Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2015-8899 (GCVE-0-2015-8899)
Vulnerability from cvelistv5
Published
2016-06-30 17:00
Modified
2024-08-06 08:29
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Dnsmasq before 2.76 allows remote servers to cause a denial of service (crash) via a reply with an empty DNS address that has an (1) A or (2) AAAA record defined locally.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T08:29:22.024Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "91031", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/91031" }, { "name": "[Dnsmasq-discuss] 20160418 Dnsmasq 2.75 on Ubuntu 16.04 crashes reproducibly", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2016q2/010479.html" }, { "name": "USN-3009-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-3009-1" }, { "name": "[Dnsmasq-discuss] 20160503 Dnsmasq 2.75 on Ubuntu 16.04 crashes reproducibly", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2016q2/010505.html" }, { "name": "[oss-security] 20160603 Re: CVE Request: Dnsmasq denial of service", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2016/06/04/2" }, { "name": "1036045", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1036045" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://thekelleys.org.uk/gitweb/?p=dnsmasq.git%3Ba=commit%3Bh=41a8d9e99be9f2cc8b02051dd322cb45e0faac87" }, { "name": "[oss-security] 20160603 CVE Request: Dnsmasq denial of service", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2016/06/03/7" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-04-18T00:00:00", "descriptions": [ { "lang": "en", "value": "Dnsmasq before 2.76 allows remote servers to cause a denial of service (crash) via a reply with an empty DNS address that has an (1) A or (2) AAAA record defined locally." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-11-25T19:57:01", "orgId": "cc1ad9ee-3454-478d-9317-d3e869d708bc", "shortName": "canonical" }, "references": [ { "name": "91031", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/91031" }, { "name": "[Dnsmasq-discuss] 20160418 Dnsmasq 2.75 on Ubuntu 16.04 crashes reproducibly", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2016q2/010479.html" }, { "name": "USN-3009-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-3009-1" }, { "name": "[Dnsmasq-discuss] 20160503 Dnsmasq 2.75 on Ubuntu 16.04 crashes reproducibly", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2016q2/010505.html" }, { "name": "[oss-security] 20160603 Re: CVE Request: Dnsmasq denial of service", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2016/06/04/2" }, { "name": "1036045", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1036045" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://thekelleys.org.uk/gitweb/?p=dnsmasq.git%3Ba=commit%3Bh=41a8d9e99be9f2cc8b02051dd322cb45e0faac87" }, { "name": "[oss-security] 20160603 CVE Request: Dnsmasq denial of service", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2016/06/03/7" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@ubuntu.com", "ID": "CVE-2015-8899", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Dnsmasq before 2.76 allows remote servers to cause a denial of service (crash) via a reply with an empty DNS address that has an (1) A or (2) AAAA record defined locally." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "91031", "refsource": "BID", "url": "http://www.securityfocus.com/bid/91031" }, { "name": "[Dnsmasq-discuss] 20160418 Dnsmasq 2.75 on Ubuntu 16.04 crashes reproducibly", "refsource": "MLIST", "url": "http://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2016q2/010479.html" }, { "name": "USN-3009-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-3009-1" }, { "name": "[Dnsmasq-discuss] 20160503 Dnsmasq 2.75 on Ubuntu 16.04 crashes reproducibly", "refsource": "MLIST", "url": "http://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2016q2/010505.html" }, { "name": "[oss-security] 20160603 Re: CVE Request: Dnsmasq denial of service", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2016/06/04/2" }, { "name": "1036045", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1036045" }, { "name": "http://thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=commit;h=41a8d9e99be9f2cc8b02051dd322cb45e0faac87", "refsource": "CONFIRM", "url": "http://thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=commit;h=41a8d9e99be9f2cc8b02051dd322cb45e0faac87" }, { "name": "[oss-security] 20160603 CVE Request: Dnsmasq denial of service", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2016/06/03/7" } ] } } } }, "cveMetadata": { "assignerOrgId": "cc1ad9ee-3454-478d-9317-d3e869d708bc", "assignerShortName": "canonical", "cveId": "CVE-2015-8899", "datePublished": "2016-06-30T17:00:00", "dateReserved": "2016-06-03T00:00:00", "dateUpdated": "2024-08-06T08:29:22.024Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2015-8899\",\"sourceIdentifier\":\"security@ubuntu.com\",\"published\":\"2016-06-30T17:59:00.157\",\"lastModified\":\"2025-04-12T10:46:40.837\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Dnsmasq before 2.76 allows remote servers to cause a denial of service (crash) via a reply with an empty DNS address that has an (1) A or (2) AAAA record defined locally.\"},{\"lang\":\"es\",\"value\":\"Dnsmasq en versiones anteriores a 2.76 permite a servidores remotos provocar una denegaci\u00f3n de servicio (ca\u00edda) a trav\u00e9s de una respuesta con una direcci\u00f3n DNS vac\u00eda que tiene una grabaci\u00f3n (1) A o (2) AAAA definida localmente.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:P\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-20\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E88A537F-F4D0-46B9-9E37-965233C2A355\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:thekelleys:dnsmasq:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.75\",\"matchCriteriaId\":\"B705C85C-B580-43B5-AAAA-CBA10885BB22\"}]}]}],\"references\":[{\"url\":\"http://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2016q2/010479.html\",\"source\":\"security@ubuntu.com\"},{\"url\":\"http://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2016q2/010505.html\",\"source\":\"security@ubuntu.com\"},{\"url\":\"http://thekelleys.org.uk/gitweb/?p=dnsmasq.git%3Ba=commit%3Bh=41a8d9e99be9f2cc8b02051dd322cb45e0faac87\",\"source\":\"security@ubuntu.com\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2016/06/03/7\",\"source\":\"security@ubuntu.com\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2016/06/04/2\",\"source\":\"security@ubuntu.com\"},{\"url\":\"http://www.securityfocus.com/bid/91031\",\"source\":\"security@ubuntu.com\"},{\"url\":\"http://www.securitytracker.com/id/1036045\",\"source\":\"security@ubuntu.com\"},{\"url\":\"http://www.ubuntu.com/usn/USN-3009-1\",\"source\":\"security@ubuntu.com\"},{\"url\":\"http://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2016q2/010479.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2016q2/010505.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://thekelleys.org.uk/gitweb/?p=dnsmasq.git%3Ba=commit%3Bh=41a8d9e99be9f2cc8b02051dd322cb45e0faac87\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2016/06/03/7\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2016/06/04/2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/91031\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securitytracker.com/id/1036045\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.ubuntu.com/usn/USN-3009-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}" } }
suse-su-2017:2616-1
Vulnerability from csaf_suse
Published
2017-10-02 13:53
Modified
2017-10-02 13:53
Summary
Security update for dnsmasq
Notes
Title of the patch
Security update for dnsmasq
Description of the patch
This update for dnsmasq fixes the following issues.
Remedy the following security issues:
- CVE-2017-14491: 2 byte heap based overflow. [bsc#1060354]
- CVE-2017-14492: heap based overflow. [bsc#1060355]
- CVE-2017-14493: stack based overflow. [bsc#1060360]
- CVE-2017-14494: DHCP - info leak. [bsc#1060361]
- CVE-2017-14495: DNS - OOM DoS. [bsc#1060362]
- CVE-2017-14496: DNS - DoS Integer underflow. [bsc#1060364]
- Prevent a man-in-the-middle attack (bsc#972164, fate#321175).
Furthermore, the following issues have been fixed:
- Fix DHCP relaying, broken in 2.76 and 2.77.
- Update to version 2.78 (fate#321175, fate#322030, bsc#1035227).
- Fix PXE booting for UEFI architectures (fate#322030).
- Drop PrivateDevices=yes which breaks logging (bsc#902511, bsc#904537)
- Build with support for DNSSEC (fate#318323, bsc#908137).
Please note that this update brings a (small) potential incompatibility in the
handling of 'basename' in --pxe-service. Please read the CHANGELOG and the
documentation if you are using this option.
