Your submission was sent successfully! Close

CVE-2019-14834

Published: 7 January 2020

A vulnerability was found in dnsmasq before version 2.81, where the memory leak allows remote attackers to cause a denial of service (memory consumption) via vectors involving DHCP response creation.

Priority

Low

CVSS 3 base score: 3.7

Status

Package Release Status
dnsmasq
Launchpad, Ubuntu, Debian
bionic
Released (2.79-1ubuntu0.2)
disco Ignored
(reached end-of-life)
eoan Ignored
(reached end-of-life)
focal
Released (2.80-1.1ubuntu1.2)
groovy Not vulnerable
(2.81-4)
hirsute Not vulnerable
(2.81-4)
impish Not vulnerable
(2.81-4)
jammy Not vulnerable
(2.81-4)
precise Ignored
(end of ESM support, was needs-triage)
trusty Needs triage

upstream
Released (2.81)
xenial
Released (2.75-1ubuntu0.16.04.7)
Patches:
upstream: http://thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=commit;h=69bc94779c2f035a9fffdb5327a54c3aeca73ed5