The Dnsmasq project has issued patches to fix seven vulnerabilities that were identified by Google's security staff.
The Google team found three holes that could be used for remote code execution, one that could be used to leak information, and three others that could be used to stage denial-of-service attacks.
Dnsmasq is open source software that serves as a domain name system forwarder and dynamic host configuration protocol server for small computer networks.
It is used by GNU/Linux distributions, the BSDs and Android.
{loadposition sam08}The bugs have been fixed in the latest version, 2.78, which was issued by maintainer Simon Kelley recently.
The details of the bugs and their CVE numbers are given in the chart below:
Graphic: courtesy Google