Mehrere Probleme in dnsmasq
ID: | SUSE-SU-2021:0163-1 |
Distribution: | SUSE |
Plattformen: | SUSE Linux Enterprise Module for Basesystem 15-SP1, SUSE Linux Enterprise Module for Basesystem 15-SP2 |
Datum: | Di, 19. Januar 2021, 18:44 |
Referenzen: | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25685
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25681 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25686 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25684 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25682 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25683 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25687 |
Applikationen: | Dnsmasq |
Originalnachricht |
|
SUSE Security Update: Security update for dnsmasq ______________________________________________________________________________ Announcement ID: SUSE-SU-2021:0163-1 Rating: important References: #1176076 #1177077 Cross-References: CVE-2020-25681 CVE-2020-25682 CVE-2020-25683 CVE-2020-25684 CVE-2020-25685 CVE-2020-25686 CVE-2020-25687 Affected Products: SUSE Linux Enterprise Module for Basesystem 15-SP2 SUSE Linux Enterprise Module for Basesystem 15-SP1 ______________________________________________________________________________ An update that fixes 7 vulnerabilities is now available. Description: This update for dnsmasq fixes the following issues: - bsc#1177077: Fixed DNSpooq vulnerabilities - CVE-2020-25684, CVE-2020-25685, CVE-2020-25686: Fixed multiple Cache Poisoning attacks. - CVE-2020-25681, CVE-2020-25682, CVE-2020-25683, CVE-2020-25687: Fixed multiple potential Heap-based overflows when DNSSEC is enabled. - Retry query to other servers on receipt of SERVFAIL rcode (bsc#1176076) Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Module for Basesystem 15-SP2: zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP2-2021-163=1 - SUSE Linux Enterprise Module for Basesystem 15-SP1: zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP1-2021-163=1 Package List: - SUSE Linux Enterprise Module for Basesystem 15-SP2 (aarch64 ppc64le s390x x86_64): dnsmasq-2.78-7.6.1 dnsmasq-debuginfo-2.78-7.6.1 dnsmasq-debugsource-2.78-7.6.1 - SUSE Linux Enterprise Module for Basesystem 15-SP1 (aarch64 ppc64le s390x x86_64): dnsmasq-2.78-7.6.1 dnsmasq-debuginfo-2.78-7.6.1 dnsmasq-debugsource-2.78-7.6.1 References: https://www.suse.com/security/cve/CVE-2020-25681.html https://www.suse.com/security/cve/CVE-2020-25682.html https://www.suse.com/security/cve/CVE-2020-25683.html https://www.suse.com/security/cve/CVE-2020-25684.html https://www.suse.com/security/cve/CVE-2020-25685.html https://www.suse.com/security/cve/CVE-2020-25686.html https://www.suse.com/security/cve/CVE-2020-25687.html https://bugzilla.suse.com/1176076 https://bugzilla.suse.com/1177077 |