osv-2022-312
Vulnerability from osv_ossfuzz
Published
2022-04-07 00:00
Modified
2026-02-07 14:07
Summary
Heap-buffer-overflow in dhcp_reply
Details

OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=46416

Crash type: Heap-buffer-overflow READ 1 Crash state: dhcp_reply dhcp_packet FuzzDhcp


{
  "affected": [
    {
      "ecosystem_specific": {
        "severity": "MEDIUM"
      },
      "package": {
        "ecosystem": "OSS-Fuzz",
        "name": "dnsmasq",
        "purl": "pkg:generic/dnsmasq"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "03345ecefeb0d82e3c3a4c28f27c3554f0611b39"
            }
          ],
          "repo": "git://thekelleys.org.uk/dnsmasq.git",
          "type": "GIT"
        }
      ],
      "versions": [
        "v2.87test9",
        "v2.87rc1",
        "v2.87",
        "v2.88test1",
        "v2.88test2",
        "v2.88test3",
        "v2.88rc1",
        "v2.88rc2",
        "v2.88rc3",
        "v2.88rc4",
        "v2.88rc5",
        "v2.88",
        "v2.89test1",
        "v2.89",
        "v2.90test1",
        "v2.90test2",
        "v2.90test3",
        "v2.90test4",
        "v2.90",
        "v2.90deb2",
        "v2.91test1",
        "v2.91test2",
        "v2.91test4",
        "v2.91test5",
        "v2.91test6",
        "v2.91test7",
        "v2.91test8",
        "v2.91test9",
        "v2.91test10",
        "v2.91rc1",
        "v2.91rc2",
        "v2.91rc3",
        "v2.91rc4",
        "v2.91rc5",
        "v2.91rc6",
        "v2.91",
        "v2.92test1",
        "v2.92test2",
        "v2.92test3",
        "v2.92test4",
        "v2.92test5",
        "v2.92test6",
        "v2.92test7",
        "v2.92test8",
        "v2.92test9",
        "v2.92test10",
        "v2.92test11",
        "v2.92test12",
        "v2.92test13",
        "v2.92test14",
        "v2.92test15",
        "v2.92test16",
        "v2.92test17",
        "v2.92test18",
        "v2.92test19",
        "v2.92test20",
        "v2.92test21",
        "v2.92test22",
        "v2.92rc1",
        "v2.92rc2",
        "v2.92rc3",
        "v2.92",
        "v2.93test1",
        "v2.93test2",
        "v2.93test3",
        "v2.93test4"
      ]
    }
  ],
  "details": "OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=46416\n\nCrash type: Heap-buffer-overflow READ 1\nCrash state:\ndhcp_reply\ndhcp_packet\nFuzzDhcp\n",
  "id": "OSV-2022-312",
  "modified": "2026-02-07T14:07:28.215175Z",
  "published": "2022-04-07T00:00:40.457052Z",
  "references": [
    {
      "type": "REPORT",
      "url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=46416"
    }
  ],
  "schema_version": "1.2.0",
  "summary": "Heap-buffer-overflow in dhcp_reply"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…