====================================================================                   Red Hat Security Advisory

Synopsis:          Moderate: dnsmasq security update
Advisory ID:       RHSA-2008:0789-01
Product:           Red Hat Enterprise Linux
Advisory URL:      https://access.redhat.com/errata/RHSA-2008:0789.html
Issue date:        2008-08-11
CVE Names:         CVE-2008-1447 
====================================================================
1. Summary:

An updated dnsmasq package that implements UDP source-port randomization
is now available for Red Hat Enterprise Linux 5.

This update has been rated as having moderate security impact by the Red
Hat Security Response Team.

2. Relevant releases/architectures:

Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64
Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64

3. Description:

Dnsmasq is lightweight DNS forwarder and DHCP server. It is designed to
provide DNS and, optionally, DHCP, to a small network.

The dnsmasq DNS resolver used a fixed source UDP port. This could have made
DNS spoofing attacks easier. dnsmasq has been updated to use random UDP
source ports, helping to make DNS spoofing attacks harder. (CVE-2008-1447)

All dnsmasq users are advised to upgrade to this updated package, that
upgrades dnsmasq to version 2.45, which resolves this issue.

4. Solution:

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network.  Details on how to use
the Red Hat Network to apply this update are available at

5. Bugs fixed (http://bugzilla.redhat.com/):

449345 - CVE-2008-1447 implement source UDP port randomization (CERT VU#800113)

6. Package List:

Red Hat Enterprise Linux Desktop (v. 5 client):

Source:

i386:
dnsmasq-2.45-1.el5_2.1.i386.rpm
dnsmasq-debuginfo-2.45-1.el5_2.1.i386.rpm

x86_64:
dnsmasq-2.45-1.el5_2.1.x86_64.rpm
dnsmasq-debuginfo-2.45-1.el5_2.1.x86_64.rpm

Red Hat Enterprise Linux (v. 5 server):

Source:

i386:
dnsmasq-2.45-1.el5_2.1.i386.rpm
dnsmasq-debuginfo-2.45-1.el5_2.1.i386.rpm

ia64:
dnsmasq-2.45-1.el5_2.1.ia64.rpm
dnsmasq-debuginfo-2.45-1.el5_2.1.ia64.rpm

ppc:
dnsmasq-2.45-1.el5_2.1.ppc.rpm
dnsmasq-debuginfo-2.45-1.el5_2.1.ppc.rpm

s390x:
dnsmasq-2.45-1.el5_2.1.s390x.rpm
dnsmasq-debuginfo-2.45-1.el5_2.1.s390x.rpm

x86_64:
dnsmasq-2.45-1.el5_2.1.x86_64.rpm
dnsmasq-debuginfo-2.45-1.el5_2.1.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and 
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package

7. References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1447
http://www.redhat.com/security/updates/classification/#moderate
https://thekelleys.org.uk/dnsmasq/CHANGELOG

8. Contact:

The Red Hat security contact is .  More contact
details at https://www.redhat.com/security/team/contact/

Copyright 2008 Red Hat, Inc.

RedHat: Moderate: dnsmasq security update

An updated dnsmasq package that implements UDP source-port randomization is now available for Red Hat Enterprise Linux 5

Summary

Dnsmasq is lightweight DNS forwarder and DHCP server. It is designed to provide DNS and, optionally, DHCP, to a small network.
The dnsmasq DNS resolver used a fixed source UDP port. This could have made DNS spoofing attacks easier. dnsmasq has been updated to use random UDP source ports, helping to make DNS spoofing attacks harder. (CVE-2008-1447)
All dnsmasq users are advised to upgrade to this updated package, that upgrades dnsmasq to version 2.45, which resolves this issue.



Summary


Solution

Before applying this update, make sure that all previously-released errata relevant to your system have been applied.
This update is available via Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at

References

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1447 http://www.redhat.com/security/updates/classification/#moderate https://thekelleys.org.uk/dnsmasq/CHANGELOG

Package List

Red Hat Enterprise Linux Desktop (v. 5 client):
Source:
i386: dnsmasq-2.45-1.el5_2.1.i386.rpm dnsmasq-debuginfo-2.45-1.el5_2.1.i386.rpm
x86_64: dnsmasq-2.45-1.el5_2.1.x86_64.rpm dnsmasq-debuginfo-2.45-1.el5_2.1.x86_64.rpm
Red Hat Enterprise Linux (v. 5 server):
Source:
i386: dnsmasq-2.45-1.el5_2.1.i386.rpm dnsmasq-debuginfo-2.45-1.el5_2.1.i386.rpm
ia64: dnsmasq-2.45-1.el5_2.1.ia64.rpm dnsmasq-debuginfo-2.45-1.el5_2.1.ia64.rpm
ppc: dnsmasq-2.45-1.el5_2.1.ppc.rpm dnsmasq-debuginfo-2.45-1.el5_2.1.ppc.rpm
s390x: dnsmasq-2.45-1.el5_2.1.s390x.rpm dnsmasq-debuginfo-2.45-1.el5_2.1.s390x.rpm
x86_64: dnsmasq-2.45-1.el5_2.1.x86_64.rpm dnsmasq-debuginfo-2.45-1.el5_2.1.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package


Severity
Advisory ID: RHSA-2008:0789-01
Product: Red Hat Enterprise Linux
Advisory URL: https://access.redhat.com/errata/RHSA-2008:0789.html
Issued Date: : 2008-08-11
CVE Names: CVE-2008-1447

Topic

An updated dnsmasq package that implements UDP source-port randomization is now available for Red Hat Enterprise Linux 5.

This update has been rated as having moderate security impact by the Red Hat Security Response Team.


Topic


 

Relevant Releases Architectures

Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64

Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64


Bugs Fixed

449345 - CVE-2008-1447 implement source UDP port randomization (CERT VU#800113)


Related News