Patchnames
SUSE-SLE-SERVER-12-2017-1616
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for dnsmasq", "title": "Title of the patch" }, { "category": "description", "text": "This update for dnsmasq fixes the following issues.\n\nRemedy the following security issues:\n\n- CVE-2017-14491: 2 byte heap based overflow. [bsc#1060354]\n- CVE-2017-14492: heap based overflow. [bsc#1060355]\n- CVE-2017-14493: stack based overflow. [bsc#1060360]\n- CVE-2017-14494: DHCP - info leak. [bsc#1060361]\n- CVE-2017-14495: DNS - OOM DoS. [bsc#1060362]\n- CVE-2017-14496: DNS - DoS Integer underflow. [bsc#1060364]\n- Prevent a man-in-the-middle attack (bsc#972164, fate#321175).\n\nFurthermore, the following issues have been fixed:\n\n- Fix DHCP relaying, broken in 2.76 and 2.77.\n- Update to version 2.78 (fate#321175, fate#322030, bsc#1035227).\n- Fix PXE booting for UEFI architectures (fate#322030).\n- Drop PrivateDevices=yes which breaks logging (bsc#902511, bsc#904537)\n- Build with support for DNSSEC (fate#318323, bsc#908137).\n\nPlease note that this update brings a (small) potential incompatibility in the\nhandling of \u0027basename\u0027 in --pxe-service. Please read the CHANGELOG and the\ndocumentation if you are using this option.\n\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SERVER-12-2017-1616", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2017_2616-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2017:2616-1", "url": "https://www.suse.com/support/update/announcement/2017/suse-su-20172616-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2017:2616-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2017-October/003268.html" }, { "category": "self", "summary": "SUSE Bug 1035227", "url": "https://bugzilla.suse.com/1035227" }, { "category": "self", "summary": "SUSE Bug 1060354", "url": "https://bugzilla.suse.com/1060354" }, { "category": "self", "summary": "SUSE Bug 1060355", "url": "https://bugzilla.suse.com/1060355" }, { "category": "self", "summary": "SUSE Bug 1060360", "url": "https://bugzilla.suse.com/1060360" }, { "category": "self", "summary": "SUSE Bug 1060361", "url": "https://bugzilla.suse.com/1060361" }, { "category": "self", "summary": "SUSE Bug 1060362", "url": "https://bugzilla.suse.com/1060362" }, { "category": "self", "summary": "SUSE Bug 1060364", "url": "https://bugzilla.suse.com/1060364" }, { "category": "self", "summary": "SUSE Bug 902511", "url": "https://bugzilla.suse.com/902511" }, { "category": "self", "summary": "SUSE Bug 904537", "url": "https://bugzilla.suse.com/904537" }, { "category": "self", "summary": "SUSE Bug 908137", "url": "https://bugzilla.suse.com/908137" }, { "category": "self", "summary": "SUSE Bug 972164", "url": "https://bugzilla.suse.com/972164" }, { "category": "self", "summary": "SUSE CVE CVE-2015-3294 page", "url": "https://www.suse.com/security/cve/CVE-2015-3294/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8899 page", "url": "https://www.suse.com/security/cve/CVE-2015-8899/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-14491 page", "url": "https://www.suse.com/security/cve/CVE-2017-14491/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-14492 page", "url": "https://www.suse.com/security/cve/CVE-2017-14492/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-14493 page", "url": "https://www.suse.com/security/cve/CVE-2017-14493/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-14494 page", "url": "https://www.suse.com/security/cve/CVE-2017-14494/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-14495 page", "url": "https://www.suse.com/security/cve/CVE-2017-14495/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-14496 page", "url": "https://www.suse.com/security/cve/CVE-2017-14496/" } ], "title": "Security update for dnsmasq", "tracking": { "current_release_date": "2017-10-02T13:53:30Z", "generator": { "date": "2017-10-02T13:53:30Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2017:2616-1", "initial_release_date": "2017-10-02T13:53:30Z", "revision_history": [ { "date": "2017-10-02T13:53:30Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "dnsmasq-2.78-6.6.1.ppc64le", "product": { "name": "dnsmasq-2.78-6.6.1.ppc64le", "product_id": "dnsmasq-2.78-6.6.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "dnsmasq-2.78-6.6.1.s390x", "product": { "name": "dnsmasq-2.78-6.6.1.s390x", "product_id": "dnsmasq-2.78-6.6.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "dnsmasq-2.78-6.6.1.x86_64", "product": { "name": "dnsmasq-2.78-6.6.1.x86_64", "product_id": "dnsmasq-2.78-6.6.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server 12-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-2.78-6.6.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.ppc64le" }, "product_reference": "dnsmasq-2.78-6.6.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-2.78-6.6.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.s390x" }, "product_reference": "dnsmasq-2.78-6.6.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-2.78-6.6.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.x86_64" }, "product_reference": "dnsmasq-2.78-6.6.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-3294", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-3294" } ], "notes": [ { "category": "general", "text": "The tcp_request function in Dnsmasq before 2.73rc4 does not properly handle the return value of the setup_reply function, which allows remote attackers to read process memory and cause a denial of service (out-of-bounds read and crash) via a malformed DNS request.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-3294", "url": "https://www.suse.com/security/cve/CVE-2015-3294" }, { "category": "external", "summary": "SUSE Bug 923144 for CVE-2015-3294", "url": "https://bugzilla.suse.com/923144" }, { "category": "external", "summary": "SUSE Bug 928867 for CVE-2015-3294", "url": "https://bugzilla.suse.com/928867" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-02T13:53:30Z", "details": "moderate" } ], "title": "CVE-2015-3294" }, { "cve": "CVE-2015-8899", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8899" } ], "notes": [ { "category": "general", "text": "Dnsmasq before 2.76 allows remote servers to cause a denial of service (crash) via a reply with an empty DNS address that has an (1) A or (2) AAAA record defined locally.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8899", "url": "https://www.suse.com/security/cve/CVE-2015-8899" }, { "category": "external", "summary": "SUSE Bug 983273 for CVE-2015-8899", "url": "https://bugzilla.suse.com/983273" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-02T13:53:30Z", "details": "moderate" } ], "title": "CVE-2015-8899" }, { "cve": "CVE-2017-14491", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-14491" } ], "notes": [ { "category": "general", "text": "Heap-based buffer overflow in dnsmasq before 2.78 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted DNS response.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-14491", "url": "https://www.suse.com/security/cve/CVE-2017-14491" }, { "category": "external", "summary": "SUSE Bug 1060354 for CVE-2017-14491", "url": "https://bugzilla.suse.com/1060354" }, { "category": "external", "summary": "SUSE Bug 1060360 for CVE-2017-14491", "url": "https://bugzilla.suse.com/1060360" }, { "category": "external", "summary": "SUSE Bug 1060361 for CVE-2017-14491", "url": "https://bugzilla.suse.com/1060361" }, { "category": "external", "summary": "SUSE Bug 1060362 for CVE-2017-14491", "url": "https://bugzilla.suse.com/1060362" }, { "category": "external", "summary": "SUSE Bug 1060364 for CVE-2017-14491", "url": "https://bugzilla.suse.com/1060364" }, { "category": "external", "summary": "SUSE Bug 1063832 for CVE-2017-14491", "url": "https://bugzilla.suse.com/1063832" }, { "category": "external", "summary": "SUSE Bug 1143944 for CVE-2017-14491", "url": "https://bugzilla.suse.com/1143944" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-02T13:53:30Z", "details": "moderate" } ], "title": "CVE-2017-14491" }, { "cve": "CVE-2017-14492", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-14492" } ], "notes": [ { "category": "general", "text": "Heap-based buffer overflow in dnsmasq before 2.78 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted IPv6 router advertisement request.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-14492", "url": "https://www.suse.com/security/cve/CVE-2017-14492" }, { "category": "external", "summary": "SUSE Bug 1060355 for CVE-2017-14492", "url": "https://bugzilla.suse.com/1060355" }, { "category": "external", "summary": "SUSE Bug 1060360 for CVE-2017-14492", "url": "https://bugzilla.suse.com/1060360" }, { "category": "external", "summary": "SUSE Bug 1060361 for CVE-2017-14492", "url": "https://bugzilla.suse.com/1060361" }, { "category": "external", "summary": "SUSE Bug 1060362 for CVE-2017-14492", "url": "https://bugzilla.suse.com/1060362" }, { "category": "external", "summary": "SUSE Bug 1060364 for CVE-2017-14492", "url": "https://bugzilla.suse.com/1060364" }, { "category": "external", "summary": "SUSE Bug 1063832 for CVE-2017-14492", "url": "https://bugzilla.suse.com/1063832" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-02T13:53:30Z", "details": "moderate" } ], "title": "CVE-2017-14492" }, { "cve": "CVE-2017-14493", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-14493" } ], "notes": [ { "category": "general", "text": "Stack-based buffer overflow in dnsmasq before 2.78 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted DHCPv6 request.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-14493", "url": "https://www.suse.com/security/cve/CVE-2017-14493" }, { "category": "external", "summary": "SUSE Bug 1060360 for CVE-2017-14493", "url": "https://bugzilla.suse.com/1060360" }, { "category": "external", "summary": "SUSE Bug 1060361 for CVE-2017-14493", "url": "https://bugzilla.suse.com/1060361" }, { "category": "external", "summary": "SUSE Bug 1060362 for CVE-2017-14493", "url": "https://bugzilla.suse.com/1060362" }, { "category": "external", "summary": "SUSE Bug 1060364 for CVE-2017-14493", "url": "https://bugzilla.suse.com/1060364" }, { "category": "external", "summary": "SUSE Bug 1063832 for CVE-2017-14493", "url": "https://bugzilla.suse.com/1063832" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-02T13:53:30Z", "details": "moderate" } ], "title": "CVE-2017-14493" }, { "cve": "CVE-2017-14494", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-14494" } ], "notes": [ { "category": "general", "text": "dnsmasq before 2.78, when configured as a relay, allows remote attackers to obtain sensitive memory information via vectors involving handling DHCPv6 forwarded requests.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-14494", "url": "https://www.suse.com/security/cve/CVE-2017-14494" }, { "category": "external", "summary": "SUSE Bug 1060360 for CVE-2017-14494", "url": "https://bugzilla.suse.com/1060360" }, { "category": "external", "summary": "SUSE Bug 1060361 for CVE-2017-14494", "url": "https://bugzilla.suse.com/1060361" }, { "category": "external", "summary": "SUSE Bug 1060362 for CVE-2017-14494", "url": "https://bugzilla.suse.com/1060362" }, { "category": "external", "summary": "SUSE Bug 1060364 for CVE-2017-14494", "url": "https://bugzilla.suse.com/1060364" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-02T13:53:30Z", "details": "moderate" } ], "title": "CVE-2017-14494" }, { "cve": "CVE-2017-14495", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-14495" } ], "notes": [ { "category": "general", "text": "Memory leak in dnsmasq before 2.78, when the --add-mac, --add-cpe-id or --add-subnet option is specified, allows remote attackers to cause a denial of service (memory consumption) via vectors involving DNS response creation.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-14495", "url": "https://www.suse.com/security/cve/CVE-2017-14495" }, { "category": "external", "summary": "SUSE Bug 1060360 for CVE-2017-14495", "url": "https://bugzilla.suse.com/1060360" }, { "category": "external", "summary": "SUSE Bug 1060361 for CVE-2017-14495", "url": "https://bugzilla.suse.com/1060361" }, { "category": "external", "summary": "SUSE Bug 1060362 for CVE-2017-14495", "url": "https://bugzilla.suse.com/1060362" }, { "category": "external", "summary": "SUSE Bug 1060364 for CVE-2017-14495", "url": "https://bugzilla.suse.com/1060364" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-02T13:53:30Z", "details": "important" } ], "title": "CVE-2017-14495" }, { "cve": "CVE-2017-14496", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-14496" } ], "notes": [ { "category": "general", "text": "Integer underflow in the add_pseudoheader function in dnsmasq before 2.78 , when the --add-mac, --add-cpe-id or --add-subnet option is specified, allows remote attackers to cause a denial of service via a crafted DNS request.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-14496", "url": "https://www.suse.com/security/cve/CVE-2017-14496" }, { "category": "external", "summary": "SUSE Bug 1060360 for CVE-2017-14496", "url": "https://bugzilla.suse.com/1060360" }, { "category": "external", "summary": "SUSE Bug 1060361 for CVE-2017-14496", "url": "https://bugzilla.suse.com/1060361" }, { "category": "external", "summary": "SUSE Bug 1060362 for CVE-2017-14496", "url": "https://bugzilla.suse.com/1060362" }, { "category": "external", "summary": "SUSE Bug 1060364 for CVE-2017-14496", "url": "https://bugzilla.suse.com/1060364" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-02T13:53:30Z", "details": "important" } ], "title": "CVE-2017-14496" } ] }
