'Stack-based buffer overflow in dnsmasq before 2.78 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted DHCPv6 request.'
This issue was resolved in a backported fix. Current up to date versions not affected.
This issue was resolved in ddnsmasq-2.76-2 for ClearOS 7.x. Systems with this version of dnsmasq or higher are not affected by this issue. ClearOS 6 systems are not affected by this vulnerability.
To validate that you are running dnsmasq-2.76-2 or higher by issuing the following command:
rpm -qi dnsmasq
If you are running a lesser version than dnsmasq-2.76-2 on ClearOS 7, please update your system by running: