Описание
Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: Based on the analysis by MITRE and review of community feedback, the reported conditions represent expected and intentional behavior within dnsmasq's documented design, rather than security vulnerabilities.
| Релиз | Статус | Примечание |
|---|---|---|
| devel | deferred | 2025-10-29 |
| esm-infra-legacy/trusty | deferred | 2025-10-29 |
| esm-infra/bionic | deferred | 2025-10-29 |
| esm-infra/focal | deferred | 2025-10-29 |
| esm-infra/xenial | deferred | 2025-10-29 |
| jammy | deferred | 2025-10-29 |
| noble | deferred | 2025-10-29 |
| plucky | ignored | end of life, was deferred [2025-10-29] |
| questing | deferred | 2025-10-29 |
| upstream | needs-triage |
Показывать по
Связанные уязвимости
Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: Based on the analysis by MITRE and review of community feedback, the reported conditions represent expected and intentional behavior within dnsmasq's documented design, rather than security vulnerabilities.
A vulnerability was found in dnsmasq up to 2.73rc6. Affected by this vulnerability is the function check_servers of the file src/network.c of the component Config File Handler. The manipulation results in null pointer dereference. The attack needs to be approached locally. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.