suse-su-2016:3269-1
Vulnerability from csaf_suse
Published
2016-12-23 17:02
Modified
2016-12-23 17:02
Summary
Security update for dnsmasq
Notes
Title of the patch
Security update for dnsmasq
Description of the patch
This update for dnsmasq fixes the following issues:
- CVE-2015-8899: Denial of service between local and remote dns entries (bsc#983273)
Patchnames
SUSE-OpenStack-Cloud-6-2016-1912,SUSE-SLE-DESKTOP-12-SP1-2016-1912,SUSE-SLE-DESKTOP-12-SP2-2016-1912,SUSE-SLE-RPI-12-SP2-2016-1912,SUSE-SLE-SERVER-12-SP1-2016-1912,SUSE-SLE-SERVER-12-SP2-2016-1912
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for dnsmasq", "title": "Title of the patch" }, { "category": "description", "text": "This update for dnsmasq fixes the following issues:\n\n- CVE-2015-8899: Denial of service between local and remote dns entries (bsc#983273)\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-OpenStack-Cloud-6-2016-1912,SUSE-SLE-DESKTOP-12-SP1-2016-1912,SUSE-SLE-DESKTOP-12-SP2-2016-1912,SUSE-SLE-RPI-12-SP2-2016-1912,SUSE-SLE-SERVER-12-SP1-2016-1912,SUSE-SLE-SERVER-12-SP2-2016-1912", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_3269-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2016:3269-1", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20163269-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2016:3269-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2016-December/002524.html" }, { "category": "self", "summary": "SUSE Bug 983273", "url": "https://bugzilla.suse.com/983273" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8899 page", "url": "https://www.suse.com/security/cve/CVE-2015-8899/" } ], "title": "Security update for dnsmasq", "tracking": { "current_release_date": "2016-12-23T17:02:50Z", "generator": { "date": "2016-12-23T17:02:50Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2016:3269-1", "initial_release_date": "2016-12-23T17:02:50Z", "revision_history": [ { "date": "2016-12-23T17:02:50Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "dnsmasq-2.71-13.1.aarch64", "product": { "name": "dnsmasq-2.71-13.1.aarch64", "product_id": "dnsmasq-2.71-13.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "dnsmasq-2.71-13.1.ppc64le", "product": { "name": "dnsmasq-2.71-13.1.ppc64le", "product_id": "dnsmasq-2.71-13.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "dnsmasq-2.71-13.1.s390x", "product": { "name": "dnsmasq-2.71-13.1.s390x", "product_id": "dnsmasq-2.71-13.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "dnsmasq-utils-2.71-13.1.x86_64", "product": { "name": "dnsmasq-utils-2.71-13.1.x86_64", "product_id": "dnsmasq-utils-2.71-13.1.x86_64" } }, { "category": "product_version", "name": "dnsmasq-2.71-13.1.x86_64", "product": { "name": "dnsmasq-2.71-13.1.x86_64", "product_id": "dnsmasq-2.71-13.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE OpenStack Cloud 6", "product": { "name": "SUSE OpenStack Cloud 6", "product_id": "SUSE OpenStack Cloud 6", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-openstack-cloud:6" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Desktop 12 SP1", "product": { "name": "SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sled:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Desktop 12 SP2", "product": { "name": "SUSE Linux Enterprise Desktop 12 SP2", "product_id": "SUSE Linux Enterprise Desktop 12 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sled:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2", "product": { "name": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2", "product_id": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP1", "product": { "name": "SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP2", "product": { "name": "SUSE Linux Enterprise Server 12 SP2", "product_id": "SUSE Linux Enterprise Server 12 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-2.71-13.1.x86_64 as component of SUSE OpenStack Cloud 6", "product_id": "SUSE OpenStack Cloud 6:dnsmasq-utils-2.71-13.1.x86_64" }, "product_reference": "dnsmasq-utils-2.71-13.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 6" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-2.71-13.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1:dnsmasq-2.71-13.1.x86_64" }, "product_reference": "dnsmasq-2.71-13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-2.71-13.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP2", "product_id": "SUSE Linux Enterprise Desktop 12 SP2:dnsmasq-2.71-13.1.x86_64" }, "product_reference": "dnsmasq-2.71-13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-2.71-13.1.aarch64 as component of SUSE Linux Enterprise Server for Raspberry Pi 12 SP2", "product_id": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:dnsmasq-2.71-13.1.aarch64" }, "product_reference": "dnsmasq-2.71-13.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-2.71-13.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:dnsmasq-2.71-13.1.ppc64le" }, "product_reference": "dnsmasq-2.71-13.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-2.71-13.1.s390x as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:dnsmasq-2.71-13.1.s390x" }, "product_reference": "dnsmasq-2.71-13.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-2.71-13.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:dnsmasq-2.71-13.1.x86_64" }, "product_reference": "dnsmasq-2.71-13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-2.71-13.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:dnsmasq-2.71-13.1.ppc64le" }, "product_reference": "dnsmasq-2.71-13.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-2.71-13.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:dnsmasq-2.71-13.1.s390x" }, "product_reference": "dnsmasq-2.71-13.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-2.71-13.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:dnsmasq-2.71-13.1.x86_64" }, "product_reference": "dnsmasq-2.71-13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-2.71-13.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP2", "product_id": "SUSE Linux Enterprise Server 12 SP2:dnsmasq-2.71-13.1.aarch64" }, "product_reference": "dnsmasq-2.71-13.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-2.71-13.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2", "product_id": "SUSE Linux Enterprise Server 12 SP2:dnsmasq-2.71-13.1.ppc64le" }, "product_reference": "dnsmasq-2.71-13.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-2.71-13.1.s390x as component of SUSE Linux Enterprise Server 12 SP2", "product_id": "SUSE Linux Enterprise Server 12 SP2:dnsmasq-2.71-13.1.s390x" }, "product_reference": "dnsmasq-2.71-13.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-2.71-13.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2", "product_id": "SUSE Linux Enterprise Server 12 SP2:dnsmasq-2.71-13.1.x86_64" }, "product_reference": "dnsmasq-2.71-13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-2.71-13.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:dnsmasq-2.71-13.1.aarch64" }, "product_reference": "dnsmasq-2.71-13.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-2.71-13.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:dnsmasq-2.71-13.1.ppc64le" }, "product_reference": "dnsmasq-2.71-13.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-2.71-13.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:dnsmasq-2.71-13.1.s390x" }, "product_reference": "dnsmasq-2.71-13.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-2.71-13.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:dnsmasq-2.71-13.1.x86_64" }, "product_reference": "dnsmasq-2.71-13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-8899", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8899" } ], "notes": [ { "category": "general", "text": "Dnsmasq before 2.76 allows remote servers to cause a denial of service (crash) via a reply with an empty DNS address that has an (1) A or (2) AAAA record defined locally.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:dnsmasq-2.71-13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:dnsmasq-2.71-13.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:dnsmasq-2.71-13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:dnsmasq-2.71-13.1.s390x", "SUSE Linux Enterprise Server 12 SP1:dnsmasq-2.71-13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:dnsmasq-2.71-13.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:dnsmasq-2.71-13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:dnsmasq-2.71-13.1.s390x", "SUSE Linux Enterprise Server 12 SP2:dnsmasq-2.71-13.1.x86_64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:dnsmasq-2.71-13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:dnsmasq-2.71-13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:dnsmasq-2.71-13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:dnsmasq-2.71-13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:dnsmasq-2.71-13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:dnsmasq-2.71-13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:dnsmasq-2.71-13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:dnsmasq-2.71-13.1.x86_64", "SUSE OpenStack Cloud 6:dnsmasq-utils-2.71-13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8899", "url": "https://www.suse.com/security/cve/CVE-2015-8899" }, { "category": "external", "summary": "SUSE Bug 983273 for CVE-2015-8899", "url": "https://bugzilla.suse.com/983273" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:dnsmasq-2.71-13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:dnsmasq-2.71-13.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:dnsmasq-2.71-13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:dnsmasq-2.71-13.1.s390x", "SUSE Linux Enterprise Server 12 SP1:dnsmasq-2.71-13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:dnsmasq-2.71-13.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:dnsmasq-2.71-13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:dnsmasq-2.71-13.1.s390x", "SUSE Linux Enterprise Server 12 SP2:dnsmasq-2.71-13.1.x86_64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:dnsmasq-2.71-13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:dnsmasq-2.71-13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:dnsmasq-2.71-13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:dnsmasq-2.71-13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:dnsmasq-2.71-13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:dnsmasq-2.71-13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:dnsmasq-2.71-13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:dnsmasq-2.71-13.1.x86_64", "SUSE OpenStack Cloud 6:dnsmasq-utils-2.71-13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:dnsmasq-2.71-13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:dnsmasq-2.71-13.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:dnsmasq-2.71-13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:dnsmasq-2.71-13.1.s390x", "SUSE Linux Enterprise Server 12 SP1:dnsmasq-2.71-13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:dnsmasq-2.71-13.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:dnsmasq-2.71-13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:dnsmasq-2.71-13.1.s390x", "SUSE Linux Enterprise Server 12 SP2:dnsmasq-2.71-13.1.x86_64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:dnsmasq-2.71-13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:dnsmasq-2.71-13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:dnsmasq-2.71-13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:dnsmasq-2.71-13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:dnsmasq-2.71-13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:dnsmasq-2.71-13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:dnsmasq-2.71-13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:dnsmasq-2.71-13.1.x86_64", "SUSE OpenStack Cloud 6:dnsmasq-utils-2.71-13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-12-23T17:02:50Z", "details": "moderate" } ], "title": "CVE-2015-8899" } ] }
