SUSE: 2019:3189-1 moderate: dnsmasq
Summary
This update for dnsmasq fixes the following issues: Security issues fixed: - CVE-2019-14834: Fixed a memory leak which could have allowed to remote attackers to cause denial of service via DHCP response creation (bsc#1154849) - CVE-2017-15107: Fixed a vulnerability in DNSSEC implementation. Processing of wildcard synthesized NSEC records may result improper validation for non-existance (bsc#1076958). Other issues addressed: - Included linux/sockios.h to get SIOCGSTAMP (bsc#1156543). - Removed cache size limit (bsc#1138743). - bsc#1152539: include config files from /etc/dnsmasq.d/*.conf . Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Module for Open Buildservice Development Tools 15-SP1: zypper in -t patch SUSE-SLE-Module-Develo...
Read the Full AdvisoryReferences
#1076958 #1138743 #1152539 #1154849 #1156543
Cross- CVE-2017-15107 CVE-2019-14834
Affected Products:
SUSE Linux Enterprise Module for Open Buildservice Development Tools 15-SP1
SUSE Linux Enterprise Module for Basesystem 15-SP1
https://www.suse.com/security/cve/CVE-2017-15107.html
https://www.suse.com/security/cve/CVE-2019-14834.html
https://bugzilla.suse.com/1076958
https://bugzilla.suse.com/1138743
https://bugzilla.suse.com/1152539
https://bugzilla.suse.com/1154849
https://bugzilla.suse.com/1156543