Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2017-14493
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T19:27:40.669Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1039474", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1039474" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.synology.com/support/security/Synology_SA_17_59_Dnsmasq" }, { "name": "DSA-3989", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2017/dsa-3989" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://thekelleys.org.uk/gitweb/?p=dnsmasq.git%3Ba=commit%3Bh=3d4ff1ba8419546490b464418223132529514033" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://access.redhat.com/security/vulnerabilities/3199382" }, { "name": "101085", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/101085" }, { "name": "42943", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/42943/" }, { "name": "USN-3430-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-3430-1" }, { "name": "VU#973527", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "https://www.kb.cert.org/vuls/id/973527" }, { "name": "GLSA-201710-27", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201710-27" }, { "name": "USN-3430-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-3430-2" }, { "name": "[dnsmasq-discuss] 20171002 Announce: dnsmasq-2.78.", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://www.mail-archive.com/dnsmasq-discuss%40lists.thekelleys.org.uk/msg11665.html" }, { "name": "RHSA-2017:2836", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2017:2836" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4561" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-005.txt" }, { "name": "RHSA-2017:2837", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2017:2837" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://thekelleys.org.uk/dnsmasq/CHANGELOG" }, { "name": "openSUSE-SU-2017:2633", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00006.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html" }, { "name": "[dnsmasq-discuss] 20171002 IMPORTANT SECURITY INFORMATION.", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://www.mail-archive.com/dnsmasq-discuss%40lists.thekelleys.org.uk/msg11664.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2017-10-02T00:00:00", "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in dnsmasq before 2.78 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted DHCPv6 request." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-03-03T10:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "1039474", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1039474" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.synology.com/support/security/Synology_SA_17_59_Dnsmasq" }, { "name": "DSA-3989", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2017/dsa-3989" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://thekelleys.org.uk/gitweb/?p=dnsmasq.git%3Ba=commit%3Bh=3d4ff1ba8419546490b464418223132529514033" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://access.redhat.com/security/vulnerabilities/3199382" }, { "name": "101085", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/101085" }, { "name": "42943", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/42943/" }, { "name": "USN-3430-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-3430-1" }, { "name": "VU#973527", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "https://www.kb.cert.org/vuls/id/973527" }, { "name": "GLSA-201710-27", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201710-27" }, { "name": "USN-3430-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-3430-2" }, { "name": "[dnsmasq-discuss] 20171002 Announce: dnsmasq-2.78.", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://www.mail-archive.com/dnsmasq-discuss%40lists.thekelleys.org.uk/msg11665.html" }, { "name": "RHSA-2017:2836", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2017:2836" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4561" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-005.txt" }, { "name": "RHSA-2017:2837", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2017:2837" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://thekelleys.org.uk/dnsmasq/CHANGELOG" }, { "name": "openSUSE-SU-2017:2633", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00006.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html" }, { "name": "[dnsmasq-discuss] 20171002 IMPORTANT SECURITY INFORMATION.", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://www.mail-archive.com/dnsmasq-discuss%40lists.thekelleys.org.uk/msg11664.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2017-14493", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Stack-based buffer overflow in dnsmasq before 2.78 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted DHCPv6 request." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1039474", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1039474" }, { "name": "https://www.synology.com/support/security/Synology_SA_17_59_Dnsmasq", "refsource": "CONFIRM", "url": "https://www.synology.com/support/security/Synology_SA_17_59_Dnsmasq" }, { "name": "DSA-3989", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2017/dsa-3989" }, { "name": "http://thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=commit;h=3d4ff1ba8419546490b464418223132529514033", "refsource": "CONFIRM", "url": "http://thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=commit;h=3d4ff1ba8419546490b464418223132529514033" }, { "name": "https://access.redhat.com/security/vulnerabilities/3199382", "refsource": "CONFIRM", "url": "https://access.redhat.com/security/vulnerabilities/3199382" }, { "name": "101085", "refsource": "BID", "url": "http://www.securityfocus.com/bid/101085" }, { "name": "42943", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/42943/" }, { "name": "USN-3430-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-3430-1" }, { "name": "VU#973527", "refsource": "CERT-VN", "url": "https://www.kb.cert.org/vuls/id/973527" }, { "name": "GLSA-201710-27", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201710-27" }, { "name": "USN-3430-2", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-3430-2" }, { "name": "[dnsmasq-discuss] 20171002 Announce: dnsmasq-2.78.", "refsource": "MLIST", "url": "https://www.mail-archive.com/dnsmasq-discuss@lists.thekelleys.org.uk/msg11665.html" }, { "name": "RHSA-2017:2836", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2017:2836" }, { "name": "http://nvidia.custhelp.com/app/answers/detail/a_id/4561", "refsource": "CONFIRM", "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4561" }, { "name": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-005.txt", "refsource": "CONFIRM", "url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-005.txt" }, { "name": "RHSA-2017:2837", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2017:2837" }, { "name": "http://thekelleys.org.uk/dnsmasq/CHANGELOG", "refsource": "CONFIRM", "url": "http://thekelleys.org.uk/dnsmasq/CHANGELOG" }, { "name": "openSUSE-SU-2017:2633", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00006.html" }, { "name": "https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html", "refsource": "MISC", "url": "https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html" }, { "name": "[dnsmasq-discuss] 20171002 IMPORTANT SECURITY INFORMATION.", "refsource": "MLIST", "url": "https://www.mail-archive.com/dnsmasq-discuss@lists.thekelleys.org.uk/msg11664.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2017-14493", "datePublished": "2017-10-02T21:00:00", "dateReserved": "2017-09-15T00:00:00", "dateUpdated": "2024-08-05T19:27:40.669Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2017-14493\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2017-10-03T01:29:02.077\",\"lastModified\":\"2024-11-21T03:12:54.433\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Stack-based buffer overflow in dnsmasq before 2.78 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted DHCPv6 request.