CVE-2021-45955
NixOS vulnerability analysis and mitigation

Overview

Dnsmasq version 2.86 contains a heap-based buffer overflow vulnerability in the resize_packet function (CVE-2021-45955). The vulnerability exists due to the lack of proper bounds checking when performing pseudo header re-insertion. This vulnerability is disputed by the vendor, who states that CVE-2021-45951 through CVE-2021-45957 'do not represent real vulnerabilities.' However, security researchers have indicated that a security patch is needed (NVD, Dnsmasq Discuss).

Technical details

The vulnerability is present in the resizepacket function, which is called from FuzzResizePacket and fuzzrfc1035.c. The issue stems from insufficient bounds checking during pseudo header re-insertion operations. The vulnerability has been assigned a CVSS v3.1 Base Score of 9.8 (CRITICAL) with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H. The weakness is classified as CWE-787 (Out-of-bounds Write) (NVD, OSS-Fuzz).

Impact

If successfully exploited, this heap-based buffer overflow vulnerability could potentially allow attackers to cause a denial of service condition or possibly execute arbitrary code on affected systems. The vulnerability is rated as HIGH severity in the context of ecosystem-specific impact (OSS-Fuzz).

Mitigation and workarounds

A security patch has been developed to prevent writing beyond packet size in resize_packet. The fix implements proper bounds checking for packet resizing operations. The patch was submitted by Red Hat engineer Petr Menšík, who confirmed that CVE-2021-45955 might be a valid vulnerability requiring remediation (Dnsmasq Discuss).

Community reactions

There has been some controversy regarding this vulnerability, with the vendor (Simon Kelley) submitting a request to MITRE to cancel the CVE, stating that it does not represent a real vulnerability. However, security researchers, particularly from Red Hat, have investigated the issue and determined that CVE-2021-45955 might be legitimate, unlike other related CVEs in the same batch (Dnsmasq Discuss).

Additional resources


SourceThis report was generated using AI

Related NixOS vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-59713HIGH8.1
  • PHPPHP
  • snipe/snipe-it
NoYesSep 19, 2025
CVE-2025-7993HIGH7.8
  • NixOSNixOS
  • cobalt
NoNoSep 17, 2025
CVE-2025-7988HIGH7.8
  • NixOSNixOS
  • cpe:2.3:a:ashlar:graphite
NoYesSep 17, 2025
CVE-2025-30755MEDIUM6.1
  • NixOSNixOS
  • opengrok
NoNoSep 19, 2025
CVE-2025-59712MEDIUM5.4
  • PHPPHP
  • snipe/snipe-it
NoYesSep 19, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management