suse-su-2016:3199-1
Vulnerability from csaf_suse
Published
2016-12-20 12:18
Modified
2016-12-20 12:18
Summary
Security update for dnsmasq
Notes
Title of the patch
Security update for dnsmasq
Description of the patch
This update for dnsmasq fixes the following issues:
- CVE-2015-8899: Denial of service between local and remote dns entries (bsc#983273)
Patchnames
slessp4-dnsmasq-12899
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for dnsmasq", "title": "Title of the patch" }, { "category": "description", "text": "This update for dnsmasq fixes the following issues:\n\n- CVE-2015-8899: Denial of service between local and remote dns entries (bsc#983273)\n", "title": "Description of the patch" }, { "category": "details", "text": "slessp4-dnsmasq-12899", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_3199-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2016:3199-1", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20163199-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2016:3199-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2016-December/002500.html" }, { "category": "self", "summary": "SUSE Bug 983273", "url": "https://bugzilla.suse.com/983273" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8899 page", "url": "https://www.suse.com/security/cve/CVE-2015-8899/" } ], "title": "Security update for dnsmasq", "tracking": { "current_release_date": "2016-12-20T12:18:38Z", "generator": { "date": "2016-12-20T12:18:38Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2016:3199-1", "initial_release_date": "2016-12-20T12:18:38Z", "revision_history": [ { "date": "2016-12-20T12:18:38Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "dnsmasq-2.71-0.16.3.i586", "product": { "name": "dnsmasq-2.71-0.16.3.i586", "product_id": "dnsmasq-2.71-0.16.3.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "dnsmasq-2.71-0.16.3.ia64", "product": { "name": "dnsmasq-2.71-0.16.3.ia64", "product_id": "dnsmasq-2.71-0.16.3.ia64" } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "dnsmasq-2.71-0.16.3.ppc64", "product": { "name": "dnsmasq-2.71-0.16.3.ppc64", "product_id": "dnsmasq-2.71-0.16.3.ppc64" } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "dnsmasq-2.71-0.16.3.s390x", "product": { "name": "dnsmasq-2.71-0.16.3.s390x", "product_id": "dnsmasq-2.71-0.16.3.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "dnsmasq-2.71-0.16.3.x86_64", "product": { "name": "dnsmasq-2.71-0.16.3.x86_64", "product_id": "dnsmasq-2.71-0.16.3.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP4", "product": { "name": "SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_sles:11:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:11:sp4" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-2.71-0.16.3.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.71-0.16.3.i586" }, "product_reference": "dnsmasq-2.71-0.16.3.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-2.71-0.16.3.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.71-0.16.3.ia64" }, "product_reference": "dnsmasq-2.71-0.16.3.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-2.71-0.16.3.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.71-0.16.3.ppc64" }, "product_reference": "dnsmasq-2.71-0.16.3.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-2.71-0.16.3.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.71-0.16.3.s390x" }, "product_reference": "dnsmasq-2.71-0.16.3.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-2.71-0.16.3.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.71-0.16.3.x86_64" }, "product_reference": "dnsmasq-2.71-0.16.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-2.71-0.16.3.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.71-0.16.3.i586" }, "product_reference": "dnsmasq-2.71-0.16.3.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-2.71-0.16.3.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.71-0.16.3.ia64" }, "product_reference": "dnsmasq-2.71-0.16.3.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-2.71-0.16.3.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.71-0.16.3.ppc64" }, "product_reference": "dnsmasq-2.71-0.16.3.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-2.71-0.16.3.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.71-0.16.3.s390x" }, "product_reference": "dnsmasq-2.71-0.16.3.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-2.71-0.16.3.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.71-0.16.3.x86_64" }, "product_reference": "dnsmasq-2.71-0.16.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-8899", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8899" } ], "notes": [ { "category": "general", "text": "Dnsmasq before 2.76 allows remote servers to cause a denial of service (crash) via a reply with an empty DNS address that has an (1) A or (2) AAAA record defined locally.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.71-0.16.3.i586", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.71-0.16.3.ia64", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.71-0.16.3.ppc64", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.71-0.16.3.s390x", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.71-0.16.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.71-0.16.3.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.71-0.16.3.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.71-0.16.3.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.71-0.16.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.71-0.16.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8899", "url": "https://www.suse.com/security/cve/CVE-2015-8899" }, { "category": "external", "summary": "SUSE Bug 983273 for CVE-2015-8899", "url": "https://bugzilla.suse.com/983273" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.71-0.16.3.i586", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.71-0.16.3.ia64", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.71-0.16.3.ppc64", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.71-0.16.3.s390x", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.71-0.16.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.71-0.16.3.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.71-0.16.3.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.71-0.16.3.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.71-0.16.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.71-0.16.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.71-0.16.3.i586", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.71-0.16.3.ia64", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.71-0.16.3.ppc64", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.71-0.16.3.s390x", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.71-0.16.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.71-0.16.3.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.71-0.16.3.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.71-0.16.3.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.71-0.16.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.71-0.16.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-12-20T12:18:38Z", "details": "moderate" } ], "title": "CVE-2015-8899" } ] }
suse-su-2016:3257-1
Vulnerability from csaf_suse
Published
2016-12-23 11:31
Modified
2016-12-23 11:31
Summary
Security update for dnsmasq
Notes
Title of the patch
Security update for dnsmasq
Description of the patch
This update for dnsmasq fixes the following issues:
- CVE-2015-8899: Denial of service between local and remote dns entries (bsc#983273)
Patchnames
SUSE-SLE12-CLOUD-5-2016-1906
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for dnsmasq", "title": "Title of the patch" }, { "category": "description", "text": "This update for dnsmasq fixes the following issues:\n\n- CVE-2015-8899: Denial of service between local and remote dns entries (bsc#983273)\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE12-CLOUD-5-2016-1906", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_3257-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2016:3257-1", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20163257-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2016:3257-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2016-December/002521.html" }, { "category": "self", "summary": "SUSE Bug 983273", "url": "https://bugzilla.suse.com/983273" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8899 page", "url": "https://www.suse.com/security/cve/CVE-2015-8899/" } ], "title": "Security update for dnsmasq", "tracking": { "current_release_date": "2016-12-23T11:31:23Z", "generator": { "date": "2016-12-23T11:31:23Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2016:3257-1", "initial_release_date": "2016-12-23T11:31:23Z", "revision_history": [ { "date": "2016-12-23T11:31:23Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "dnsmasq-utils-2.71-6.3.1.x86_64", "product": { "name": "dnsmasq-utils-2.71-6.3.1.x86_64", "product_id": "dnsmasq-utils-2.71-6.3.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Cloud Compute Node for SUSE Linux Enterprise 12 5", "product": { "name": "SUSE Cloud Compute Node for SUSE Linux Enterprise 12 5", "product_id": "SUSE Cloud Compute Node for SUSE Linux Enterprise 12 5", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-sle12-cloud-compute:5" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-2.71-6.3.1.x86_64 as component of SUSE Cloud Compute Node for SUSE Linux Enterprise 12 5", "product_id": "SUSE Cloud Compute Node for SUSE Linux Enterprise 12 5:dnsmasq-utils-2.71-6.3.1.x86_64" }, "product_reference": "dnsmasq-utils-2.71-6.3.1.x86_64", "relates_to_product_reference": "SUSE Cloud Compute Node for SUSE Linux Enterprise 12 5" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-8899", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8899" } ], "notes": [ { "category": "general", "text": "Dnsmasq before 2.76 allows remote servers to cause a denial of service (crash) via a reply with an empty DNS address that has an (1) A or (2) AAAA record defined locally.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Cloud Compute Node for SUSE Linux Enterprise 12 5:dnsmasq-utils-2.71-6.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8899", "url": "https://www.suse.com/security/cve/CVE-2015-8899" }, { "category": "external", "summary": "SUSE Bug 983273 for CVE-2015-8899", "url": "https://bugzilla.suse.com/983273" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Cloud Compute Node for SUSE Linux Enterprise 12 5:dnsmasq-utils-2.71-6.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Cloud Compute Node for SUSE Linux Enterprise 12 5:dnsmasq-utils-2.71-6.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-12-23T11:31:23Z", "details": "moderate" } ], "title": "CVE-2015-8899" } ] }
suse-su-2017:2617-1
Vulnerability from csaf_suse
Published
2017-10-02 13:53
Modified
2017-10-02 13:53
Summary
Security update for dnsmasq
Notes
Title of the patch
Security update for dnsmasq
Description of the patch
This update for dnsmasq fixes the following security issues:
- CVE-2017-14491: 2 byte heap based overflow. [bsc#1060354]
- CVE-2017-14492: heap based overflow. [bsc#1060355]
- CVE-2017-14493: stack based overflow. [bsc#1060360]
- CVE-2017-14494: DHCP - info leak. [bsc#1060361]
- CVE-2017-14495: DNS - OOM DoS. [bsc#1060362]
- CVE-2017-14496: DNS - DoS Integer underflow. [bsc#1060364]
This update brings a (small) potential incompatibility in the handling of
'basename' in --pxe-service. Please read the CHANGELOG and the documentation if
you are using this option.