\"},{\"lang\":\"es\",\"value\":\"Un desbordamiento de b\u00fafer basado en pila en dnsmasq en versiones anteriores a la 2.78 permite a los atacantes provocar una denegaci\u00f3n de servicio (cierre inesperado) o ejecutar c\u00f3digo arbitrario mediante una petici\u00f3n DHCPv6 manipulada.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":7.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-119\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"B5A6F2F3-4894-4392-8296-3B8DD2679084\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:17.04:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"588D4F37-0A56-47A4-B710-4D5F3D214FB9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"16F59A04-14CF-49E2-9973-645477EA09DA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:7.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7B21E9A8-CE63-42C2-A11A-94D977A96DF1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEECE5FC-CACF-4496-A3E7-164736409252\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:opensuse:leap:42.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1EA337A3-B9A3-4962-B8BD-8E0C7C5B28EB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5F65DAB0-3DAD-49FF-BC73-3581CC3D5BF3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"33C068A4-3780-4EAB-A937-6082DF847564\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"51EF4996-72F4-4FA4-814F-F5991E7A8318\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"825ECE2D-E232-46E0-A047-074B34DB1E97\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:thekelleys:dnsmasq:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.77\",\"matchCriteriaId\":\"B85D7A28-8CBA-4D77-AD30-DB3CA49F2F98\"}]}]}],\"references\":[{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00006.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Issue Tracking\",\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://nvidia.custhelp.com/app/answers/detail/a_id/4561\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://thekelleys.org.uk/dnsmasq/CHANGELOG\",\"source\":\"cve@mitre.org\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"http://thekelleys.org.uk/gitweb/?p=dnsmasq.git%3Ba=commit%3Bh=3d4ff1ba8419546490b464418223132529514033\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-005.txt\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.debian.org/security/2017/dsa-3989\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/101085\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1039474\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-3430-1\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-3430-2\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:2836\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:2837\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/security/vulnerabilities/3199382\",\"source\":\"cve@mitre.org\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/201710-27\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.exploit-db.com/exploits/42943/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://www.kb.cert.org/vuls/id/973527\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"https://www.mail-archive.com/dnsmasq-discuss%40lists.thekelleys.org.uk/msg11664.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://www.mail-archive.com/dnsmasq-discuss%40lists.thekelleys.org.uk/msg11665.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://www.synology.com/support/security/Synology_SA_17_59_Dnsmasq\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00006.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://nvidia.custhelp.com/app/answers/detail/a_id/4561\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://thekelleys.org.uk/dnsmasq/CHANGELOG\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"http://thekelleys.org.uk/gitweb/?p=dnsmasq.git%3Ba=commit%3Bh=3d4ff1ba8419546490b464418223132529514033\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-005.txt\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.debian.org/security/2017/dsa-3989\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/101085\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1039474\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-3430-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-3430-2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:2836\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:2837\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/security/vulnerabilities/3199382\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/201710-27\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.exploit-db.com/exploits/42943/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://www.kb.cert.org/vuls/id/973527\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"https://www.mail-archive.com/dnsmasq-discuss%40lists.thekelleys.org.uk/msg11664.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.mail-archive.com/dnsmasq-discuss%40lists.thekelleys.org.uk/msg11665.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.synology.com/support/security/Synology_SA_17_59_Dnsmasq\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}" } }
var-201710-0449
Vulnerability from variot
Stack-based buffer overflow in dnsmasq before 2.78 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted DHCPv6 request. Dnsmasq versions 2.77 and earlier contains multiple vulnerabilities. dnsmasq Contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
===================================================================== Red Hat Security Advisory
Synopsis: Critical: dnsmasq security update Advisory ID: RHSA-2017:2836-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2017:2836 Issue date: 2017-10-02 CVE Names: CVE-2017-14491 CVE-2017-14492 CVE-2017-14493 CVE-2017-14494 CVE-2017-14495 CVE-2017-14496 =====================================================================
- Summary:
An update for dnsmasq is now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
- Relevant releases/architectures:
Red Hat Enterprise Linux Client (v. 7) - x86_64 Red Hat Enterprise Linux Client Optional (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64 Red Hat Enterprise Linux Server (v. 7) - aarch64, ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 7) - aarch64, ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - x86_64 Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64
- Description:
The dnsmasq packages contain Dnsmasq, a lightweight DNS (Domain Name Server) forwarder and DHCP (Dynamic Host Configuration Protocol) server.
Security Fix(es):
-
A heap buffer overflow was found in dnsmasq in the code responsible for building DNS replies. (CVE-2017-14491)
-
A heap buffer overflow was discovered in dnsmasq in the IPv6 router advertisement (RA) handling code. This issue only affected configurations using one of these options: enable-ra, ra-only, slaac, ra-names, ra-advrouter, or ra-stateless. (CVE-2017-14492)
-
A stack buffer overflow was found in dnsmasq in the DHCPv6 code. (CVE-2017-14493)
-
An information leak was found in dnsmasq in the DHCPv6 relay code. An attacker on the local network could send crafted DHCPv6 packets to dnsmasq causing it to forward the contents of process memory, potentially leaking sensitive data. (CVE-2017-14494)
-
A memory exhaustion flaw was found in dnsmasq in the EDNS0 code. An attacker could send crafted DNS packets which would trigger memory allocations which would never be freed, leading to unbounded memory consumption and eventually a crash. This issue only affected configurations using one of the options: add-mac, add-cpe-id, or add-subnet. (CVE-2017-14495)
-
An integer underflow flaw leading to a buffer over-read was found in dnsmasq in the EDNS0 code. An attacker could send crafted DNS packets to dnsmasq which would cause it to crash. This issue only affected configurations using one of the options: add-mac, add-cpe-id, or add-subnet. (CVE-2017-14496)
Red Hat would like to thank Felix Wilhelm (Google Security Team), Fermin J. Serna (Google Security Team), Gabriel Campana (Google Security Team), Kevin Hamacher (Google Security Team), and Ron Bowes (Google Security Team) for reporting these issues.
