{"id":"CVE-2022-0934","details":"A single-byte, non-arbitrary write/use-after-free flaw was found in dnsmasq. This flaw allows an attacker who sends a crafted packet processed by dnsmasq, potentially causing a denial of service.","modified":"2026-04-16T04:36:05.787148496Z","published":"2022-08-29T15:15:10.087Z","related":["ALSA-2022:7633","ALSA-2022:8070","SUSE-SU-2022:1288-1","SUSE-SU-2022:1289-1","SUSE-SU-2022:1307-1","SUSE-SU-2022:14940-1","SUSE-SU-2022:14941-1","openSUSE-SU-2024:11998-1"],"references":[{"type":"WEB","url":"https://thekelleys.org.uk/gitweb/?p=dnsmasq.git%3Ba=commit%3Bh=03345ecefeb0d82e3c3a4c28f27c3554f0611b39"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2024/11/msg00035.html"},{"type":"ADVISORY","url":"https://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2022q1/016272.html"},{"type":"ADVISORY","url":"https://access.redhat.com/security/cve/CVE-2022-0934"},{"type":"FIX","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2057075"}],"affected":[{"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"fixed":"2.87"}]},{"events":[{"introduced":"0"},{"last_affected":"8.0"}]},{"events":[{"introduced":"0"},{"last_affected":"9.0"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-0934.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}