Security update for dnsmasq
Announcement ID: | SUSE-SU-2015:0979-1 |
---|---|
Rating: | moderate |
References: | |
Cross-References: | |
CVSS scores: |
|
Affected Products: |
|
An update that solves one vulnerability and has one security fix can now be installed.
Description:
The DNS server dnsmasq was updated to fix one security issue and one non-security bug.
The following vulnerability was fixed:
- CVE-2015-3294: A remote unauthenticated attacker could have caused a denial of service (DoS) or read heap memory, potentially disclosing information such as performed DNS queries or encryption keys. (bsc#928867)
The following bug was fixed:
- bsc#923144: When answer to an upstream query is a CNAME pointing to an A/AAAA record which is present locally (/etc/hosts), allow caching when the upstream and local A/AAAA records have the same value.
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
SUSE Cloud for SLE 12 Compute Nodes 5
zypper in -t patch SUSE-SLE12-CLOUD-5-2015-229=1
-
SUSE Linux Enterprise Desktop 12
zypper in -t patch SUSE-SLE-DESKTOP-12-2015-229=1
-
SUSE Linux Enterprise Server 12
zypper in -t patch SUSE-SLE-SERVER-12-2015-229=1
-
SUSE Linux Enterprise Server for SAP Applications 12
zypper in -t patch SUSE-SLE-SERVER-12-2015-229=1
Package List:
-
SUSE Cloud for SLE 12 Compute Nodes 5 (x86_64)
- dnsmasq-utils-2.71-4.1
- dnsmasq-debuginfo-2.71-4.1
- dnsmasq-debugsource-2.71-4.1
- dnsmasq-utils-debuginfo-2.71-4.1
-
SUSE Linux Enterprise Desktop 12 (x86_64)
- dnsmasq-debuginfo-2.71-4.1
- dnsmasq-debugsource-2.71-4.1
- dnsmasq-2.71-4.1
-
SUSE Linux Enterprise Server 12 (ppc64le s390x x86_64)
- dnsmasq-debuginfo-2.71-4.1
- dnsmasq-debugsource-2.71-4.1
- dnsmasq-2.71-4.1
-
SUSE Linux Enterprise Server for SAP Applications 12 (x86_64)
- dnsmasq-debuginfo-2.71-4.1
- dnsmasq-debugsource-2.71-4.1
- dnsmasq-2.71-4.1