- Solution:
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
- Bugs fixed (https://bugzilla.redhat.com/):
1495409 - CVE-2017-14491 dnsmasq: heap overflow in the code responsible for building DNS replies 1495410 - CVE-2017-14492 dnsmasq: heap overflow in the IPv6 router advertisement code 1495411 - CVE-2017-14493 dnsmasq: stack buffer overflow in the DHCPv6 code 1495412 - CVE-2017-14494 dnsmasq: information leak in the DHCPv6 relay code 1495415 - CVE-2017-14495 dnsmasq: memory exhaustion vulnerability in the EDNS0 code 1495416 - CVE-2017-14496 dnsmasq: integer underflow leading to buffer over-read in the EDNS0 code
- Package List:
Red Hat Enterprise Linux Client (v. 7):
Source: dnsmasq-2.76-2.el7_4.2.src.rpm
x86_64: dnsmasq-2.76-2.el7_4.2.x86_64.rpm dnsmasq-debuginfo-2.76-2.el7_4.2.x86_64.rpm
Red Hat Enterprise Linux Client Optional (v. 7):
x86_64: dnsmasq-debuginfo-2.76-2.el7_4.2.x86_64.rpm dnsmasq-utils-2.76-2.el7_4.2.x86_64.rpm
Red Hat Enterprise Linux ComputeNode (v. 7):
Source: dnsmasq-2.76-2.el7_4.2.src.rpm
x86_64: dnsmasq-2.76-2.el7_4.2.x86_64.rpm dnsmasq-debuginfo-2.76-2.el7_4.2.x86_64.rpm
Red Hat Enterprise Linux ComputeNode Optional (v. 7):
x86_64: dnsmasq-debuginfo-2.76-2.el7_4.2.x86_64.rpm dnsmasq-utils-2.76-2.el7_4.2.x86_64.rpm
Red Hat Enterprise Linux Server (v. 7):
Source: dnsmasq-2.76-2.el7_4.2.src.rpm
aarch64: dnsmasq-2.76-2.el7_4.2.aarch64.rpm dnsmasq-debuginfo-2.76-2.el7_4.2.aarch64.rpm
ppc64: dnsmasq-2.76-2.el7_4.2.ppc64.rpm dnsmasq-debuginfo-2.76-2.el7_4.2.ppc64.rpm
ppc64le: dnsmasq-2.76-2.el7_4.2.ppc64le.rpm dnsmasq-debuginfo-2.76-2.el7_4.2.ppc64le.rpm
s390x: dnsmasq-2.76-2.el7_4.2.s390x.rpm dnsmasq-debuginfo-2.76-2.el7_4.2.s390x.rpm
x86_64: dnsmasq-2.76-2.el7_4.2.x86_64.rpm dnsmasq-debuginfo-2.76-2.el7_4.2.x86_64.rpm
Red Hat Enterprise Linux Server Optional (v. 7):
aarch64: dnsmasq-debuginfo-2.76-2.el7_4.2.aarch64.rpm dnsmasq-utils-2.76-2.el7_4.2.aarch64.rpm
ppc64: dnsmasq-debuginfo-2.76-2.el7_4.2.ppc64.rpm dnsmasq-utils-2.76-2.el7_4.2.ppc64.rpm
ppc64le: dnsmasq-debuginfo-2.76-2.el7_4.2.ppc64le.rpm dnsmasq-utils-2.76-2.el7_4.2.ppc64le.rpm
s390x: dnsmasq-debuginfo-2.76-2.el7_4.2.s390x.rpm dnsmasq-utils-2.76-2.el7_4.2.s390x.rpm
x86_64: dnsmasq-debuginfo-2.76-2.el7_4.2.x86_64.rpm dnsmasq-utils-2.76-2.el7_4.2.x86_64.rpm
Red Hat Enterprise Linux Workstation (v. 7):
Source: dnsmasq-2.76-2.el7_4.2.src.rpm
x86_64: dnsmasq-2.76-2.el7_4.2.x86_64.rpm dnsmasq-debuginfo-2.76-2.el7_4.2.x86_64.rpm
Red Hat Enterprise Linux Workstation Optional (v. 7):
x86_64: dnsmasq-debuginfo-2.76-2.el7_4.2.x86_64.rpm dnsmasq-utils-2.76-2.el7_4.2.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/
- References:
https://access.redhat.com/security/cve/CVE-2017-14491 https://access.redhat.com/security/cve/CVE-2017-14492 https://access.redhat.com/security/cve/CVE-2017-14493 https://access.redhat.com/security/cve/CVE-2017-14494 https://access.redhat.com/security/cve/CVE-2017-14495 https://access.redhat.com/security/cve/CVE-2017-14496 https://access.redhat.com/security/updates/classification/#critical https://access.redhat.com/security/vulnerabilities/3199382
- Contact:
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/
Copyright 2017 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1
iD8DBQFZ0opYXlSAg2UNWIIRAr0dAJ9rIL1FgNTJUf2I9jjKFFlfkCd/kwCfV+bX SfoCV7+qG2nwqlHKLZOlhIU= =iWfU -----END PGP SIGNATURE-----
-- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce . =========================================================================== Ubuntu Security Notice USN-3430-3 January 04, 2018
dnsmasq regression
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 12.04 ESM
Summary:
USN-3430-2 introduced regression in Dnsmasq.
Software Description: - dnsmasq: Small caching DNS proxy and DHCP/TFTP server
Details:
USN-3430-2 fixed several vulnerabilities. The update introduced a new regression that breaks DNS resolution. This update addresses the problem.
We apologize for the inconvenience.
