"-Synchronized-Data."

This commit is contained in:
CVE Team 2022-02-19 22:01:07 +00:00
parent 0252dfa691
commit cdd695ffab
No known key found for this signature in database
GPG Key ID: 5708902F06FEF743
12 changed files with 102 additions and 7 deletions

View File

@ -34,7 +34,7 @@
"description_data": [
{
"lang": "eng",
"value": "Dnsmasq 2.86 has a heap-based buffer overflow in check_bad_address (called from check_for_bogus_wildcard and FuzzCheckForBogusWildcard)."
"value": "** DISPUTED ** Dnsmasq 2.86 has a heap-based buffer overflow in check_bad_address (called from check_for_bogus_wildcard and FuzzCheckForBogusWildcard). NOTE: the vendor's position is that CVE-2021-45951 through CVE-2021-45957 \"do not represent real vulnerabilities, to the best of our knowledge.\""
}
]
},
@ -61,6 +61,16 @@
"url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=35868",
"refsource": "MISC",
"name": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=35868"
},
{
"refsource": "MISC",
"name": "https://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2022q1/016162.html",
"url": "https://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2022q1/016162.html"
},
{
"refsource": "MISC",
"name": "https://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2022q1/016164.html",
"url": "https://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2022q1/016164.html"
}
]
}

View File

@ -34,7 +34,7 @@
"description_data": [
{
"lang": "eng",
"value": "Dnsmasq 2.86 has a heap-based buffer overflow in dhcp_reply (called from dhcp_packet and FuzzDhcp)."
"value": "** DISPUTED ** Dnsmasq 2.86 has a heap-based buffer overflow in dhcp_reply (called from dhcp_packet and FuzzDhcp). NOTE: the vendor's position is that CVE-2021-45951 through CVE-2021-45957 \"do not represent real vulnerabilities, to the best of our knowledge.\""
}
]
},
@ -61,6 +61,16 @@
"url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=35870",
"refsource": "MISC",
"name": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=35870"
},
{
"refsource": "MISC",
"name": "https://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2022q1/016162.html",
"url": "https://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2022q1/016162.html"
},
{
"refsource": "MISC",
"name": "https://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2022q1/016164.html",
"url": "https://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2022q1/016164.html"
}
]
}

View File

@ -34,7 +34,7 @@
"description_data": [
{
"lang": "eng",
"value": "Dnsmasq 2.86 has a heap-based buffer overflow in extract_name (called from hash_questions and fuzz_util.c)."
"value": "** DISPUTED ** Dnsmasq 2.86 has a heap-based buffer overflow in extract_name (called from hash_questions and fuzz_util.c). NOTE: the vendor's position is that CVE-2021-45951 through CVE-2021-45957 \"do not represent real vulnerabilities, to the best of our knowledge.\""
}
]
},
@ -61,6 +61,16 @@
"url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=35858",
"refsource": "MISC",
"name": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=35858"
},
{
"refsource": "MISC",
"name": "https://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2022q1/016162.html",
"url": "https://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2022q1/016162.html"
},
{
"refsource": "MISC",
"name": "https://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2022q1/016164.html",
"url": "https://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2022q1/016164.html"
}
]
}

View File

@ -34,7 +34,7 @@
"description_data": [
{
"lang": "eng",
"value": "Dnsmasq 2.86 has a heap-based buffer overflow in extract_name (called from answer_auth and FuzzAuth)."
"value": "** DISPUTED ** Dnsmasq 2.86 has a heap-based buffer overflow in extract_name (called from answer_auth and FuzzAuth). NOTE: the vendor's position is that CVE-2021-45951 through CVE-2021-45957 \"do not represent real vulnerabilities, to the best of our knowledge.\""
}
]
},
@ -61,6 +61,16 @@
"url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=35861",
"refsource": "MISC",
"name": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=35861"
},
{
"refsource": "MISC",
"name": "https://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2022q1/016162.html",
"url": "https://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2022q1/016162.html"
},
{
"refsource": "MISC",
"name": "https://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2022q1/016164.html",
"url": "https://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2022q1/016164.html"
}
]
}

