CVE-2020-37127

NameCVE-2020-37127
DescriptionDnsmasq-utils 2.79-1 contains a buffer overflow vulnerability in the dhcp_release utility that allows attackers to cause a denial of service by supplying excessive input. Attackers can trigger a core dump and terminate the dhcp_release process by sending a crafted input string longer than 16 characters.
SourceCVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
dnsmasq (PTS)bullseye2.85-1fixed
bullseye (security)2.85-1+deb11u1fixed
bookworm2.90-4~deb12u1fixed
trixie2.91-1fixed
forky, sid2.92-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
dnsmasqsource(unstable)2.80-1unimportant

Notes

https://www.exploit-db.com/exploits/48301
Fixed by: https://thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=commit;h=2b38e3823b12ab13f86c3a44648de436daadb1f6 (v2.80test6)
Negligible security impact

Search for package or bug name: Reporting problems