Security update for dnsmasq
Announcement ID: | SUSE-SU-2017:2616-1 |
---|---|
Rating: | important |
References: | |
Cross-References: | |
CVSS scores: |
|
Affected Products: |
|
An update that solves eight vulnerabilities and has three security fixes can now be installed.
Description:
This update for dnsmasq fixes the following issues.
Remedy the following security issues:
- CVE-2017-14491: 2 byte heap based overflow. [bsc#1060354]
- CVE-2017-14492: heap based overflow. [bsc#1060355]
- CVE-2017-14493: stack based overflow. [bsc#1060360]
- CVE-2017-14494: DHCP - info leak. [bsc#1060361]
- CVE-2017-14495: DNS - OOM DoS. [bsc#1060362]
- CVE-2017-14496: DNS - DoS Integer underflow. [bsc#1060364]
- Prevent a man-in-the-middle attack (bsc#972164, fate#321175).
Furthermore, the following issues have been fixed:
- Fix DHCP relaying, broken in 2.76 and 2.77.
- Update to version 2.78 (fate#321175, fate#322030, bsc#1035227).
- Fix PXE booting for UEFI architectures (fate#322030).
- Drop PrivateDevices=yes which breaks logging (bsc#902511, bsc#904537)
- Build with support for DNSSEC (fate#318323, bsc#908137).
Please note that this update brings a (small) potential incompatibility in the handling of "basename" in --pxe-service. Please read the CHANGELOG and the documentation if you are using this option.
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
SUSE Linux Enterprise Server 12 LTSS 12
zypper in -t patch SUSE-SLE-SERVER-12-2017-1616=1
Package List:
-
SUSE Linux Enterprise Server 12 LTSS 12 (ppc64le s390x x86_64)
- dnsmasq-2.78-6.6.1
- dnsmasq-debuginfo-2.78-6.6.1
- dnsmasq-debugsource-2.78-6.6.1
References:
- https://www.suse.com/security/cve/CVE-2015-3294.html
- https://www.suse.com/security/cve/CVE-2015-8899.html
- https://www.suse.com/security/cve/CVE-2017-14491.html
- https://www.suse.com/security/cve/CVE-2017-14492.html
- https://www.suse.com/security/cve/CVE-2017-14493.html
- https://www.suse.com/security/cve/CVE-2017-14494.html
- https://www.suse.com/security/cve/CVE-2017-14495.html
- https://www.suse.com/security/cve/CVE-2017-14496.html
- https://bugzilla.suse.com/show_bug.cgi?id=1035227
- https://bugzilla.suse.com/show_bug.cgi?id=1060354
- https://bugzilla.suse.com/show_bug.cgi?id=1060355
- https://bugzilla.suse.com/show_bug.cgi?id=1060360
- https://bugzilla.suse.com/show_bug.cgi?id=1060361
- https://bugzilla.suse.com/show_bug.cgi?id=1060362
- https://bugzilla.suse.com/show_bug.cgi?id=1060364
- https://bugzilla.suse.com/show_bug.cgi?id=902511
- https://bugzilla.suse.com/show_bug.cgi?id=904537
- https://bugzilla.suse.com/show_bug.cgi?id=908137
- https://bugzilla.suse.com/show_bug.cgi?id=972164