CVE-2022-0934
NixOS vulnerability analysis and mitigation

Overview

CVE-2022-0934 is a heap use-after-free vulnerability discovered in dnsmasq, a lightweight DNS forwarder and DHCP server. The vulnerability was independently discovered by Petr Menšík through the Google OSS-Fuzz project and Richard Johnson of Trellix Threat Labs. The flaw affects dnsmasq versions including 2.85, 2.79, and 2.76, allowing an attacker to send crafted DHCPv6 packets that could modify already freed memory (Dnsmasq Discuss).

Technical details

The vulnerability is specifically located in the dhcp6norelay function of dnsmasq's DHCPv6 server component. It involves a single-byte, non-arbitrary write/use-after-free flaw that can be triggered by processing specially crafted DHCPv6 packets (NVD, Red Hat).

Impact

The primary impact of this vulnerability is the potential for denial of service attacks against affected systems running dnsmasq. While the flaw could be triggered remotely, security researchers have indicated that it is unlikely to lead to remote code execution (Dnsmasq Discuss).

Mitigation and workarounds

A fix for this vulnerability was released in the dnsmasq git repository through commit 03345ecefeb0d82e3c3a4c28f27c3554f0611b39. Various Linux distributions have also released security updates to address this issue, including Red Hat Enterprise Linux 8 (RHSA-2022:7633) and Red Hat Enterprise Linux 9 (RHSA-2022:8070) (Red Hat).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management