-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

[slackware-security]  dnsmasq (SSA:2005-201-01)


New dnsmasq packages are available for Slackware 10.0, 10.1, and -current
to fix security issues.    An off-by-one overflow vulnerability may allow
a DHCP client to create a denial of service condition.  Additional code
was also added to detect and defeat attempts to poison the DNS cache.


More details about these issues may be found in the Common
Vulnerabilities and Exposures (CVE) database:

  http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0876
  http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0877

Here are the details from the Slackware 10.1 ChangeLog:
+--------------------------+
patches/packages/dnsmasq-2.22-i486-1.tgz:  Upgraded to dnsmasq-2.22.
  This fixes an off-by-one overflow vulnerability may allow a DHCP
  client to create a denial of service condition.  Additional code was
  also added to detect and defeat attempts to poison the DNS cache.
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0876
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0877
  (* Security fix *)
+--------------------------+


Where to find the new packages:
+-----------------------------+

Updated package for Slackware 10.0:

Updated package for Slackware 10.1:

Updated package for Slackware -current:


MD5 signatures:
+-------------+

Slackware 10.0 package:
9716a39a464c0121b88a3a717a65b7a3  dnsmasq-2.22-i486-1.tgz

Slackware 10.1 package:
21f99c7ed9bbee044fb839f4a9214b8c  dnsmasq-2.22-i486-1.tgz

Slackware -current package:
e37624bee39e7e5da2f8790973e89e07  dnsmasq-2.22-i486-1.tgz


Installation instructions:
+------------------------+

Upgrade the package as root:
# upgradepkg dnsmasq-2.22-i486-1.tgz


+-----+

Slackware: 2005-201-01: dnsmasq Security Update

July 20, 2005
New dnsmasq packages are available for Slackware 10.0, 10.1, and -current to fix security issues

Summary

Here are the details from the Slackware 10.1 ChangeLog: patches/packages/dnsmasq-2.22-i486-1.tgz: Upgraded to dnsmasq-2.22. This fixes an off-by-one overflow vulnerability may allow a DHCP client to create a denial of service condition. Additional code was also added to detect and defeat attempts to poison the DNS cache. For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0876 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0877 (* Security fix *)

Where Find New Packages

Updated package for Slackware 10.0:
Updated package for Slackware 10.1:
Updated package for Slackware -current:

MD5 Signatures

Slackware 10.0 package: 9716a39a464c0121b88a3a717a65b7a3 dnsmasq-2.22-i486-1.tgz
Slackware 10.1 package: 21f99c7ed9bbee044fb839f4a9214b8c dnsmasq-2.22-i486-1.tgz
Slackware -current package: e37624bee39e7e5da2f8790973e89e07 dnsmasq-2.22-i486-1.tgz

Severity
[slackware-security] dnsmasq (SSA:2005-201-01)
New dnsmasq packages are available for Slackware 10.0, 10.1, and -current to fix security issues. An off-by-one overflow vulnerability may allow a DHCP client to create a denial of service condition. Additional code was also added to detect and defeat attempts to poison the DNS cache.
More details about these issues may be found in the Common Vulnerabilities and Exposures (CVE) database:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0876 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0877

Installation Instructions

Installation instructions: Upgrade the package as root: # upgradepkg dnsmasq-2.22-i486-1.tgz

Related News