View File

@ -34,7 +34,7 @@
"description_data": [
{
"lang": "eng",
"value": "Dnsmasq 2.86 has a heap-based buffer overflow in resize_packet (called from FuzzResizePacket and fuzz_rfc1035.c)."
"value": "** DISPUTED ** Dnsmasq 2.86 has a heap-based buffer overflow in resize_packet (called from FuzzResizePacket and fuzz_rfc1035.c) because of the lack of a proper bounds check upon pseudo header re-insertion. NOTE: the vendor's position is that CVE-2021-45951 through CVE-2021-45957 \"do not represent real vulnerabilities, to the best of our knowledge.\" However, a contributor states that a security patch (mentioned in 016162.html) is needed."
}
]
},
@ -61,6 +61,16 @@
"url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=35898",
"refsource": "MISC",
"name": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=35898"
},
{
"refsource": "MISC",
"name": "https://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2022q1/016162.html",
"url": "https://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2022q1/016162.html"
},
{
"refsource": "MISC",
"name": "https://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2022q1/016164.html",
"url": "https://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2022q1/016164.html"
}
]
}

View File

@ -34,7 +34,7 @@
"description_data": [
{
"lang": "eng",
"value": "Dnsmasq 2.86 has a heap-based buffer overflow in print_mac (called from log_packet and dhcp_reply)."
"value": "** DISPUTED ** Dnsmasq 2.86 has a heap-based buffer overflow in print_mac (called from log_packet and dhcp_reply). NOTE: the vendor's position is that CVE-2021-45951 through CVE-2021-45957 \"do not represent real vulnerabilities, to the best of our knowledge.\""
}
]
},
@ -61,6 +61,16 @@
"url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=35887",
"refsource": "MISC",
"name": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=35887"
},
{
"refsource": "MISC",
"name": "https://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2022q1/016162.html",
"url": "https://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2022q1/016162.html"
},
{
"refsource": "MISC",
"name": "https://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2022q1/016164.html",
"url": "https://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2022q1/016164.html"
}
]
}

View File

@ -34,7 +34,7 @@
"description_data": [
{
"lang": "eng",
"value": "Dnsmasq 2.86 has a heap-based buffer overflow in answer_request (called from FuzzAnswerTheRequest and fuzz_rfc1035.c)."
"value": "** DISPUTED ** Dnsmasq 2.86 has a heap-based buffer overflow in answer_request (called from FuzzAnswerTheRequest and fuzz_rfc1035.c). NOTE: the vendor's position is that CVE-2021-45951 through CVE-2021-45957 \"do not represent real vulnerabilities, to the best of our knowledge.\""
}
]
},
@ -61,6 +61,16 @@
"url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=35920",
"refsource": "MISC",
"name": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=35920"
},
{
"refsource": "MISC",
"name": "https://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2022q1/016162.html",
"url": "https://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2022q1/016162.html"
},
{
"refsource": "MISC",
"name": "https://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2022q1/016164.html",
"url": "https://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2022q1/016164.html"
}
]
}

View File

@ -56,6 +56,11 @@
"url": "https://github.com/libexpat/libexpat/pull/562",
"refsource": "MISC",
"name": "https://github.com/libexpat/libexpat/pull/562"
},
{
"refsource": "MLIST",
"name": "[oss-security] 20220219 Expat 2.4.5 released, includes 5 security fixes",
"url": "http://www.openwall.com/lists/oss-security/2022/02/19/1"
}
]
}

View File

@ -56,6 +56,11 @@
"url": "https://github.com/libexpat/libexpat/pull/561",
"refsource": "MISC",
"name": "https://github.com/libexpat/libexpat/pull/561"
},
{
"refsource": "MLIST",
"name": "[oss-security] 20220219 Expat 2.4.5 released, includes 5 security fixes",
"url": "http://www.openwall.com/lists/oss-security/2022/02/19/1"
}
]
}

View File

@ -56,6 +56,11 @@
"url": "https://github.com/libexpat/libexpat/pull/558",
"refsource": "MISC",
"name": "https://github.com/libexpat/libexpat/pull/558"
},
{
"refsource": "MLIST",
"name": "[oss-security] 20220219 Expat 2.4.5 released, includes 5 security fixes",
"url": "http://www.openwall.com/lists/oss-security/2022/02/19/1"
}
]
}

View File

@ -56,6 +56,11 @@
"url": "https://github.com/libexpat/libexpat/pull/560",
"refsource": "MISC",
"name": "https://github.com/libexpat/libexpat/pull/560"
},
{
"refsource": "MLIST",
"name": "[oss-security] 20220219 Expat 2.4.5 released, includes 5 security fixes",
"url": "http://www.openwall.com/lists/oss-security/2022/02/19/1"
}
]
}

View File

@ -56,6 +56,11 @@
"url": "https://github.com/libexpat/libexpat/pull/559",
"refsource": "MISC",
"name": "https://github.com/libexpat/libexpat/pull/559"
},
{
"refsource": "MLIST",
"name": "[oss-security] 20220219 Expat 2.4.5 released, includes 5 security fixes",
"url": "http://www.openwall.com/lists/oss-security/2022/02/19/1"
}
]
}