Dnsmasq 2.86 has a heap-based buffer overflow in resize_packet (called from FuzzResizePacket and fuzz_rfc1035.c) because of the lack of a proper bounds check upon pseudo header re-insertion. NOTE: the vendor's position is that CVE-2021-45951 through CVE-2021-45957 "do not represent real vulnerabilities, to the best of our knowledge." However, a contributor states that a security patch (mentioned in 016162.html) is needed
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: mitre
Published: 2021-12-31T23:53:42
Updated: 2024-08-04T04:54:31.055Z
Reserved: 2021-12-31T00:00:00
Link: CVE-2021-45955
Vulnrichment
Updated: 2024-08-04T04:54:31.055Z
NVD
Status : Modified
Published: 2022-01-01T00:15:08.677
Modified: 2024-11-21T06:33:21.440
Link: CVE-2021-45955
Redhat