Source: dnsmasq
Version: 2.77-1
Severity: grave
Tags: upstream patch security fixed-upstream

Hi,

the following vulnerability was published for dnsmasq.

CVE-2017-13704[0]:
Size parameter overflow via large DNS query

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2017-13704
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13704
[1] https://bugzilla.redhat.com/show_bug.cgi?id=1495510
[2] http://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2017q3/011729.html
[3] 
http://thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=commit;h=63437ffbb58837b214b4b92cb1c54bc5f3279928

Regards,
Salvatore

Reply via email to