openSUSE Security Update: Security update for dnsmasq
______________________________________________________________________________

Announcement ID:    openSUSE-SU-2019:2669-1
Rating:             moderate
References:         #1076958 #1138743 #1152539 #1154849 #1156543 
                    
Cross-References:   CVE-2017-15107 CVE-2019-14834
Affected Products:
                    openSUSE Leap 15.1
______________________________________________________________________________

   An update that solves two vulnerabilities and has three
   fixes is now available.

Description:

   This update for dnsmasq fixes the following issues:

   Security issues fixed:

   - CVE-2019-14834: Fixed a memory leak which could have allowed to remote
     attackers to cause denial of service via DHCP response creation
     (bsc#1154849)
   - CVE-2017-15107: Fixed a vulnerability in DNSSEC implementation.
     Processing of wildcard synthesized NSEC records may result improper
     validation for non-existance (bsc#1076958).

   Other issues addressed:
   - Included linux/sockios.h to get SIOCGSTAMP (bsc#1156543).
   - Removed cache size limit (bsc#1138743).
   - bsc#1152539: include config files from /etc/dnsmasq.d/*.conf .

   This update was imported from the SUSE:SLE-15-SP1:Update update project.


Patch Instructions:

   To install this openSUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - openSUSE Leap 15.1:

      zypper in -t patch openSUSE-2019-2669=1



Package List:

   - openSUSE Leap 15.1 (i586 x86_64):

      dnsmasq-2.78-lp151.5.3.1
      dnsmasq-debuginfo-2.78-lp151.5.3.1
      dnsmasq-debugsource-2.78-lp151.5.3.1
      dnsmasq-utils-2.78-lp151.5.3.1
      dnsmasq-utils-debuginfo-2.78-lp151.5.3.1


References:

   https://www.suse.com/security/cve/CVE-2017-15107.html
   https://www.suse.com/security/cve/CVE-2019-14834.html
   https://bugzilla.suse.com/1076958
   https://bugzilla.suse.com/1138743
   https://bugzilla.suse.com/1152539
   https://bugzilla.suse.com/1154849
   https://bugzilla.suse.com/1156543

-- 

openSUSE: 2019:2669-1: moderate: dnsmasq

December 11, 2019
An update that solves two vulnerabilities and has three fixes is now available.

Description

This update for dnsmasq fixes the following issues: Security issues fixed: - CVE-2019-14834: Fixed a memory leak which could have allowed to remote attackers to cause denial of service via DHCP response creation (bsc#1154849) - CVE-2017-15107: Fixed a vulnerability in DNSSEC implementation. Processing of wildcard synthesized NSEC records may result improper validation for non-existance (bsc#1076958). Other issues addressed: - Included linux/sockios.h to get SIOCGSTAMP (bsc#1156543). - Removed cache size limit (bsc#1138743). - bsc#1152539: include config files from /etc/dnsmasq.d/*.conf . This update was imported from the SUSE:SLE-15-SP1:Update update project.

 

Patch

Patch Instructions: To install this openSUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - openSUSE Leap 15.1: zypper in -t patch openSUSE-2019-2669=1


Package List

- openSUSE Leap 15.1 (i586 x86_64): dnsmasq-2.78-lp151.5.3.1 dnsmasq-debuginfo-2.78-lp151.5.3.1 dnsmasq-debugsource-2.78-lp151.5.3.1 dnsmasq-utils-2.78-lp151.5.3.1 dnsmasq-utils-debuginfo-2.78-lp151.5.3.1


References

https://www.suse.com/security/cve/CVE-2017-15107.html https://www.suse.com/security/cve/CVE-2019-14834.html https://bugzilla.suse.com/1076958 https://bugzilla.suse.com/1138743 https://bugzilla.suse.com/1152539 https://bugzilla.suse.com/1154849 https://bugzilla.suse.com/1156543--


Severity
Announcement ID: openSUSE-SU-2019:2669-1
Rating: moderate
Affected Products: openSUSE Leap 15.1 le.

Related News