Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <aP_GUo51BVldIFVQ@inutil.org>
Date: Mon, 27 Oct 2025 19:21:54 +0000
From: Moritz Mühlenhoff <jmm@...til.org>
To: oss-security@...ts.openwall.com
Subject: Re: Questionable CVE's reported against dnsmasq

On Mon, Oct 27, 2025 at 09:34:03AM -0700, Alan Coopersmith wrote:
> Among the new CVE's published this weekend were these from the VulDB CNA:
> 
> For all three bugs, the documented "exploit" requires "Replace the default
> configuration file (/etc/dnsmasq.conf) with the provided malicious file."
> and if you can replace the server's configuration file you don't need to
> play games with putting invalid contents in to break the parser, but can
> simply change the configuration directly.

The same nonsense also happened for the Kamailio SIP server (CVE-2025-12204,
CVE-2025-12205, CVE-2025-12206 and CVE-2025-12207).

Cheers,
        Moritz

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.