Improper bounds checking in Dnsmasq before 2.76 allows an attacker
controlled DNS server to send large DNS packets that result in a read
operation beyond the buffer allocated for the packet, a different
vulnerability than CVE-2017-14491.
msalvatoreThe vulnerability writeup states, "The git commit affected is this
one and before: 15379ea1f252d1f53c5d93ae970b22dedb233642". This
commit, therefore, may resolve the issue:;a=patch;h=d3a8b39c7df2f0debf3b5f274a1c37a9e261f94e
mdeslaurcan't reproduce on xenial, probably not a DoS issue
Upstream:released (2.76-1)
Ubuntu 12.04 ESM (Precise Pangolin):needs-triage
Ubuntu 14.04 ESM (Trusty Tahr):needed
Ubuntu 16.04 LTS (Xenial Xerus):needed
Ubuntu 18.04 LTS (Bionic Beaver):not-affected (2.79-1)
Ubuntu 20.04 LTS (Focal Fossa):not-affected
Ubuntu 20.10 (Groovy Gorilla):not-affected
More Information

Updated: 2020-07-28 18:54:57 UTC (commit 7b6828437fde0509248708fcdb5b0f7587b85bd1)