Security update for adns
Announcement ID: | SUSE-SU-2020:14399-1 |
---|---|
Rating: | important |
References: | |
Cross-References: | |
CVSS scores: |
|
Affected Products: |
|
An update that solves seven vulnerabilities can now be installed.
Description:
This update for adns fixes the following issues:
- CVE-2017-9103,CVE-2017-9104,CVE-2017-9105,CVE-2017-9109: Fixed an issue in local recursive resolver which could have led to remote code execution (bsc#1172265).
- CVE-2017-9106: Fixed an issue with upstream DNS data sources which could have led to denial of service (bsc#1172265).
- CVE-2017-9107: Fixed an issue when quering domain names which could have led to denial of service (bsc#1172265).
- CVE-2017-9108: Fixed an issue which could have led to denial of service (bsc#1172265).
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
SUSE Linux Enterprise Point of Service 11 SP3
zypper in -t patch sleposp3-adns-14399=1
-
SUSE Linux Enterprise Server 11 SP4 LTSS 11-SP4
zypper in -t patch slessp4-adns-14399=1
-
SUSE Linux Enterprise Server 11 SP4
zypper in -t patch slessp4-adns-14399=1
Package List:
-
SUSE Linux Enterprise Point of Service 11 SP3 (i586)
- libadns1-1.4-75.3.1
-
SUSE Linux Enterprise Server 11 SP4 LTSS 11-SP4 (ppc64 s390x x86_64 i586)
- libadns1-1.4-75.3.1
-
SUSE Linux Enterprise Server 11 SP4 (ppc64 s390x x86_64 i586)
- libadns1-1.4-75.3.1
References:
- https://www.suse.com/security/cve/CVE-2017-9103.html
- https://www.suse.com/security/cve/CVE-2017-9104.html
- https://www.suse.com/security/cve/CVE-2017-9105.html
- https://www.suse.com/security/cve/CVE-2017-9106.html
- https://www.suse.com/security/cve/CVE-2017-9107.html
- https://www.suse.com/security/cve/CVE-2017-9108.html
- https://www.suse.com/security/cve/CVE-2017-9109.html
- https://bugzilla.suse.com/show_bug.cgi?id=1172265