Mehrere Probleme in Dnsmasq
ID: | FEDORA-2017-24f067299e |
Distribution: | Fedora |
Plattformen: | Fedora 26 |
Datum: | Sa, 7. Oktober 2017, 00:23 |
Referenzen: | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14494
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14491 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14495 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14496 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14493 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14492 |
Applikationen: | Dnsmasq |
Originalnachricht |
|
-------------------------------------------------------------------------------- Fedora Update Notification FEDORA-2017-24f067299e 2017-10-06 13:44:21.530944 -------------------------------------------------------------------------------- Name : dnsmasq Product : Fedora 26 Version : 2.76 Release : 5.fc26 URL : http://www.thekelleys.org.uk/dnsmasq/ Summary : A lightweight DHCP/caching DNS server Description : Dnsmasq is lightweight, easy to configure DNS forwarder and DHCP server. It is designed to provide DNS and, optionally, DHCP, to a small network. It can serve the names of local machines which are not in the global DNS. The DHCP server integrates with the DNS server and allows machines with DHCP-allocated addresses to appear in the DNS with names configured either in each host or in a central configuration file. Dnsmasq supports static and dynamic DHCP leases and BOOTP for network booting of diskless machines. -------------------------------------------------------------------------------- Update Information: CVE-2017-14491 CVE-2017-14492 CVE-2017-14493 CVE-2017-14494 CVE-2017-14495 CVE-2017-14496 -------------------------------------------------------------------------------- References: [ 1 ] Bug #1495409 - CVE-2017-14491 dnsmasq: heap overflow in the code responsible for building DNS replies https://bugzilla.redhat.com/show_bug.cgi?id=1495409 [ 2 ] Bug #1495410 - CVE-2017-14492 dnsmasq: heap overflow in the IPv6 router advertisement code https://bugzilla.redhat.com/show_bug.cgi?id=1495410 [ 3 ] Bug #1495411 - CVE-2017-14493 dnsmasq: stack buffer overflow in the DHCPv6 code https://bugzilla.redhat.com/show_bug.cgi?id=1495411 [ 4 ] Bug #1495412 - CVE-2017-14494 dnsmasq: information leak in the DHCPv6 relay code https://bugzilla.redhat.com/show_bug.cgi?id=1495412 [ 5 ] Bug #1495415 - CVE-2017-14495 dnsmasq: memory exhaustion vulnerability in the EDNS0 code https://bugzilla.redhat.com/show_bug.cgi?id=1495415 [ 6 ] Bug #1495416 - CVE-2017-14496 dnsmasq: integer underflow leading to buffer over-read in the EDNS0 code https://bugzilla.redhat.com/show_bug.cgi?id=1495416 -------------------------------------------------------------------------------- This update can be installed with the "dnf" update program. Use su -c 'dnf upgrade dnsmasq' at the command line. For more information, refer to the dnf documentation available at http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/keys -------------------------------------------------------------------------------- _______________________________________________ package-announce mailing list -- package-announce@lists.fedoraproject.org To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org |