Original advisory details:
Felix Wilhelm, Fermin J. Serna, Gabriel Campana and Kevin Hamacher discovered that Dnsmasq incorrectly handled DNS requests. (CVE-2017-14491)
Felix Wilhelm, Fermin J. (CVE-2017-14492)
Felix Wilhelm, Fermin J. Serna, Gabriel Campana and Kevin Hamacher discovered that Dnsmasq incorrectly handled DHCPv6 requests. (CVE-2017-14493)
Felix Wilhelm, Fermin J. Serna, Gabriel Campana and Kevin Hamacher discovered that Dnsmasq incorrectly handled DHCPv6 packets. (CVE-2017-14494)
Felix Wilhelm, Fermin J. Serna, Gabriel Campana and Kevin Hamacher discovered that Dnsmasq incorrectly handled DNS requests. (CVE-2017-14495)
Felix Wilhelm, Fermin J. Serna, Gabriel Campana and Kevin Hamacher discovered that Dnsmasq incorrectly handled DNS requests. (CVE-2017-14496)
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 12.04 ESM: dnsmasq=C2=A02.59-4ubuntu0.4 dnsmasq-base2.59-4ubuntu0.4 dnsmasq-utils2.59-4ubuntu0.4
After a standard system update you need to reboot your computer to make all the necessary changes. 7.3) - ppc64, ppc64le, s390x, x86_64
-
Gentoo Linux Security Advisory GLSA 201710-27
https://security.gentoo.org/
Severity: Normal Title: Dnsmasq: Multiple vulnerabilities Date: October 23, 2017 Bugs: #632692 ID: 201710-27
Synopsis
Multiple vulnerabilities have been found in Dnsmasq, the worst of which may allow remote attackers to execute arbitrary code.
Affected packages
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 net-dns/dnsmasq < 2.78 >= 2.78
Description
Multiple vulnerabilities have been discovered in Dnsmasq.
Workaround
There is no known workaround at this time.
Resolution
All Dnsmasq users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=net-dns/dnsmasq-2.78"
References
[ 1 ] CVE-2017-14491 https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-14491 [ 2 ] CVE-2017-14492 https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-14492 [ 3 ] CVE-2017-14493 https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-14493 [ 4 ] CVE-2017-14494 https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-14494 [ 5 ] CVE-2017-14495 https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-14495 [ 6 ] CVE-2017-14496 https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-14496
Availability
This GLSA and any updates to it are available for viewing at the Gentoo Security Website:
https://security.gentoo.org/glsa/201710-27
Concerns?
Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.
License
Copyright 2017 Gentoo Foundation, Inc; referenced text belongs to its owner(s).
The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201710-0449", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "leap", "scope": "eq", "trust": 1.3, "vendor": "opensuse", "version": "42.3" }, { "model": "leap", "scope": "eq", "trust": 1.3, "vendor": "opensuse", "version": "42.2" }, { "model": "ubuntu linux", "scope": "eq", "trust": 1.0, "vendor": "canonical", "version": "17.04" }, { "model": "ubuntu linux", "scope": "eq", "trust": 1.0, "vendor": "canonical", "version": "14.04" }, { "model": "dnsmasq", "scope": "lte", "trust": 1.0, "vendor": "thekelleys", "version": "2.77" }, { "model": "linux", "scope": "eq", "trust": 1.0, "vendor": "debian", "version": "7.1" }, { "model": "enterprise linux desktop", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.0" }, { "model": "enterprise linux workstation", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.0" }, { "model": "enterprise linux server", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.0" }, { "model": "linux", "scope": "eq", "trust": 1.0, "vendor": "debian", "version": "9.0" }, { "model": "linux", "scope": "eq", "trust": 1.0, "vendor": "debian", "version": "7.0" }, { "model": "ubuntu linux", "scope": "eq", "trust": 1.0, "vendor": "canonical", "version": "16.04" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.9, "vendor": "thekelleys", "version": "2.77" }, { "model": null, "scope": null, "trust": 0.8, "vendor": "ruckus", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "technicolor", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "dnsmasq", "version": null }, { "model": "ubuntu", "scope": null, "trust": 0.8, "vendor": "canonical", "version": null }, { "model": "gnu/linux", "scope": null, "trust": 0.8, "vendor": "debian", "version": null }, { "model": "leap", "scope": null, "trust": 0.8, "vendor": "opensuse", "version": null }, { "model": "dnsmasq", "scope": "lt", "trust": 0.8, "vendor": "thekelleys", "version": "2.78" }, { "model": "enterprise linux desktop", "scope": null, "trust": 0.8, "vendor": "red hat", "version": null }, { "model": "enterprise linux server", "scope": null, "trust": 0.8, "vendor": "red hat", "version": null }, { "model": "enterprise linux workstation", "scope": null, "trust": 0.8, "vendor": "red hat", "version": null }, { "model": "enterprise linux server year extended update support", "scope": "eq", "trust": 0.6, "vendor": "redhat", "version": "-47.4" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "17.04" }, { "model": "linux lts", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "16.04" }, { "model": "linux lts", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "14.04" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "1.2.2" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.75" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.72" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.71" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.70" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.7" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.65" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.64" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.63" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.62" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.61" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.60" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.6" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.59" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.58" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.57" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.56" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.55" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.54" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.53" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.52" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.51" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.50" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.49" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.48" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.47" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.46" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.45" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.44" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.43" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.42" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.41" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.40" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.4" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.38" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.37" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