Bug 2048928 (CVE-2021-45955)
Summary: | CVE-2021-45955 dnsmasq: heap-based buffer overflow in resize_packet | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Marian Rehak <mrehak> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED NOTABUG | QA Contact: | |
Severity: | high | Docs Contact: | |
Priority: | high | ||
Version: | unspecified | CC: | bdettelb, code, dbecker, dns-sig, dougsland, jburrell, jjoyce, jschluet, lhh, lpeer, mburns, pemensik, rschiron, sclewis, slinaber, tcullum, thoger, veillard, vkumar |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | If docs needed, set a value | |
Doc Text: |
A heap-based out-of-bounds WRITE flaw was found in dnsmasq. A remote attacker who can trigger a packet resize can use this flaw to write up to 50 bytes to the heap via a memmove call.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2022-06-23 18:44:18 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 2048929, 2090008, 2090009, 2090010, 2090011, 2090012, 2090013, 2090014, 2090015 | ||
Bug Blocks: | 2048923 |
Description
Marian Rehak
2022-02-01 08:23:33 UTC
Created dnsmasq tracking bugs for this issue: Affects: fedora-all [bug 2048929] |