Mehrere Probleme in Dnsmasq (Aktualisierung)
ID: | USN-3430-3 |
Distribution: | Ubuntu |
Plattformen: | Ubuntu 12.04 ESM |
Datum: | Fr, 5. Januar 2018, 08:49 |
Referenzen: | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14492
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14494 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14496 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14495 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14491 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14493 |
Applikationen: | Dnsmasq |
Update von: | Mehrere Probleme in Dnsmasq |
Originalnachricht |
|
--===============6012771826261384140== Content-Type: multipart/signed; micalg="pgp-sha256"; protocol="application/pgp-signature"; boundary="=-UBJEfflvb47q45uA/F6w" --=-UBJEfflvb47q45uA/F6w Content-Type: text/plain; charset="UTF-8 Content-Transfer-Encoding: quoted-printable ========================================================================== Ubuntu Security Notice USN-3430-3 January 04, 2018 dnsmasq regression ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 12.04 ESM Summary: USN-3430-2 introduced regression in Dnsmasq. Software Description: - dnsmasq: Small caching DNS proxy and DHCP/TFTP server Details: USN-3430-2 fixed several vulnerabilities. The update introduced a new regression that breaks DNS resolution. This update addresses the problem. We apologize for the inconvenience. Original advisory details: Felix Wilhelm, Fermin J. Serna, Gabriel Campana and Kevin Hamacher discovered that Dnsmasq incorrectly handled DNS requests. A remote attacker could use this issue to cause Dnsmasq to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2017-14491) Felix Wilhelm, Fermin J. Serna, Gabriel Campana and Kevin Hamacher discovered that Dnsmasq incorrectly handled IPv6 router advertisements. A remote attacker could use this issue to cause Dnsmasq to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2017-14492) Felix Wilhelm, Fermin J. Serna, Gabriel Campana and Kevin Hamacher discovered that Dnsmasq incorrectly handled DHCPv6 requests. A remote attacker could use this issue to cause Dnsmasq to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2017-14493) Felix Wilhelm, Fermin J. Serna, Gabriel Campana and Kevin Hamacher discovered that Dnsmasq incorrectly handled DHCPv6 packets. A remote attacker could use this issue to possibly obtain sensitive memory contents. (CVE-2017-14494) Felix Wilhelm, Fermin J. Serna, Gabriel Campana and Kevin Hamacher discovered that Dnsmasq incorrectly handled DNS requests. A remote attacker could use this issue to cause Dnsmasq to consume memory, resulting in a denial of service. (CVE-2017-14495) Felix Wilhelm, Fermin J. Serna, Gabriel Campana and Kevin Hamacher discovered that Dnsmasq incorrectly handled DNS requests. A remote attacker could use this issue to cause Dnsmasq to crash, resulting in a denial of service. (CVE-2017-14496) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 12.04 ESM: dnsmasq 2.59-4ubuntu0.4 dnsmasq-base 2.59-4ubuntu0.4 dnsmasq-utils 2.59-4ubuntu0.4 After a standard system update you need to reboot your computer to make all the necessary changes. References: https://www.ubuntu.com/usn/usn-3430-3 https://www.ubuntu.com/usn/usn-3430-1 https://launchpad.net/bugs/1741262 --=-UBJEfflvb47q45uA/F6w Content-Type: application/pgp-signature; name="signature.asc" Content-Description: This is a digitally signed message part Content-Transfer-Encoding: 7bit -----BEGIN PGP SIGNATURE----- Version: GnuPG v2 iQIcBAABCAAGBQJaTjWZAAoJEEW851uECx9p5jAP/jU78ZxzfDzsRAJzjwYG8myM aKoOs30+Lj1qnipx71LiB2GjDd631mfNAX9LyzgeETYwyREPQ4mJf4doe39EF/rg RdoW7DUZdv1hLkcvvCOucXthNtwnRGwRIR8byTAPhXshjF9ISmlLMRkBcll9iBr6 jTeiT8yh5+6S7QEVM6rRRh4bDbgNSjICb6C3hy4ZwIrRRw4XKkcm0llPG1WqGczr 9L/OgbGsAovwCEqIhss+NCTfq5pGFrE3zvJxle11T+4+xyKvhicW9GKRfb6LWJnJ X8CAp7xCS6vDoQKc/lrusMJfVrBrp44U6gPplufO6kXNFxEQE2a6GZoh2yoHLSm5 2Mb7MeBfPpOqcUnXUuiXXeSh92BG8mBgB+jYd/Qmc3ja5zxgiqDrj1N3ITVXKsG+ z8iMgZv2JYH+LOeEVt7gAxclzkimGg3xv3bDeKYelUCDJ5L5LFEUSOS8KQayjT63 RTdw+w6dMNScLW5JpJsP2bDanDvvrbFgJayWxkq8bTKGbh/5azc9xlGV28ru3Io2 KnaqzP1P/3KNSEPCv5RboBZwYHrqVDwa7Vn8xNpQ+hty+Y6DTRT7SZUG9uUqmrH+ 8j6ycoWUUnl0/SaE3VNiv0e6hARSlbYSSz5wJo3wYVwcf6Cv+5ZHDASeVUjr7SCG /LU/s41svQOTYXZF6H2K =cXbj -----END PGP SIGNATURE----- --=-UBJEfflvb47q45uA/F6w-- --===============6012771826261384140== Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: base64 Content-Disposition: inline LS0gCnVidW50dS1zZWN1cml0eS1hbm5vdW5jZSBtYWlsaW5nIGxpc3QKdWJ1bnR1LXNlY3VyaXR5 LWFubm91bmNlQGxpc3RzLnVidW50dS5jb20KTW9kaWZ5IHNldHRpbmdzIG9yIHVuc3Vic2NyaWJl IGF0OiBodHRwczovL2xpc3RzLnVidW50dS5jb20vbWFpbG1hbi9saXN0aW5mby91YnVudHUtc2Vj dXJpdHktYW5ub3VuY2UK --===============6012771826261384140==-- |