Patchnames
sleposp3-dnsmasq-13296,slessp3-dnsmasq-13296
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for dnsmasq", "title": "Title of the patch" }, { "category": "description", "text": "This update for dnsmasq fixes the following security issues:\n\n- CVE-2017-14491: 2 byte heap based overflow. [bsc#1060354]\n- CVE-2017-14492: heap based overflow. [bsc#1060355]\n- CVE-2017-14493: stack based overflow. [bsc#1060360]\n- CVE-2017-14494: DHCP - info leak. [bsc#1060361]\n- CVE-2017-14495: DNS - OOM DoS. [bsc#1060362]\n- CVE-2017-14496: DNS - DoS Integer underflow. [bsc#1060364]\n\nThis update brings a (small) potential incompatibility in the handling of\n\u0027basename\u0027 in --pxe-service. Please read the CHANGELOG and the documentation if\nyou are using this option.\n", "title": "Description of the patch" }, { "category": "details", "text": "sleposp3-dnsmasq-13296,slessp3-dnsmasq-13296", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2017_2617-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2017:2617-1", "url": "https://www.suse.com/support/update/announcement/2017/suse-su-20172617-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2017:2617-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2017-October/003269.html" }, { "category": "self", "summary": "SUSE Bug 1060354", "url": "https://bugzilla.suse.com/1060354" }, { "category": "self", "summary": "SUSE Bug 1060355", "url": "https://bugzilla.suse.com/1060355" }, { "category": "self", "summary": "SUSE Bug 1060360", "url": "https://bugzilla.suse.com/1060360" }, { "category": "self", "summary": "SUSE Bug 1060361", "url": "https://bugzilla.suse.com/1060361" }, { "category": "self", "summary": "SUSE Bug 1060362", "url": "https://bugzilla.suse.com/1060362" }, { "category": "self", "summary": "SUSE Bug 1060364", "url": "https://bugzilla.suse.com/1060364" }, { "category": "self", "summary": "SUSE CVE CVE-2015-3294 page", "url": "https://www.suse.com/security/cve/CVE-2015-3294/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8899 page", "url": "https://www.suse.com/security/cve/CVE-2015-8899/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-14491 page", "url": "https://www.suse.com/security/cve/CVE-2017-14491/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-14492 page", "url": "https://www.suse.com/security/cve/CVE-2017-14492/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-14493 page", "url": "https://www.suse.com/security/cve/CVE-2017-14493/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-14494 page", "url": "https://www.suse.com/security/cve/CVE-2017-14494/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-14495 page", "url": "https://www.suse.com/security/cve/CVE-2017-14495/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-14496 page", "url": "https://www.suse.com/security/cve/CVE-2017-14496/" } ], "title": "Security update for dnsmasq", "tracking": { "current_release_date": "2017-10-02T13:53:56Z", "generator": { "date": "2017-10-02T13:53:56Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2017:2617-1", "initial_release_date": "2017-10-02T13:53:56Z", "revision_history": [ { "date": "2017-10-02T13:53:56Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "dnsmasq-2.78-0.16.5.1.i586", "product": { "name": "dnsmasq-2.78-0.16.5.1.i586", "product_id": "dnsmasq-2.78-0.16.5.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "dnsmasq-2.78-0.16.5.1.s390x", "product": { "name": "dnsmasq-2.78-0.16.5.1.s390x", "product_id": "dnsmasq-2.78-0.16.5.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "dnsmasq-2.78-0.16.5.1.x86_64", "product": { "name": "dnsmasq-2.78-0.16.5.1.x86_64", "product_id": "dnsmasq-2.78-0.16.5.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Point of Sale 11 SP3", "product": { "name": "SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-pos:11:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP3-LTSS", "product": { "name": "SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_sles_ltss:11:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP3-TERADATA", "product": { "name": "SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:11:sp3:teradata" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-2.78-0.16.5.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:dnsmasq-2.78-0.16.5.1.i586" }, "product_reference": "dnsmasq-2.78-0.16.5.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-2.78-0.16.5.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.i586" }, "product_reference": "dnsmasq-2.78-0.16.5.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-2.78-0.16.5.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.s390x" }, "product_reference": "dnsmasq-2.78-0.16.5.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-2.78-0.16.5.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.x86_64" }, "product_reference": "dnsmasq-2.78-0.16.5.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-2.78-0.16.5.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.i586" }, "product_reference": "dnsmasq-2.78-0.16.5.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-2.78-0.16.5.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.s390x" }, "product_reference": "dnsmasq-2.78-0.16.5.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-2.78-0.16.5.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.x86_64" }, "product_reference": "dnsmasq-2.78-0.16.5.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-3294", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-3294" } ], "notes": [ { "category": "general", "text": "The tcp_request function in Dnsmasq before 2.73rc4 does not properly handle the return value of the setup_reply function, which allows remote attackers to read process memory and cause a denial of service (out-of-bounds read and crash) via a malformed DNS request.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-3294", "url": "https://www.suse.com/security/cve/CVE-2015-3294" }, { "category": "external", "summary": "SUSE Bug 923144 for CVE-2015-3294", "url": "https://bugzilla.suse.com/923144" }, { "category": "external", "summary": "SUSE Bug 928867 for CVE-2015-3294", "url": "https://bugzilla.suse.com/928867" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-02T13:53:56Z", "details": "moderate" } ], "title": "CVE-2015-3294" }, { "cve": "CVE-2015-8899", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8899" } ], "notes": [ { "category": "general", "text": "Dnsmasq before 2.76 allows remote servers to cause a denial of service (crash) via a reply with an empty DNS address that has an (1) A or (2) AAAA record defined locally.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8899", "url": "https://www.suse.com/security/cve/CVE-2015-8899" }, { "category": "external", "summary": "SUSE Bug 983273 for CVE-2015-8899", "url": "https://bugzilla.suse.com/983273" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-02T13:53:56Z", "details": "moderate" } ], "title": "CVE-2015-8899" }, { "cve": "CVE-2017-14491", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-14491" } ], "notes": [ { "category": "general", "text": "Heap-based buffer overflow in dnsmasq before 2.78 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted DNS response.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-14491", "url": "https://www.suse.com/security/cve/CVE-2017-14491" }, { "category": "external", "summary": "SUSE Bug 1060354 for CVE-2017-14491", "url": "https://bugzilla.suse.com/1060354" }, { "category": "external", "summary": "SUSE Bug 1060360 for CVE-2017-14491", "url": "https://bugzilla.suse.com/1060360" }, { "category": "external", "summary": "SUSE Bug 1060361 for CVE-2017-14491", "url": "https://bugzilla.suse.com/1060361" }, { "category": "external", "summary": "SUSE Bug 1060362 for CVE-2017-14491", "url": "https://bugzilla.suse.com/1060362" }, { "category": "external", "summary": "SUSE Bug 1060364 for CVE-2017-14491", "url": "https://bugzilla.suse.com/1060364" }, { "category": "external", "summary": "SUSE Bug 1063832 for CVE-2017-14491", "url": "https://bugzilla.suse.com/1063832" }, { "category": "external", "summary": "SUSE Bug 1143944 for CVE-2017-14491", "url": "https://bugzilla.suse.com/1143944" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-02T13:53:56Z", "details": "moderate" } ], "title": "CVE-2017-14491" }, { "cve": "CVE-2017-14492", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-14492" } ], "notes": [ { "category": "general", "text": "Heap-based buffer overflow in dnsmasq before 2.78 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted IPv6 router advertisement request.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-14492", "url": "https://www.suse.com/security/cve/CVE-2017-14492" }, { "category": "external", "summary": "SUSE Bug 1060355 for CVE-2017-14492", "url": "https://bugzilla.suse.com/1060355" }, { "category": "external", "summary": "SUSE Bug 1060360 for CVE-2017-14492", "url": "https://bugzilla.suse.com/1060360" }, { "category": "external", "summary": "SUSE Bug 1060361 for CVE-2017-14492", "url": "https://bugzilla.suse.com/1060361" }, { "category": "external", "summary": "SUSE Bug 1060362 for CVE-2017-14492", "url": "https://bugzilla.suse.com/1060362" }, { "category": "external", "summary": "SUSE Bug 1060364 for CVE-2017-14492", "url": "https://bugzilla.suse.com/1060364" }, { "category": "external", "summary": "SUSE Bug 1063832 for CVE-2017-14492", "url": "https://bugzilla.suse.com/1063832" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-02T13:53:56Z", "details": "moderate" } ], "title": "CVE-2017-14492" }, { "cve": "CVE-2017-14493", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-14493" } ], "notes": [ { "category": "general", "text": "Stack-based buffer overflow in dnsmasq before 2.78 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted DHCPv6 request.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-14493", "url": "https://www.suse.com/security/cve/CVE-2017-14493" }, { "category": "external", "summary": "SUSE Bug 1060360 for CVE-2017-14493", "url": "https://bugzilla.suse.com/1060360" }, { "category": "external", "summary": "SUSE Bug 1060361 for CVE-2017-14493", "url": "https://bugzilla.suse.com/1060361" }, { "category": "external", "summary": "SUSE Bug 1060362 for CVE-2017-14493", "url": "https://bugzilla.suse.com/1060362" }, { "category": "external", "summary": "SUSE Bug 1060364 for CVE-2017-14493", "url": "https://bugzilla.suse.com/1060364" }, { "category": "external", "summary": "SUSE Bug 1063832 for CVE-2017-14493", "url": "https://bugzilla.suse.com/1063832" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-02T13:53:56Z", "details": "moderate" } ], "title": "CVE-2017-14493" }, { "cve": "CVE-2017-14494", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-14494" } ], "notes": [ { "category": "general", "text": "dnsmasq before 2.78, when configured as a relay, allows remote attackers to obtain sensitive memory information via vectors involving handling DHCPv6 forwarded requests.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-14494", "url": "https://www.suse.com/security/cve/CVE-2017-14494" }, { "category": "external", "summary": "SUSE Bug 1060360 for CVE-2017-14494", "url": "https://bugzilla.suse.com/1060360" }, { "category": "external", "summary": "SUSE Bug 1060361 for CVE-2017-14494", "url": "https://bugzilla.suse.com/1060361" }, { "category": "external", "summary": "SUSE Bug 1060362 for CVE-2017-14494", "url": "https://bugzilla.suse.com/1060362" }, { "category": "external", "summary": "SUSE Bug 1060364 for CVE-2017-14494", "url": "https://bugzilla.suse.com/1060364" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-02T13:53:56Z", "details": "moderate" } ], "title": "CVE-2017-14494" }, { "cve": "CVE-2017-14495", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-14495" } ], "notes": [ { "category": "general", "text": "Memory leak in dnsmasq before 2.78, when the --add-mac, --add-cpe-id or --add-subnet option is specified, allows remote attackers to cause a denial of service (memory consumption) via vectors involving DNS response creation.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-14495", "url": "https://www.suse.com/security/cve/CVE-2017-14495" }, { "category": "external", "summary": "SUSE Bug 1060360 for CVE-2017-14495", "url": "https://bugzilla.suse.com/1060360" }, { "category": "external", "summary": "SUSE Bug 1060361 for CVE-2017-14495", "url": "https://bugzilla.suse.com/1060361" }, { "category": "external", "summary": "SUSE Bug 1060362 for CVE-2017-14495", "url": "https://bugzilla.suse.com/1060362" }, { "category": "external", "summary": "SUSE Bug 1060364 for CVE-2017-14495", "url": "https://bugzilla.suse.com/1060364" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-02T13:53:56Z", "details": "important" } ], "title": "CVE-2017-14495" }, { "cve": "CVE-2017-14496", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-14496" } ], "notes": [ { "category": "general", "text": "Integer underflow in the add_pseudoheader function in dnsmasq before 2.78 , when the --add-mac, --add-cpe-id or --add-subnet option is specified, allows remote attackers to cause a denial of service via a crafted DNS request.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-14496", "url": "https://www.suse.com/security/cve/CVE-2017-14496" }, { "category": "external", "summary": "SUSE Bug 1060360 for CVE-2017-14496", "url": "https://bugzilla.suse.com/1060360" }, { "category": "external", "summary": "SUSE Bug 1060361 for CVE-2017-14496", "url": "https://bugzilla.suse.com/1060361" }, { "category": "external", "summary": "SUSE Bug 1060362 for CVE-2017-14496", "url": "https://bugzilla.suse.com/1060362" }, { "category": "external", "summary": "SUSE Bug 1060364 for CVE-2017-14496", "url": "https://bugzilla.suse.com/1060364" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-02T13:53:56Z", "details": "important" } ], "title": "CVE-2017-14496" } ] }
suse-su-2017:2619-1
Vulnerability from csaf_suse
Published
2017-10-02 13:51
Modified
2017-10-02 13:51
Summary
Security update for dnsmasq
Notes
Title of the patch
Security update for dnsmasq
Description of the patch
This update for dnsmasq fixes the following security issues:
- CVE-2017-14491: 2 byte heap based overflow. [bsc#1060354]
- CVE-2017-14492: heap based overflow. [bsc#1060355]
- CVE-2017-14493: stack based overflow. [bsc#1060360]
- CVE-2017-14494: DHCP - info leak. [bsc#1060361]
- CVE-2017-14495: DNS - OOM DoS. [bsc#1060362]
- CVE-2017-14496: DNS - DoS Integer underflow. [bsc#1060364]
This update brings a (small) potential incompatibility in the handling of
'basename' in --pxe-service. Please read the CHANGELOG and the documentation if
you are using this option.