.36" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.35" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.34" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.33" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.30" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.29" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.28" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.27" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.26" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.25" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.24" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.23" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.22" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.21" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.20" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.2" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.19" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.18" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.17" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.16" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.15" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.14" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.13" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.12" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.11" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.10" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "1.9" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "1.8" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "1.6" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "1.5" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "1.4" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "1.3" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "1.18" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "1.17" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "1.16" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "1.15" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "1.14" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "1.13" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "1.12" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "1.11" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "1.10" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "1.0" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "0.996" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "0.992" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "0.98" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "0.96" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "0.95" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "0.7" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "0.6" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "0.5" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "0.4" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "14.2" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "14.1" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "14.0" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "13.37" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "13.1" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "13.0" }, { "model": "enterprise linux workstation optional", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "7" }, { "model": "enterprise linux workstation optional", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "enterprise linux workstation", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "7" }, { "model": "enterprise linux workstation", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "enterprise linux server tus", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6.6" }, { "model": "enterprise linux server tus", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6.5" }, { "model": "enterprise linux server optional eus", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "7.3" }, { "model": "enterprise linux server optional eus", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "7.2" }, { "model": "enterprise linux server optional eus", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6.5" }, { "model": "enterprise linux server optional aus", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6.6" }, { "model": "enterprise linux server optional aus", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6.5" }, { "model": "enterprise linux server optional aus", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6.4" }, { "model": "enterprise linux server optional", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "7" }, { "model": "enterprise linux server optional", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "enterprise linux server for arm", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "7" }, { "model": "enterprise linux server eus", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "7.3" }, { "model": "enterprise linux server eus", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "7.2" }, { "model": "enterprise linux server aus", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6.6" }, { "model": "enterprise linux server aus", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6.5" }, { "model": "enterprise linux server aus", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6.4" }, { "model": "enterprise linux server aus", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6.2" }, { "model": "enterprise linux server tus", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "-7.4" }, { "model": "enterprise linux server tus", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "-7.3" }, { "model": "enterprise linux server tus", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "-7.2" }, { "model": "enterprise linux server extended update support", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "-7.4" }, { "model": "enterprise linux server extended update support", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "-7.2" }, { "model": "enterprise linux server extended update suppor", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "-7.3" }, { "model": "enterprise linux server aus", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "-7.4" }, { "model": "enterprise linux server aus", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "-7.3" }, { "model": "enterprise linux server aus", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "-7.2" }, { "model": "enterprise linux server year extended update support", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "-47.2" }, { "model": "enterprise linux server year extended upd", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "-47.3" }, { "model": "enterprise linux server", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "7" }, { "model": "enterprise linux server", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "enterprise linux server", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "5" }, { "model": "enterprise linux long life server", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "5.9" }, { "model": "enterprise linux hpc node optional", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "enterprise linux hpc node", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "enterprise linux for scientific