发布时间: 2022年5月28日
修改时间: 2022年5月28日
** DISPUTED ** Dnsmasq 2.86 has a heap-based buffer overflow in extract_name (called from hash_questions and fuzz_util.c). NOTE: the vendor s position is that CVE-2021-45951 through CVE-2021-45957 do not represent real vulnerabilities, to the best of our knowledge.
NVD | openEuler | |
---|---|---|
CVSS评分 | 9.8 | 9.8 |
Attack Vector | Network | Network |
Attack Complexity | Low | Low |
Privileges Required | None | None |
User Interaction | None | None |
Scope | Unchanged | Unchanged |
Confidentiality | High | None |
Integrity | High | None |
Availability | High | None |
公告名 | 概要 | 发布时间 |
---|---|---|
KylinSec-SA-2022-1487 | ** DISPUTED ** Dnsmasq 2.86 has a heap-based buffer overflow in extract_name (called from hash_questions and fuzz_util.c). NOTE: the vendor s position is that CVE-2021-45951 through CVE-2021-45957 do not represent real vulnerabilities, to the best of our knowledge. | 2022年5月28日 |
产品 | 包 | 状态 |
---|---|---|
KY3.4-4A | dnsmasq | Unaffected |
KY3.4-5A | dnsmasq | Unaffected |
KY3.5.1 | dnsmasq | Unaffected |