A heap-based buffer overflow in dhcp_reply (called from dhcp_packet and FuzzDhcp). Reference: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=35870 https://github.com/google/oss-fuzz-vulns/blob/main/vulns/dnsmasq/OSV-2021-927.yaml
Created dnsmasq tracking bugs for this issue: Affects: fedora-all [bug 2048935]
It seems this is again bogus report. void dhcp_common_init(void) always initializes daemon->dhcp_packet to sizeof(struct dhcp_packet) size. But fuzzers allocates only fixed 300 bytes, which is not enough. clear_packet() clears whole buffer regardless how large incoming packet was. It requires full buffer therefore.