computing", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "7" }, { "model": "enterprise linux for power little endian extended update supp", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "-7.4" }, { "model": "enterprise linux for power little endian", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "7" }, { "model": "enterprise linux for power big endian extended update support", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "-7.4" }, { "model": "enterprise linux for power big endian", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "7" }, { "model": "enterprise linux for power little endian extended update suppo", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "-7.3" }, { "model": "enterprise linux for power little endian extended update suppo", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "-7.2" }, { "model": "enterprise linux for power big endian extended update support", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "-7.3" }, { "model": "enterprise linux for power big endian extended update support", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "-7.2" }, { "model": "enterprise linux for ibm z systems extended update support", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "-7.4" }, { "model": "enterprise linux for ibm z systems extended update support", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "-7.3" }, { "model": "enterprise linux for ibm z systems extended update support", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "-7.2" }, { "model": "enterprise linux for ibm z systems", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "7" }, { "model": "enterprise linux eus compute node", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "7.4" }, { "model": "enterprise linux eus compute node", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "7.3" }, { "model": "enterprise linux eus compute node", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "7.2" }, { "model": "enterprise linux desktop optional", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "enterprise linux desktop", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "7" }, { "model": "enterprise linux desktop", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "enterprise linux computenode optional eus", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "7.3" }, { "model": "enterprise linux computenode optional eus", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "7.2" }, { "model": "enterprise linux computenode optional", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "7" }, { "model": "enterprise linux computenode eus", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "7.3" }, { "model": "enterprise linux computenode eus", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "7.2" }, { "model": "enterprise linux computenode", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "7" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "7" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "6" }, { "model": "kubernetes", "scope": "eq", "trust": 0.3, "vendor": "kubernetes", "version": "1.7.6" }, { "model": "kubernetes", "scope": "eq", "trust": 0.3, "vendor": "kubernetes", "version": "1.7" }, { "model": "kubernetes", "scope": "eq", "trust": 0.3, "vendor": "kubernetes", "version": "1.6.10" }, { "model": "kubernetes", "scope": "eq", "trust": 0.3, "vendor": "kubernetes", "version": "1.6" }, { "model": "kubernetes", "scope": "eq", "trust": 0.3, "vendor": "kubernetes", "version": "1.5.7" }, { "model": "kubernetes", "scope": "eq", "trust": 0.3, "vendor": "kubernetes", "version": "1.5" }, { "model": "kubernetes", "scope": "eq", "trust": 0.3, "vendor": "kubernetes", "version": "1.2" }, { "model": "android", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.1.1" }, { "model": "android", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.1" }, { "model": "android", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.1.1" }, { "model": "android", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.2" }, { "model": "android", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.4.4" }, { "model": "android", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0" }, { "model": "android", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.1.2" }, { "model": "android", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0" }, { "model": "android", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0" }, { "model": "fedora", "scope": "eq", "trust": 0.3, "vendor": "fedoraproject", "version": "27" }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "linux s/390", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "linux mips", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "linux ia-64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "linux ia-32", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "linux ia-30", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "linux arm", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "centos", "scope": "eq", "trust": 0.3, "vendor": "centos", "version": "7" }, { "model": "centos", "scope": "eq", "trust": 0.3, "vendor": "centos", "version": "6" }, { "model": "dnsmasq", "scope": "ne", "trust": 0.3, "vendor": "thekelleys", "version": "2.78" }, { "model": "kubernetes", "scope": "ne", "trust": 0.3, "vendor": "kubernetes", "version": "1.8" }, { "model": "kubernetes", "scope": "ne", "trust": 0.3, "vendor": "kubernetes", "version": "1.7.7" }, { "model": "kubernetes", "scope": "ne", "trust": 0.3, "vendor": "kubernetes", "version": "1.6.11" }, { "model": "kubernetes", "scope": "ne", "trust": 0.3, "vendor": "kubernetes", "version": "1.5.8" } ], "sources": [ { "db": "CERT/CC", "id": "VU#973527" }, { "db": "BID", "id": "101085" }, { "db": "JVNDB", "id": "JVNDB-2017-008620" }, { "db": "CNNVD", "id": "CNNVD-201709-745" }, { "db": "NVD", "id": "CVE-2017-14493" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:canonical:ubuntu", "vulnerable": true }, { "cpe22Uri": "cpe:/o:debian:debian_linux", "vulnerable": true }, { "cpe22Uri": "cpe:/o:opensuse_project:leap", "vulnerable": true }, { "cpe22Uri": "cpe:/a:thekelleys:dnsmasq", "vulnerable": true }, { "cpe22Uri": "cpe:/o:redhat:enterprise_linux_desktop", "vulnerable": true }, { "cpe22Uri": "cpe:/o:redhat:enterprise_linux_server", "vulnerable": true }, { "cpe22Uri": "cpe:/o:redhat:enterprise_linux_workstation", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-008620" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Gabriel Campana, Kevin Hamacher and Ron Bowes of the Google Security Team,Felix Wilhelm, Fermin J. Serna", "sources": [ { "db": "CNNVD", "id": "CNNVD-201709-745" } ], "trust": 0.6 }, "cve": "CVE-2017-14493", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2017-14493", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 1.9, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2017-14493", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.8, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2017-14493", "trust": 1.0, "value": "CRITICAL" }, { "author": "NVD", "id": "CVE-2017-14493", "trust": 0.8, "value": "Critical" }, { "author": "CNNVD", "id": "CNNVD-201709-745", "trust": 