SUSE: 2019:3189-1 moderate: dnsmasq
Summary
This update for dnsmasq fixes the following issues: Security issues fixed: - CVE-2019-14834: Fixed a memory leak which could have allowed to remote attackers to cause denial of service via DHCP response creation (bsc#1154849) - CVE-2017-15107: Fixed a vulnerability in DNSSEC implementation. Processing of wildcard synthesized NSEC records may result improper validation for non-existance (bsc#1076958). Other issues addressed: - Included linux/sockios.h to get SIOCGSTAMP (bsc#1156543). - Removed cache size limit (bsc#1138743). - bsc#1152539: include config files from /etc/dnsmasq.d/*.conf . Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Module for Open Buildservice Development Tools 15-SP1: zypper in -t patch SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-3189=1 - SUSE Linux Enterprise Module for Basesystem 15-SP1: zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP1-2019-3189=1 Package List: - SUSE Linux Enterprise Module for Open Buildservice Development Tools 15-SP1 (aarch64 ppc64le s390x x86_64): dnsmasq-debuginfo-2.78-7.3.1 dnsmasq-debugsource-2.78-7.3.1 dnsmasq-utils-2.78-7.3.1 dnsmasq-utils-debuginfo-2.78-7.3.1 - SUSE Linux Enterprise Module for Basesystem 15-SP1 (aarch64 ppc64le s390x x86_64): dnsmasq-2.78-7.3.1 dnsmasq-debuginfo-2.78-7.3.1 dnsmasq-debugsource-2.78-7.3.1
References
#1076958 #1138743 #1152539 #1154849 #1156543
Cross- CVE-2017-15107 CVE-2019-14834
Affected Products:
SUSE Linux Enterprise Module for Open Buildservice Development Tools 15-SP1
SUSE Linux Enterprise Module for Basesystem 15-SP1
https://www.suse.com/security/cve/CVE-2017-15107.html
https://www.suse.com/security/cve/CVE-2019-14834.html
https://bugzilla.suse.com/1076958
https://bugzilla.suse.com/1138743
https://bugzilla.suse.com/1152539
https://bugzilla.suse.com/1154849
https://bugzilla.suse.com/1156543