Patchnames
slessp4-dnsmasq-13294
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for dnsmasq", "title": "Title of the patch" }, { "category": "description", "text": "This update for dnsmasq fixes the following security issues:\n\n- CVE-2017-14491: 2 byte heap based overflow. [bsc#1060354]\n- CVE-2017-14492: heap based overflow. [bsc#1060355]\n- CVE-2017-14493: stack based overflow. [bsc#1060360]\n- CVE-2017-14494: DHCP - info leak. [bsc#1060361]\n- CVE-2017-14495: DNS - OOM DoS. [bsc#1060362]\n- CVE-2017-14496: DNS - DoS Integer underflow. [bsc#1060364]\n\nThis update brings a (small) potential incompatibility in the handling of\n\u0027basename\u0027 in --pxe-service. Please read the CHANGELOG and the documentation if\nyou are using this option.\n", "title": "Description of the patch" }, { "category": "details", "text": "slessp4-dnsmasq-13294", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2017_2619-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2017:2619-1", "url": "https://www.suse.com/support/update/announcement/2017/suse-su-20172619-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2017:2619-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2017-October/003271.html" }, { "category": "self", "summary": "SUSE Bug 1060354", "url": "https://bugzilla.suse.com/1060354" }, { "category": "self", "summary": "SUSE Bug 1060355", "url": "https://bugzilla.suse.com/1060355" }, { "category": "self", "summary": "SUSE Bug 1060360", "url": "https://bugzilla.suse.com/1060360" }, { "category": "self", "summary": "SUSE Bug 1060361", "url": "https://bugzilla.suse.com/1060361" }, { "category": "self", "summary": "SUSE Bug 1060362", "url": "https://bugzilla.suse.com/1060362" }, { "category": "self", "summary": "SUSE Bug 1060364", "url": "https://bugzilla.suse.com/1060364" }, { "category": "self", "summary": "SUSE CVE CVE-2015-3294 page", "url": "https://www.suse.com/security/cve/CVE-2015-3294/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8899 page", "url": "https://www.suse.com/security/cve/CVE-2015-8899/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-14491 page", "url": "https://www.suse.com/security/cve/CVE-2017-14491/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-14492 page", "url": "https://www.suse.com/security/cve/CVE-2017-14492/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-14493 page", "url": "https://www.suse.com/security/cve/CVE-2017-14493/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-14494 page", "url": "https://www.suse.com/security/cve/CVE-2017-14494/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-14495 page", "url": "https://www.suse.com/security/cve/CVE-2017-14495/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-14496 page", "url": "https://www.suse.com/security/cve/CVE-2017-14496/" } ], "title": "Security update for dnsmasq", "tracking": { "current_release_date": "2017-10-02T13:51:46Z", "generator": { "date": "2017-10-02T13:51:46Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2017:2619-1", "initial_release_date": "2017-10-02T13:51:46Z", "revision_history": [ { "date": "2017-10-02T13:51:46Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "dnsmasq-2.78-0.17.5.1.i586", "product": { "name": "dnsmasq-2.78-0.17.5.1.i586", "product_id": "dnsmasq-2.78-0.17.5.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "dnsmasq-2.78-0.17.5.1.ia64", "product": { "name": "dnsmasq-2.78-0.17.5.1.ia64", "product_id": "dnsmasq-2.78-0.17.5.1.ia64" } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "dnsmasq-2.78-0.17.5.1.ppc64", "product": { "name": "dnsmasq-2.78-0.17.5.1.ppc64", "product_id": "dnsmasq-2.78-0.17.5.1.ppc64" } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "dnsmasq-2.78-0.17.5.1.s390x", "product": { "name": "dnsmasq-2.78-0.17.5.1.s390x", "product_id": "dnsmasq-2.78-0.17.5.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "dnsmasq-2.78-0.17.5.1.x86_64", "product": { "name": "dnsmasq-2.78-0.17.5.1.x86_64", "product_id": "dnsmasq-2.78-0.17.5.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP4", "product": { "name": "SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_sles:11:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:11:sp4" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-2.78-0.17.5.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.i586" }, "product_reference": "dnsmasq-2.78-0.17.5.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-2.78-0.17.5.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.ia64" }, "product_reference": "dnsmasq-2.78-0.17.5.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-2.78-0.17.5.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.ppc64" }, "product_reference": "dnsmasq-2.78-0.17.5.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-2.78-0.17.5.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.s390x" }, "product_reference": "dnsmasq-2.78-0.17.5.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-2.78-0.17.5.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.x86_64" }, "product_reference": "dnsmasq-2.78-0.17.5.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-2.78-0.17.5.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.i586" }, "product_reference": "dnsmasq-2.78-0.17.5.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-2.78-0.17.5.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.ia64" }, "product_reference": "dnsmasq-2.78-0.17.5.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-2.78-0.17.5.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.ppc64" }, "product_reference": "dnsmasq-2.78-0.17.5.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-2.78-0.17.5.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.s390x" }, "product_reference": "dnsmasq-2.78-0.17.5.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-2.78-0.17.5.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.x86_64" }, "product_reference": "dnsmasq-2.78-0.17.5.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-3294", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-3294" } ], "notes": [ { "category": "general", "text": "The tcp_request function in Dnsmasq before 2.73rc4 does not properly handle the return value of the setup_reply function, which allows remote attackers to read process memory and cause a denial of service (out-of-bounds read and crash) via a malformed DNS request.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.i586", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.ia64", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.s390x", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-3294", "url": "https://www.suse.com/security/cve/CVE-2015-3294" }, { "category": "external", "summary": "SUSE Bug 923144 for CVE-2015-3294", "url": "https://bugzilla.suse.com/923144" }, { "category": "external", "summary": "SUSE Bug 928867 for CVE-2015-3294", "url": "https://bugzilla.suse.com/928867" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.i586", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.ia64", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.s390x", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-02T13:51:46Z", "details": "moderate" } ], "title": "CVE-2015-3294" }, { "cve": "CVE-2015-8899", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8899" } ], "notes": [ { "category": "general", "text": "Dnsmasq before 2.76 allows remote servers to cause a denial of service (crash) via a reply with an empty DNS address that has an (1) A or (2) AAAA record defined locally.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.i586", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.ia64", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.s390x", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8899", "url": "https://www.suse.com/security/cve/CVE-2015-8899" }, { "category": "external", "summary": "SUSE Bug 983273 for CVE-2015-8899", "url": "https://bugzilla.suse.com/983273" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.i586", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.ia64", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.s390x", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.i586", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.ia64", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.s390x", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-02T13:51:46Z", "details": "moderate" } ], "title": "CVE-2015-8899" }, { "cve": "CVE-2017-14491", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-14491" } ], "notes": [ { "category": "general", "text": "Heap-based buffer overflow in dnsmasq before 2.78 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted DNS response.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.i586", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.ia64", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.s390x", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-14491", "url": "https://www.suse.com/security/cve/CVE-2017-14491" }, { "category": "external", "summary": "SUSE Bug 1060354 for CVE-2017-14491", "url": "https://bugzilla.suse.com/1060354" }, { "category": "external", "summary": "SUSE Bug 1060360 for CVE-2017-14491", "url": "https://bugzilla.suse.com/1060360" }, { "category": "external", "summary": "SUSE Bug 1060361 for CVE-2017-14491", "url": "https://bugzilla.suse.com/1060361" }, { "category": "external", "summary": "SUSE Bug 1060362 for CVE-2017-14491", "url": "https://bugzilla.suse.com/1060362" }, { "category": "external", "summary": "SUSE Bug 1060364 for CVE-2017-14491", "url": "https://bugzilla.suse.com/1060364" }, { "category": "external", "summary": "SUSE Bug 1063832 for CVE-2017-14491", "url": "https://bugzilla.suse.com/1063832" }, { "category": "external", "summary": "SUSE Bug 1143944 for CVE-2017-14491", "url": "https://bugzilla.suse.com/1143944" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.i586", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.ia64", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.s390x", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.i586", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.ia64", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.s390x", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-02T13:51:46Z", "details": "moderate" } ], "title": "CVE-2017-14491" }, { "cve": "CVE-2017-14492", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-14492" } ], "notes": [ { "category": "general", "text": "Heap-based buffer overflow in dnsmasq before 2.78 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted IPv6 router advertisement request.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.i586", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.ia64", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.s390x", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-14492", "url": "https://www.suse.com/security/cve/CVE-2017-14492" }, { "category": "external", "summary": "SUSE Bug 1060355 for CVE-2017-14492", "url": "https://bugzilla.suse.com/1060355" }, { "category": "external", "summary": "SUSE Bug 1060360 for CVE-2017-14492", "url": "https://bugzilla.suse.com/1060360" }, { "category": "external", "summary": "SUSE Bug 1060361 for CVE-2017-14492", "url": "https://bugzilla.suse.com/1060361" }, { "category": "external", "summary": "SUSE Bug 1060362 for CVE-2017-14492", "url": "https://bugzilla.suse.com/1060362" }, { "category": "external", "summary": "SUSE Bug 1060364 for CVE-2017-14492", "url": "https://bugzilla.suse.com/1060364" }, { "category": "external", "summary": "SUSE Bug 1063832 for CVE-2017-14492", "url": "https://bugzilla.suse.com/1063832" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.i586", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.ia64", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.s390x", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.i586", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.ia64", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.s390x", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-02T13:51:46Z", "details": "moderate" } ], "title": "CVE-2017-14492" }, { "cve": "CVE-2017-14493", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-14493" } ], "notes": [ { "category": "general", "text": "Stack-based buffer overflow in dnsmasq before 2.78 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted DHCPv6 request.