0.6, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2017-14493", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULMON", "id": "CVE-2017-14493" }, { "db": "JVNDB", "id": "JVNDB-2017-008620" }, { "db": "CNNVD", "id": "CNNVD-201709-745" }, { "db": "NVD", "id": "CVE-2017-14493" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Stack-based buffer overflow in dnsmasq before 2.78 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted DHCPv6 request. Dnsmasq versions 2.77 and earlier contains multiple vulnerabilities. dnsmasq Contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n=====================================================================\n Red Hat Security Advisory\n\nSynopsis: Critical: dnsmasq security update\nAdvisory ID: RHSA-2017:2836-01\nProduct: Red Hat Enterprise Linux\nAdvisory URL: https://access.redhat.com/errata/RHSA-2017:2836\nIssue date: 2017-10-02\nCVE Names: CVE-2017-14491 CVE-2017-14492 CVE-2017-14493 \n CVE-2017-14494 CVE-2017-14495 CVE-2017-14496 \n=====================================================================\n\n1. Summary:\n\nAn update for dnsmasq is now available for Red Hat Enterprise Linux 7. \n\nRed Hat Product Security has rated this update as having a security impact\nof Critical. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available for each vulnerability from\nthe CVE link(s) in the References section. \n\n2. Relevant releases/architectures:\n\nRed Hat Enterprise Linux Client (v. 7) - x86_64\nRed Hat Enterprise Linux Client Optional (v. 7) - x86_64\nRed Hat Enterprise Linux ComputeNode (v. 7) - x86_64\nRed Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64\nRed Hat Enterprise Linux Server (v. 7) - aarch64, ppc64, ppc64le, s390x, x86_64\nRed Hat Enterprise Linux Server Optional (v. 7) - aarch64, ppc64, ppc64le, s390x, x86_64\nRed Hat Enterprise Linux Workstation (v. 7) - x86_64\nRed Hat Enterprise Linux Workstation Optional (v. 7) - x86_64\n\n3. Description:\n\nThe dnsmasq packages contain Dnsmasq, a lightweight DNS (Domain Name\nServer) forwarder and DHCP (Dynamic Host Configuration Protocol) server. \n\nSecurity Fix(es):\n\n* A heap buffer overflow was found in dnsmasq in the code responsible for\nbuilding DNS replies. \n(CVE-2017-14491)\n\n* A heap buffer overflow was discovered in dnsmasq in the IPv6 router\nadvertisement (RA) handling code. This issue only affected\nconfigurations using one of these options: enable-ra, ra-only, slaac,\nra-names, ra-advrouter, or ra-stateless. (CVE-2017-14492)\n\n* A stack buffer overflow was found in dnsmasq in the DHCPv6 code. (CVE-2017-14493)\n\n* An information leak was found in dnsmasq in the DHCPv6 relay code. An\nattacker on the local network could send crafted DHCPv6 packets to dnsmasq\ncausing it to forward the contents of process memory, potentially leaking\nsensitive data. (CVE-2017-14494)\n\n* A memory exhaustion flaw was found in dnsmasq in the EDNS0 code. An\nattacker could send crafted DNS packets which would trigger memory\nallocations which would never be freed, leading to unbounded memory\nconsumption and eventually a crash. This issue only affected configurations\nusing one of the options: add-mac, add-cpe-id, or add-subnet. \n(CVE-2017-14495)\n\n* An integer underflow flaw leading to a buffer over-read was found in\ndnsmasq in the EDNS0 code. An attacker could send crafted DNS packets to\ndnsmasq which would cause it to crash. This issue only affected\nconfigurations using one of the options: add-mac, add-cpe-id, or\nadd-subnet. (CVE-2017-14496)\n\nRed Hat would like to thank Felix Wilhelm (Google Security Team), Fermin J. \nSerna (Google Security Team), Gabriel Campana (Google Security Team), Kevin\nHamacher (Google Security Team), and Ron Bowes (Google Security Team) for\nreporting these issues. \n\n4. Solution:\n\nFor details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\n5. Bugs fixed (https://bugzilla.redhat.com/):\n\n1495409 - CVE-2017-14491 dnsmasq: heap overflow in the code responsible for building DNS replies\n1495410 - CVE-2017-14492 dnsmasq: heap overflow in the IPv6 router advertisement code\n1495411 - CVE-2017-14493 dnsmasq: stack buffer overflow in the DHCPv6 code\n1495412 - CVE-2017-14494 dnsmasq: information leak in the DHCPv6 relay code\n1495415 - CVE-2017-14495 dnsmasq: memory exhaustion vulnerability in the EDNS0 code\n1495416 - CVE-2017-14496 dnsmasq: integer underflow leading to buffer over-read in the EDNS0 code\n\n6. Package List:\n\nRed Hat Enterprise Linux Client (v. 7):\n\nSource:\ndnsmasq-2.76-2.el7_4.2.src.rpm\n\nx86_64:\ndnsmasq-2.76-2.el7_4.2.x86_64.rpm\ndnsmasq-debuginfo-2.76-2.el7_4.2.x86_64.rpm\n\nRed Hat Enterprise Linux Client Optional (v. 7):\n\nx86_64:\ndnsmasq-debuginfo-2.76-2.el7_4.2.x86_64.rpm\ndnsmasq-utils-2.76-2.el7_4.2.x86_64.rpm\n\nRed Hat Enterprise Linux ComputeNode (v. 7):\n\nSource:\ndnsmasq-2.76-2.el7_4.2.src.rpm\n\nx86_64:\ndnsmasq-2.76-2.el7_4.2.x86_64.rpm\ndnsmasq-debuginfo-2.76-2.el7_4.2.x86_64.rpm\n\nRed Hat Enterprise Linux ComputeNode Optional (v. 7):\n\nx86_64:\ndnsmasq-debuginfo-2.76-2.el7_4.2.x86_64.rpm\ndnsmasq-utils-2.76-2.el7_4.2.x86_64.rpm\n\nRed Hat Enterprise Linux Server (v. 7):\n\nSource:\ndnsmasq-2.76-2.el7_4.2.src.rpm\n\naarch64:\ndnsmasq-2.76-2.el7_4.2.aarch64.rpm\ndnsmasq-debuginfo-2.76-2.el7_4.2.aarch64.rpm\n\nppc64:\ndnsmasq-2.76-2.el7_4.2.ppc64.rpm\ndnsmasq-debuginfo-2.76-2.el7_4.2.ppc64.rpm\n\nppc64le:\ndnsmasq-2.76-2.el7_4.2.ppc64le.rpm\ndnsmasq-debuginfo-2.76-2.el7_4.2.ppc64le.rpm\n\ns390x:\ndnsmasq-2.76-2.el7_4.2.s390x.rpm\ndnsmasq-debuginfo-2.76-2.el7_4.2.s390x.rpm\n\nx86_64:\ndnsmasq-2.76-2.el7_4.2.x86_64.rpm\ndnsmasq-debuginfo-2.76-2.el7_4.2.x86_64.rpm\n\nRed Hat Enterprise Linux Server Optional (v. 7):\n\naarch64:\ndnsmasq-debuginfo-2.76-2.el7_4.2.aarch64.rpm\ndnsmasq-utils-2.76-2.el7_4.2.aarch64.rpm\n\nppc64:\ndnsmasq-debuginfo-2.76-2.el7_4.2.ppc64.rpm\ndnsmasq-utils-2.76-2.el7_4.2.ppc64.rpm\n\nppc64le:\ndnsmasq-debuginfo-2.76-2.el7_4.2.ppc64le.rpm\ndnsmasq-utils-2.76-2.el7_4.2.ppc64le.rpm\n\ns390x:\ndnsmasq-debuginfo-2.76-2.el7_4.2.s390x.rpm\ndnsmasq-utils-2.76-2.el7_4.2.s390x.rpm\n\nx86_64:\ndnsmasq-debuginfo-2.76-2.el7_4.2.x86_64.rpm\ndnsmasq-utils-2.76-2.el7_4.2.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation (v. 7):\n\nSource:\ndnsmasq-2.76-2.el7_4.2.src.rpm\n\nx86_64:\ndnsmasq-2.76-2.el7_4.2.x86_64.rpm\ndnsmasq-debuginfo-2.76-2.el7_4.2.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation Optional (v. 7):\n\nx86_64:\ndnsmasq-debuginfo-2.76-2.el7_4.2.x86_64.rpm\ndnsmasq-utils-2.76-2.el7_4.2.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security. Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/\n\n7. References:\n\nhttps://access.redhat.com/security/cve/CVE-2017-14491\nhttps://access.redhat.com/security/cve/CVE-2017-14492\nhttps://access.redhat.com/security/cve/CVE-2017-14493\nhttps://access.redhat.com/security/cve/CVE-2017-14494\nhttps://access.redhat.com/security/cve/CVE-2017-14495\nhttps://access.redhat.com/security/cve/CVE-2017-14496\nhttps://access.redhat.com/security/updates/classification/#critical\nhttps://access.redhat.com/security/vulnerabilities/3199382\n\n8. Contact:\n\nThe Red Hat security contact is \u003csecalert@redhat.com\u003e. