[Git][security-tracker-team/security-tracker][master] disassociate various old bogus dnsmasq issues from src:dnsmasq

Moritz Muehlenhoff (@jmm) jmm at debian.org
Fri Aug 22 14:10:07 BST 2025



Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker


Commits:
b49da9e6 by Moritz Muehlenhoff at 2025-08-22T15:09:31+02:00
disassociate various old bogus dnsmasq issues from src:dnsmasq

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -321005,40 +321005,33 @@ CVE-2021-45958 (UltraJSON (aka ujson) through 5.1.0 has a stack-based buffer ove
 	NOTE: https://github.com/ultrajson/ultrajson/pull/504
 	NOTE: Fixed by: https://github.com/ultrajson/ultrajson/pull/519
 CVE-2021-45957 (Dnsmasq 2.86 has a heap-based buffer overflow in answer_request (calle ...)
-	- dnsmasq <unfixed> (unimportant)
+	NOTE: Non issue, result of poorly automated fuzzing effort
 	NOTE: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=35920
 	NOTE: https://github.com/google/oss-fuzz-vulns/blob/main/vulns/dnsmasq/OSV-2021-935.yaml
-	NOTE: Non issue, result of poorly automated fuzzing effort
 CVE-2021-45956 (Dnsmasq 2.86 has a heap-based buffer overflow in print_mac (called fro ...)
-	- dnsmasq <unfixed> (unimportant)
+	NOTE: Non issue, result of poorly automated fuzzing effort
 	NOTE: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=35887
 	NOTE: https://github.com/google/oss-fuzz-vulns/blob/main/vulns/dnsmasq/OSV-2021-933.yaml
-	NOTE: Non issue, result of poorly automated fuzzing effort
 CVE-2021-45955 (Dnsmasq 2.86 has a heap-based buffer overflow in resize_packet (called ...)
-	- dnsmasq <unfixed> (unimportant)
+	NOTE: Non issue, result of poorly automated fuzzing effort
 	NOTE: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=35898
 	NOTE: https://github.com/google/oss-fuzz-vulns/blob/main/vulns/dnsmasq/OSV-2021-932.yaml
-	NOTE: Non issue, result of poorly automated fuzzing effort
 CVE-2021-45954 (Dnsmasq 2.86 has a heap-based buffer overflow in extract_name (called  ...)
-	- dnsmasq <unfixed> (unimportant)
+	NOTE: Non issue, result of poorly automated fuzzing effort
 	NOTE: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=35861
 	NOTE: https://github.com/google/oss-fuzz-vulns/blob/main/vulns/dnsmasq/OSV-2021-931.yaml
-	NOTE: Non issue, result of poorly automated fuzzing effort
 CVE-2021-45953 (Dnsmasq 2.86 has a heap-based buffer overflow in extract_name (called  ...)
-	- dnsmasq <unfixed> (unimportant)
+	NOTE: Non issue, result of poorly automated fuzzing effort
 	NOTE: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=35858
 	NOTE: https://github.com/google/oss-fuzz-vulns/blob/main/vulns/dnsmasq/OSV-2021-929.yaml
-	NOTE: Non issue, result of poorly automated fuzzing effort
 CVE-2021-45952 (Dnsmasq 2.86 has a heap-based buffer overflow in dhcp_reply (called fr ...)
-	- dnsmasq <unfixed> (unimportant)
+	NOTE: Non issue, result of poorly automated fuzzing effort
 	NOTE: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=35870
 	NOTE: https://github.com/google/oss-fuzz-vulns/blob/main/vulns/dnsmasq/OSV-2021-927.yaml
-	NOTE: Non issue, result of poorly automated fuzzing effort
 CVE-2021-45951 (Dnsmasq 2.86 has a heap-based buffer overflow in check_bad_address (ca ...)
-	- dnsmasq <unfixed> (unimportant)
+	NOTE: Non issue, result of poorly automated fuzzing effort
 	NOTE: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=35868
 	NOTE: https://github.com/google/oss-fuzz-vulns/blob/main/vulns/dnsmasq/OSV-2021-924.yaml
-	NOTE: Non issue, result of poorly automated fuzzing effort
 CVE-2021-45950 (LibreDWG 0.12.4.4313 through 0.12.4.4367 has an out-of-bounds write in ...)
 	- libredwg <itp> (bug #595191)
 CVE-2021-45949 (Ghostscript GhostPDL 9.50 through 9.54.0 has a heap-based buffer overf ...)



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/b49da9e6745f7b9761c72b9591def712c8872bd1

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/b49da9e6745f7b9761c72b9591def712c8872bd1
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20250822/6429a447/attachment-0001.htm>


More information about the debian-security-tracker-commits mailing list