
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2022-0934 is a heap use-after-free vulnerability discovered in dnsmasq, a lightweight DNS forwarder and DHCP server. The vulnerability was independently discovered by Petr Menšík through the Google OSS-Fuzz project and Richard Johnson of Trellix Threat Labs. The flaw affects dnsmasq versions including 2.85, 2.79, and 2.76, allowing an attacker to send crafted DHCPv6 packets that could modify already freed memory (Dnsmasq Discuss).
The vulnerability is specifically located in the dhcp6norelay function of dnsmasq's DHCPv6 server component. It involves a single-byte, non-arbitrary write/use-after-free flaw that can be triggered by processing specially crafted DHCPv6 packets (NVD, Red Hat).
The primary impact of this vulnerability is the potential for denial of service attacks against affected systems running dnsmasq. While the flaw could be triggered remotely, security researchers have indicated that it is unlikely to lead to remote code execution (Dnsmasq Discuss).
A fix for this vulnerability was released in the dnsmasq git repository through commit 03345ecefeb0d82e3c3a4c28f27c3554f0611b39. Various Linux distributions have also released security updates to address this issue, including Red Hat Enterprise Linux 8 (RHSA-2022:7633) and Red Hat Enterprise Linux 9 (RHSA-2022:8070) (Red Hat).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."