Am 29.10.25 um 15:25 schrieb Petr Menšík via Dnsmasq-discuss:
Unlike last time we received embargoed AI generated content, this time there is CVE assigned for dnsmasq. I have no time to solve how real they are, but I doubt it describes anything of severity Important.

Yes, there might be bugs in DHCP parsing code, but if they need root access, then they cannot be CVSS score 7.8. If you have not catched them yet, just posting here they did appear. I think they should be disputed or fixed CVSS score of them.

If any software passes unfiltered content from unprivileged users to dnsmasq, then that software should receive Important CVE.

https://www.openwall.com/lists/oss-security/2025/10/27/1

https://www.cve.org/CVERecord?id=CVE-2025-12198

Thanks Petr.

The claim on all three of them is "up to 2.73rc6", which was a release candidate more than 10.5 years ago [1], and there is a thread of critical voices on said mailing list about being AI nonsense, or questionable validation (before assignment) on VulDB's side, which is the CNA who assigned those CVEs including 2025-12198 -- one of the organizations that can assign CVE numbers.

They have been called out on the oss-security@ list by its moderator, Alexander aka Solar Designer, already.
See <https://www.openwall.com/lists/oss-security/2025/10/28/3>.


[1] The first candidate not encompassed by three CVEs would be this according to the public Git:

tag v2.73rc7
Tagger: Simon Kelley <[email protected]>
Date:   Tue Apr 28 20:46:54 2015 +0100

release tag


Regards,
Matthias
_______________________________________________
Dnsmasq-discuss mailing list
[email protected]
https://lists.thekelleys.org.uk/cgi-bin/mailman/listinfo/dnsmasq-discuss

Reply via email to