurations where the forwarding server address contains an @ character for specifying a sending interface or source address, the] random source port behavior was disabled, making cache poisoning attacks possible.

This only affects configurations of the form server=1.1.1.1@em0 or server=1.1.1.1@192.0.2.1, i. e. those that specify an interface to send through, or an IP address to send from, or use together with NetworkManager.


Discovery 2021-03-17
Entry 2021-03-18
dnsmasq
< 2.85.r1,1

dnsmasq-devel
< 2.85.r1,3

https://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2021q1/014835.html
CVE-2021-3448