Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2025-12199

Опубликовано: 27 окт. 2025
Источник: redhat

Описание

No description is available for this CVE.

Отчет

This CVE has been marked as Rejected by the assigning CNA.

Меры по смягчению последствий

No mitigation is currently available that meets Red Hat Product Security’s standards for usability, deployment, applicability, or stability. To reduce the risk, ensure that only trusted and validated configuration files are used by dnsmasq, and restrict write or modification permissions on /etc/dnsmasq.conf and related directories to authorized users. Avoid loading dynamically generated or unverified configurations.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 10dnsmasqFix deferred
Red Hat Enterprise Linux 6dnsmasqFix deferred
Red Hat Enterprise Linux 7dnsmasqFix deferred
Red Hat Enterprise Linux 8dnsmasqFix deferred
Red Hat Enterprise Linux 9dnsmasqFix deferred
Red Hat OpenShift Container Platform 4rhcosFix deferred

Показывать по

Дополнительная информация

Дефект:
CWE-476
https://bugzilla.redhat.com/show_bug.cgi?id=2406461dnsmasq: dnsmasq Config File network.c check_servers null pointer dereference

Связанные уязвимости

ubuntu
5 месяцев назад

Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: Based on the analysis by MITRE and review of community feedback, the reported conditions represent expected and intentional behavior within dnsmasq's documented design, rather than security vulnerabilities.

nvd
5 месяцев назад

Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: Based on the analysis by MITRE and review of community feedback, the reported conditions represent expected and intentional behavior within dnsmasq's documented design, rather than security vulnerabilities.

CVSS3: 3.3
github
5 месяцев назад

A vulnerability was found in dnsmasq up to 2.73rc6. Affected by this vulnerability is the function check_servers of the file src/network.c of the component Config File Handler. The manipulation results in null pointer dereference. The attack needs to be approached locally. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.