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.i586", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.ia64", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.s390x", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-14493", "url": "https://www.suse.com/security/cve/CVE-2017-14493" }, { "category": "external", "summary": "SUSE Bug 1060360 for CVE-2017-14493", "url": "https://bugzilla.suse.com/1060360" }, { "category": "external", "summary": "SUSE Bug 1060361 for CVE-2017-14493", "url": "https://bugzilla.suse.com/1060361" }, { "category": "external", "summary": "SUSE Bug 1060362 for CVE-2017-14493", "url": "https://bugzilla.suse.com/1060362" }, { "category": "external", "summary": "SUSE Bug 1060364 for CVE-2017-14493", "url": "https://bugzilla.suse.com/1060364" }, { "category": "external", "summary": "SUSE Bug 1063832 for CVE-2017-14493", "url": "https://bugzilla.suse.com/1063832" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.i586", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.ia64", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.s390x", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.i586", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.ia64", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.s390x", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-02T13:51:46Z", "details": "moderate" } ], "title": "CVE-2017-14493" }, { "cve": "CVE-2017-14494", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-14494" } ], "notes": [ { "category": "general", "text": "dnsmasq before 2.78, when configured as a relay, allows remote attackers to obtain sensitive memory information via vectors involving handling DHCPv6 forwarded requests.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.i586", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.ia64", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.s390x", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-14494", "url": "https://www.suse.com/security/cve/CVE-2017-14494" }, { "category": "external", "summary": "SUSE Bug 1060360 for CVE-2017-14494", "url": "https://bugzilla.suse.com/1060360" }, { "category": "external", "summary": "SUSE Bug 1060361 for CVE-2017-14494", "url": "https://bugzilla.suse.com/1060361" }, { "category": "external", "summary": "SUSE Bug 1060362 for CVE-2017-14494", "url": "https://bugzilla.suse.com/1060362" }, { "category": "external", "summary": "SUSE Bug 1060364 for CVE-2017-14494", "url": "https://bugzilla.suse.com/1060364" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.i586", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.ia64", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.s390x", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.i586", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.ia64", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.s390x", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-02T13:51:46Z", "details": "moderate" } ], "title": "CVE-2017-14494" }, { "cve": "CVE-2017-14495", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-14495" } ], "notes": [ { "category": "general", "text": "Memory leak in dnsmasq before 2.78, when the --add-mac, --add-cpe-id or --add-subnet option is specified, allows remote attackers to cause a denial of service (memory consumption) via vectors involving DNS response creation.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.i586", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.ia64", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.s390x", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-14495", "url": "https://www.suse.com/security/cve/CVE-2017-14495" }, { "category": "external", "summary": "SUSE Bug 1060360 for CVE-2017-14495", "url": "https://bugzilla.suse.com/1060360" }, { "category": "external", "summary": "SUSE Bug 1060361 for CVE-2017-14495", "url": "https://bugzilla.suse.com/1060361" }, { "category": "external", "summary": "SUSE Bug 1060362 for CVE-2017-14495", "url": "https://bugzilla.suse.com/1060362" }, { "category": "external", "summary": "SUSE Bug 1060364 for CVE-2017-14495", "url": "https://bugzilla.suse.com/1060364" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.i586", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.ia64", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.s390x", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.i586", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.ia64", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.s390x", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-02T13:51:46Z", "details": "important" } ], "title": "CVE-2017-14495" }, { "cve": "CVE-2017-14496", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-14496" } ], "notes": [ { "category": "general", "text": "Integer underflow in the add_pseudoheader function in dnsmasq before 2.78 , when the --add-mac, --add-cpe-id or --add-subnet option is specified, allows remote attackers to cause a denial of service via a crafted DNS request.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.i586", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.ia64", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.s390x", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-14496", "url": "https://www.suse.com/security/cve/CVE-2017-14496" }, { "category": "external", "summary": "SUSE Bug 1060360 for CVE-2017-14496", "url": "https://bugzilla.suse.com/1060360" }, { "category": "external", "summary": "SUSE Bug 1060361 for CVE-2017-14496", "url": "https://bugzilla.suse.com/1060361" }, { "category": "external", "summary": "SUSE Bug 1060362 for CVE-2017-14496", "url": "https://bugzilla.suse.com/1060362" }, { "category": "external", "summary": "SUSE Bug 1060364 for CVE-2017-14496", "url": "https://bugzilla.suse.com/1060364" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.i586", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.ia64", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.s390x", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.i586", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.ia64", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.s390x", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-02T13:51:46Z", "details": "important" } ], "title": "CVE-2017-14496" } ] }
ghsa-f299-rcx3-c9vw
Vulnerability from github
Published
2022-05-17 03:43
Modified
2025-04-12 13:01
Severity ?
VLAI Severity ?
Details
Dnsmasq before 2.76 allows remote servers to cause a denial of service (crash) via a reply with an empty DNS address that has an (1) A or (2) AAAA record defined locally.
{ "affected": [], "aliases": [ "CVE-2015-8899" ], "database_specific": { "cwe_ids": [ "CWE-20" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2016-06-30T17:59:00Z", "severity": "HIGH" }, "details": "Dnsmasq before 2.76 allows remote servers to cause a denial of service (crash) via a reply with an empty DNS address that has an (1) A or (2) AAAA record defined locally.", "id": "GHSA-f299-rcx3-c9vw", "modified": "2025-04-12T13:01:32Z", "published": "2022-05-17T03:43:41Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8899" }, { "type": "WEB", "url": "http://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2016q2/010479.html" }, { "type": "WEB", "url": "http://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2016q2/010505.html" }, { "type": "WEB", "url": "http://thekelleys.org.uk/gitweb/?p=dnsmasq.git%3Ba=commit%3Bh=41a8d9e99be9f2cc8b02051dd322cb45e0faac87" }, { "type": "WEB", "url": "http://thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=commit;h=41a8d9e99be9f2cc8b02051dd322cb45e0faac87" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2016/06/03/7" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2016/06/04/2" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/91031" }, { "type": "WEB", "url": "http://www.securitytracker.com/id/1036045" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/USN-3009-1" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ] }
gsd-2015-8899
Vulnerability from gsd
Modified
2023-12-13 01:20
Details
Dnsmasq before 2.76 allows remote servers to cause a denial of service (crash) via a reply with an empty DNS address that has an (1) A or (2) AAAA record defined locally.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2015-8899", "description": "Dnsmasq before 2.76 allows remote servers to cause a denial of service (crash) via a reply with an empty DNS address that has an (1) A or (2) AAAA record defined locally.", "id": "GSD-2015-8899", "references": [ "https://www.suse.com/security/cve/CVE-2015-8899.html", "https://ubuntu.com/security/CVE-2015-8899" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2015-8899" ], "details": "Dnsmasq before 2.76 allows remote servers to cause a denial of service (crash) via a reply with an empty DNS address that has an (1) A or (2) AAAA record defined locally.", "id": "GSD-2015-8899", "modified": "2023-12-13T01:20:03.751827Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "security@ubuntu.com", "ID": "CVE-2015-8899", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Dnsmasq before 2.76 allows remote servers to cause a denial of service (crash) via a reply with an empty DNS address that has an (1) A or (2) AAAA record defined locally." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "91031", "refsource": "BID", "url": "http://www.securityfocus.com/bid/91031" }, { "name": "[Dnsmasq-discuss] 20160418 Dnsmasq 2.75 on Ubuntu 16.04 crashes reproducibly", "refsource": "MLIST", "url": "http://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2016q2/010479.html" }, { "name": "USN-3009-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-3009-1" }, { "name": "[Dnsmasq-discuss] 20160503 Dnsmasq 2.75 on Ubuntu 16.04 crashes reproducibly", "refsource": "MLIST", "url": "http://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2016q2/010505.html" }, { "name": "[oss-security] 20160603 Re: CVE Request: Dnsmasq denial of service", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2016/06/04/2" }, { "name": "1036045", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1036045" }, { "name": "http://thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=commit;h=41a8d9e99be9f2cc8b02051dd322cb45e0faac87", "refsource": "CONFIRM", "url": "http://thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=commit;h=41a8d9e99be9f2cc8b02051dd322cb45e0faac87" }, { "name": "[oss-security] 20160603 CVE Request: Dnsmasq denial of service", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2016/06/03/7" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:thekelleys:dnsmasq:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.75", "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "security@ubuntu.com", "ID": "CVE-2015-8899" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "Dnsmasq before 2.76 allows remote servers to cause a denial of service (crash) via a reply with an empty DNS address that has an (1) A or (2) AAAA record defined locally." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-20" } ] } ] }, "references": { "reference_data": [ { "name": "[oss-security] 20160603 Re: CVE Request: Dnsmasq denial of service", "refsource": "MLIST", "tags": [], "url": "http://www.openwall.com/lists/oss-security/2016/06/04/2" }, { "name": "[oss-security] 20160603 CVE Request: Dnsmasq denial of service", "refsource": "MLIST", "tags": [], "url": "http://www.openwall.com/lists/oss-security/2016/06/03/7" }, { "name": "USN-3009-1", "refsource": "UBUNTU", "tags": [], "url": "http://www.ubuntu.com/usn/USN-3009-1" }, { "name": "http://thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=commit;h=41a8d9e99be9f2cc8b02051dd322cb45e0faac87", "refsource": "CONFIRM", "tags": [], "url": "http://thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=commit;h=41a8d9e99be9f2cc8b02051dd322cb45e0faac87" }, { "name": "[Dnsmasq-discuss] 20160503 Dnsmasq 2.75 on Ubuntu 16.04 crashes reproducibly", "refsource": "MLIST", "tags": [], "url": "http://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2016q2/010505.html" }, { "name": "[Dnsmasq-discuss] 20160418 Dnsmasq 2.75 on Ubuntu 16.04 crashes reproducibly", "refsource": "MLIST", "tags": [], "url": "http://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2016q2/010479.html" }, { "name": "1036045", "refsource": "SECTRACK", "tags": [], "url": "http://www.securitytracker.com/id/1036045" }, { "name": "91031", "refsource": "BID", "tags": [], "url": "http://www.securityfocus.com/bid/91031" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.6 } }, "lastModifiedDate": "2016-11-28T19:50Z", "publishedDate": "2016-06-30T17:59Z" } } }
