Bug 2406466 (CVE-2025-12198) - CVE-2025-12198 dnsmasq: dnsmasq Config File util.c parse_hex heap-based overflow [NEEDINFO]
Summary: CVE-2025-12198 dnsmasq: dnsmasq Config File util.c parse_hex heap-based overflow
Keywords:
Status: CLOSED NOTABUG
Alias: CVE-2025-12198
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On: 2406485 2406486
Blocks:
TreeView+ depends on / blocked
 
Reported: 2025-10-27 02:01 UTC by OSIDB Bzimport
Modified: 2025-11-09 11:12 UTC (History)
1 user (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed: 2025-11-09 11:12:23 UTC
Embargoed:
pemensik: needinfo? (bzimport)


Attachments (Terms of Use)

Description OSIDB Bzimport 2025-10-27 02:01:46 UTC
A vulnerability has been found in dnsmasq up to 2.73rc6. Affected is the function parse_hex of the file src/util.c of the component Config File Handler. The manipulation of the argument i leads to heap-based buffer overflow. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Comment 2 Petr Menšík 2025-11-09 11:10:15 UTC
This was marked as rejected: https://www.cve.org/CVERecord?id=CVE-2025-12198

Please mark it so in all remaining products. There is nothing to fix in dnsmasq.


Note You need to log in before you can comment on or make changes to this bug.