opensuse-su-2024:10195-1
Vulnerability from csaf_opensuse
Published
2024-06-15 00:00
Modified
2024-06-15 00:00
Summary
dnsmasq-2.76-1.3 on GA media
Notes
Title of the patch
dnsmasq-2.76-1.3 on GA media
Description of the patch
These are all security issues fixed in the dnsmasq-2.76-1.3 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2024-10195
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "dnsmasq-2.76-1.3 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the dnsmasq-2.76-1.3 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2024-10195", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10195-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2015-3294 page", "url": "https://www.suse.com/security/cve/CVE-2015-3294/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8899 page", "url": "https://www.suse.com/security/cve/CVE-2015-8899/" } ], "title": "dnsmasq-2.76-1.3 on GA media", "tracking": { "current_release_date": "2024-06-15T00:00:00Z", "generator": { "date": "2024-06-15T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2024:10195-1", "initial_release_date": "2024-06-15T00:00:00Z", "revision_history": [ { "date": "2024-06-15T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "dnsmasq-2.76-1.3.aarch64", "product": { "name": "dnsmasq-2.76-1.3.aarch64", "product_id": "dnsmasq-2.76-1.3.aarch64" } }, { "category": "product_version", "name": "dnsmasq-utils-2.76-1.3.aarch64", "product": { "name": "dnsmasq-utils-2.76-1.3.aarch64", "product_id": "dnsmasq-utils-2.76-1.3.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "dnsmasq-2.76-1.3.ppc64le", "product": { "name": "dnsmasq-2.76-1.3.ppc64le", "product_id": "dnsmasq-2.76-1.3.ppc64le" } }, { "category": "product_version", "name": "dnsmasq-utils-2.76-1.3.ppc64le", "product": { "name": "dnsmasq-utils-2.76-1.3.ppc64le", "product_id": "dnsmasq-utils-2.76-1.3.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "dnsmasq-2.76-1.3.s390x", "product": { "name": "dnsmasq-2.76-1.3.s390x", "product_id": "dnsmasq-2.76-1.3.s390x" } }, { "category": "product_version", "name": "dnsmasq-utils-2.76-1.3.s390x", "product": { "name": "dnsmasq-utils-2.76-1.3.s390x", "product_id": "dnsmasq-utils-2.76-1.3.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "dnsmasq-2.76-1.3.x86_64", "product": { "name": "dnsmasq-2.76-1.3.x86_64", "product_id": "dnsmasq-2.76-1.3.x86_64" } }, { "category": "product_version", "name": "dnsmasq-utils-2.76-1.3.x86_64", "product": { "name": "dnsmasq-utils-2.76-1.3.x86_64", "product_id": "dnsmasq-utils-2.76-1.3.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-2.76-1.3.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:dnsmasq-2.76-1.3.aarch64" }, "product_reference": "dnsmasq-2.76-1.3.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-2.76-1.3.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:dnsmasq-2.76-1.3.ppc64le" }, "product_reference": "dnsmasq-2.76-1.3.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-2.76-1.3.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:dnsmasq-2.76-1.3.s390x" }, "product_reference": "dnsmasq-2.76-1.3.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-2.76-1.3.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:dnsmasq-2.76-1.3.x86_64" }, "product_reference": "dnsmasq-2.76-1.3.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-2.76-1.3.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:dnsmasq-utils-2.76-1.3.aarch64" }, "product_reference": "dnsmasq-utils-2.76-1.3.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-2.76-1.3.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:dnsmasq-utils-2.76-1.3.ppc64le" }, "product_reference": "dnsmasq-utils-2.76-1.3.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-2.76-1.3.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:dnsmasq-utils-2.76-1.3.s390x" }, "product_reference": "dnsmasq-utils-2.76-1.3.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-2.76-1.3.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:dnsmasq-utils-2.76-1.3.x86_64" }, "product_reference": "dnsmasq-utils-2.76-1.3.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-3294", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-3294" } ], "notes": [ { "category": "general", "text": "The tcp_request function in Dnsmasq before 2.73rc4 does not properly handle the return value of the setup_reply function, which allows remote attackers to read process memory and cause a denial of service (out-of-bounds read and crash) via a malformed DNS request.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:dnsmasq-2.76-1.3.aarch64", "openSUSE Tumbleweed:dnsmasq-2.76-1.3.ppc64le", "openSUSE Tumbleweed:dnsmasq-2.76-1.3.s390x", "openSUSE Tumbleweed:dnsmasq-2.76-1.3.x86_64", "openSUSE Tumbleweed:dnsmasq-utils-2.76-1.3.aarch64", "openSUSE Tumbleweed:dnsmasq-utils-2.76-1.3.ppc64le", "openSUSE Tumbleweed:dnsmasq-utils-2.76-1.3.s390x", "openSUSE Tumbleweed:dnsmasq-utils-2.76-1.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-3294", "url": "https://www.suse.com/security/cve/CVE-2015-3294" }, { "category": "external", "summary": "SUSE Bug 923144 for CVE-2015-3294", "url": "https://bugzilla.suse.com/923144" }, { "category": "external", "summary": "SUSE Bug 928867 for CVE-2015-3294", "url": "https://bugzilla.suse.com/928867" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:dnsmasq-2.76-1.3.aarch64", "openSUSE Tumbleweed:dnsmasq-2.76-1.3.ppc64le", "openSUSE Tumbleweed:dnsmasq-2.76-1.3.s390x", "openSUSE Tumbleweed:dnsmasq-2.76-1.3.x86_64", "openSUSE Tumbleweed:dnsmasq-utils-2.76-1.3.aarch64", "openSUSE Tumbleweed:dnsmasq-utils-2.76-1.3.ppc64le", "openSUSE Tumbleweed:dnsmasq-utils-2.76-1.3.s390x", "openSUSE Tumbleweed:dnsmasq-utils-2.76-1.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2015-3294" }, { "cve": "CVE-2015-8899", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8899" } ], "notes": [ { "category": "general", "text": "Dnsmasq before 2.76 allows remote servers to cause a denial of service (crash) via a reply with an empty DNS address that has an (1) A or (2) AAAA record defined locally.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:dnsmasq-2.76-1.3.aarch64", "openSUSE Tumbleweed:dnsmasq-2.76-1.3.ppc64le", "openSUSE Tumbleweed:dnsmasq-2.76-1.3.s390x", "openSUSE Tumbleweed:dnsmasq-2.76-1.3.x86_64", "openSUSE Tumbleweed:dnsmasq-utils-2.76-1.3.aarch64", "openSUSE Tumbleweed:dnsmasq-utils-2.76-1.3.ppc64le", "openSUSE Tumbleweed:dnsmasq-utils-2.76-1.3.s390x", "openSUSE Tumbleweed:dnsmasq-utils-2.76-1.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8899", "url": "https://www.suse.com/security/cve/CVE-2015-8899" }, { "category": "external", "summary": "SUSE Bug 983273 for CVE-2015-8899", "url": "https://bugzilla.suse.com/983273" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:dnsmasq-2.76-1.3.aarch64", "openSUSE Tumbleweed:dnsmasq-2.76-1.3.ppc64le", "openSUSE Tumbleweed:dnsmasq-2.76-1.3.s390x", "openSUSE Tumbleweed:dnsmasq-2.76-1.3.x86_64", "openSUSE Tumbleweed:dnsmasq-utils-2.76-1.3.aarch64", "openSUSE Tumbleweed:dnsmasq-utils-2.76-1.3.ppc64le", "openSUSE Tumbleweed:dnsmasq-utils-2.76-1.3.s390x", "openSUSE Tumbleweed:dnsmasq-utils-2.76-1.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:dnsmasq-2.76-1.3.aarch64", "openSUSE Tumbleweed:dnsmasq-2.76-1.3.ppc64le", "openSUSE Tumbleweed:dnsmasq-2.76-1.3.s390x", "openSUSE Tumbleweed:dnsmasq-2.76-1.3.x86_64", "openSUSE Tumbleweed:dnsmasq-utils-2.76-1.3.aarch64", "openSUSE Tumbleweed:dnsmasq-utils-2.76-1.3.ppc64le", "openSUSE Tumbleweed:dnsmasq-utils-2.76-1.3.s390x", "openSUSE Tumbleweed:dnsmasq-utils-2.76-1.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2015-8899" } ] }
fkie_cve-2015-8899
Vulnerability from fkie_nvd
Published
2016-06-30 17:59
Modified
2025-04-12 10:46
Severity ?
Summary
Dnsmasq before 2.76 allows remote servers to cause a denial of service (crash) via a reply with an empty DNS address that has an (1) A or (2) AAAA record defined locally.
References
▶ | URL | Tags | |
---|---|---|---|
security@ubuntu.com | http://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2016q2/010479.html | ||
security@ubuntu.com | http://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2016q2/010505.html | ||
security@ubuntu.com | http://thekelleys.org.uk/gitweb/?p=dnsmasq.git%3Ba=commit%3Bh=41a8d9e99be9f2cc8b02051dd322cb45e0faac87 | ||
security@ubuntu.com | http://www.openwall.com/lists/oss-security/2016/06/03/7 | ||
security@ubuntu.com | http://www.openwall.com/lists/oss-security/2016/06/04/2 | ||
security@ubuntu.com | http://www.securityfocus.com/bid/91031 | ||
security@ubuntu.com | http://www.securitytracker.com/id/1036045 | ||
security@ubuntu.com | http://www.ubuntu.com/usn/USN-3009-1 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2016q2/010479.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2016q2/010505.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://thekelleys.org.uk/gitweb/?p=dnsmasq.git%3Ba=commit%3Bh=41a8d9e99be9f2cc8b02051dd322cb45e0faac87 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2016/06/03/7 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2016/06/04/2 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/91031 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1036045 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/USN-3009-1 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
canonical | ubuntu_linux | 15.10 | |
canonical | ubuntu_linux | 16.04 | |
thekelleys | dnsmasq | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*", "matchCriteriaId": "E88A537F-F4D0-46B9-9E37-965233C2A355", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "matchCriteriaId": "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:thekelleys:dnsmasq:*:*:*:*:*:*:*:*", "matchCriteriaId": "B705C85C-B580-43B5-AAAA-CBA10885BB22", "versionEndIncluding": "2.75", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Dnsmasq before 2.76 allows remote servers to cause a denial of service (crash) via a reply with an empty DNS address that has an (1) A or (2) AAAA record defined locally." }, { "lang": "es", "value": "Dnsmasq en versiones anteriores a 2.76 permite a servidores remotos provocar una denegaci\u00f3n de servicio (ca\u00edda) a trav\u00e9s de una respuesta con una direcci\u00f3n DNS vac\u00eda que tiene una grabaci\u00f3n (1) A o (2) AAAA definida localmente." } ], "id": "CVE-2015-8899", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2016-06-30T17:59:00.157", "references": [ { "source": "security@ubuntu.com", "url": "http://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2016q2/010479.html" }, { "source": "security@ubuntu.com", "url": "http://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2016q2/010505.html" }, { "source": "security@ubuntu.com", "url": "http://thekelleys.org.uk/gitweb/?p=dnsmasq.git%3Ba=commit%3Bh=41a8d9e99be9f2cc8b02051dd322cb45e0faac87" }, { "source": "security@ubuntu.com", "url": "http://www.openwall.com/lists/oss-security/2016/06/03/7" }, { "source": "security@ubuntu.com", "url": "http://www.openwall.com/lists/oss-security/2016/06/04/2" }, { "source": "security@ubuntu.com", "url": "http://www.securityfocus.com/bid/91031" }, { "source": "security@ubuntu.com", "url": "http://www.securitytracker.com/id/1036045" }, { "source": "security@ubuntu.com", "url": "http://www.ubuntu.com/usn/USN-3009-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2016q2/010479.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2016q2/010505.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://thekelleys.org.uk/gitweb/?p=dnsmasq.git%3Ba=commit%3Bh=41a8d9e99be9f2cc8b02051dd322cb45e0faac87" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2016/06/03/7" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2016/06/04/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/91031" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1036045" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-3009-1" } ], "sourceIdentifier": "security@ubuntu.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…