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2017 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1\n\niD8DBQFZ0opYXlSAg2UNWIIRAr0dAJ9rIL1FgNTJUf2I9jjKFFlfkCd/kwCfV+bX\nSfoCV7+qG2nwqlHKLZOlhIU=\n=iWfU\n-----END PGP SIGNATURE-----\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://www.redhat.com/mailman/listinfo/rhsa-announce\n. \n===========================================================================\nUbuntu Security Notice USN-3430-3\nJanuary 04, 2018\n\ndnsmasq regression\n===========================================================================\n\nA security issue affects these releases of Ubuntu and its derivatives:\n\n- Ubuntu 12.04 ESM\n\nSummary:\n\nUSN-3430-2 introduced regression in Dnsmasq. \n\nSoftware Description:\n- dnsmasq: Small caching DNS proxy and DHCP/TFTP server\n\nDetails:\n\nUSN-3430-2 fixed several vulnerabilities. The update introduced a new\nregression that breaks DNS resolution. This update addresses the\nproblem. \n\nWe apologize for the inconvenience. \n\nOriginal advisory details:\n\nFelix Wilhelm, Fermin J. Serna, Gabriel Campana and Kevin Hamacher\ndiscovered that Dnsmasq incorrectly handled DNS requests. \n(CVE-2017-14491)\n\nFelix Wilhelm, Fermin J. (CVE-2017-14492)\n\nFelix Wilhelm, Fermin J. Serna, Gabriel Campana and Kevin Hamacher\ndiscovered that Dnsmasq incorrectly handled DHCPv6 requests. \n(CVE-2017-14493)\n\nFelix Wilhelm, Fermin J. Serna, Gabriel Campana and Kevin Hamacher\ndiscovered that Dnsmasq incorrectly handled DHCPv6 packets. (CVE-2017-14494)\n\nFelix Wilhelm, Fermin J. Serna, Gabriel Campana and Kevin Hamacher\ndiscovered that Dnsmasq incorrectly handled DNS requests. (CVE-2017-14495)\n\nFelix Wilhelm, Fermin J. Serna, Gabriel Campana and Kevin Hamacher\ndiscovered that Dnsmasq incorrectly handled DNS requests. (CVE-2017-14496)\n\nUpdate instructions:\n\nThe problem can be corrected by updating your system to the following\npackage versions:\n\nUbuntu 12.04 ESM:\n dnsmasq=C2=A02.59-4ubuntu0.4\n dnsmasq-base2.59-4ubuntu0.4\n dnsmasq-utils2.59-4ubuntu0.4\n\nAfter a standard system update you need to reboot your computer to make\nall the necessary changes. 7.3) - ppc64, ppc64le, s390x, x86_64\n\n3. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\nGentoo Linux Security Advisory GLSA 201710-27\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n https://security.gentoo.org/\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\n Severity: Normal\n Title: Dnsmasq: Multiple vulnerabilities\n Date: October 23, 2017\n Bugs: #632692\n ID: 201710-27\n\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\nSynopsis\n========\n\nMultiple vulnerabilities have been found in Dnsmasq, the worst of which\nmay allow remote attackers to execute arbitrary code. \n\nAffected packages\n=================\n\n -------------------------------------------------------------------\n Package / Vulnerable / Unaffected\n -------------------------------------------------------------------\n 1 net-dns/dnsmasq \u003c 2.78 \u003e= 2.78 \n\nDescription\n===========\n\nMultiple vulnerabilities have been discovered in Dnsmasq. \n\nWorkaround\n==========\n\nThere is no known workaround at this time. \n\nResolution\n==========\n\nAll Dnsmasq users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose \"\u003e=net-dns/dnsmasq-2.78\"\n\nReferences\n==========\n\n[ 1 ] CVE-2017-14491\n https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-14491\n[ 2 ] CVE-2017-14492\n https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-14492\n[ 3 ] CVE-2017-14493\n https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-14493\n[ 4 ] CVE-2017-14494\n https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-14494\n[ 5 ] CVE-2017-14495\n https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-14495\n[ 6 ] CVE-2017-14496\n https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-14496\n\nAvailability\n============\n\nThis GLSA and any updates to it are available for viewing at\nthe Gentoo Security Website:\n\n https://security.gentoo.org/glsa/201710-27\n\nConcerns?\n=========\n\nSecurity is a primary focus of Gentoo Linux and ensuring the\nconfidentiality and security of our users\u0027 machines is of utmost\nimportance to us. Any security concerns should be addressed to\nsecurity@gentoo.org or alternatively, you may file a bug at\nhttps://bugs.gentoo.org. \n\nLicense\n=======\n\nCopyright 2017 Gentoo Foundation, Inc; referenced text\nbelongs to its owner(s). \n\nThe contents of this document are licensed under the\nCreative Commons - Attribution / Share Alike license. \n\nhttp://creativecommons.org/licenses/by-sa/2.5\n", "sources": [ { "db": "NVD", "id": "CVE-2017-14493" }, { "db": "CERT/CC", "id": "VU#973527" }, { "db": "JVNDB", "id": "JVNDB-2017-008620" }, { "db": "BID", "id": "101085" }, { "db": "VULMON", "id": "CVE-2017-14493" }, { "db": "PACKETSTORM", "id": "144490" }, { "db": "PACKETSTORM", "id": "144484" }, { "db": "PACKETSTORM", "id": "145652" }, { "db": "PACKETSTORM", "id": "144477" }, { "db": "PACKETSTORM", "id": "144469" }, { "db": "PACKETSTORM", "id": "144706" } ], "trust": 3.24 }, "exploit_availability": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "reference": "https://vulmon.com/exploitdetails?qidtp=exploitdb\u0026qid=42943", "trust": 0.1, "type": "exploit" } ], "sources": [ { "db": "VULMON", "id": "CVE-2017-14493" } ] }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "CERT/CC", "id": "VU#973527", "trust": 3.6 }, { "db": "NVD", "id": "CVE-2017-14493", "trust": 3.4 }, { "db": "BID", "id": "101085", "trust": 2.0 }, { "db": "SECTRACK", "id": "1039474", "trust": 1.1 }, { "db": "EXPLOIT-DB", "id": "42943", "trust": 1.1 }, { "db": "ICS CERT", "id": "ICSA-17-332-01", "trust": 0.9 }, { "db": "JVN", "id": "JVNVU93453933", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2017-008620", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201709-745", "trust": 0.6 }, { "db": "VULMON", "id": "CVE-2017-14493", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "144490", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "144484", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "145652", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "144477", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "144469", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "144706", "trust": 0.1 } ], "sources": [ { "db": "CERT/CC", "id": "VU#973527" }, { "db": "VULMON", "id": "CVE-2017-14493" }, { "db": "BID", "id": "101085" }, { "db": "JVNDB", "id": "JVNDB-2017-008620" }, { "db": "PACKETSTORM", "id": "144490" }, { "db": "PACKETSTORM", "id": "144484" }, { "db": "PACKETSTORM", "id": "145652" }, { "db": "PACKETSTORM", "id": "144477" }, { "db": "PACKETSTORM", "id": "144469" }, { "db": "PACKETSTORM", "id": "144706" }, { "db": "CNNVD", "id": "CNNVD-201709-745" }, { "db": "NVD", "id": "CVE-2017-14493" } ] }, "id": "VAR-201710-0449", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.25396827 }, "last_update_date": "2024-11-23T21:06:05.903000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "DSA-3989", "trust": 0.8, "url": "https://www.debian.org/security/2017/dsa-3989" }, { "title": "Security Bulletin: NVIDIA Tegra Jetson L4T contains multiple vulnerabilities; updates for \u201cBlueBorne\u201d and \u201cDnsmasq\u201d.", "trust": 0.8, "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4561" }, { "title": "openSUSE-SU-2017:2633", "trust": 0.8, "url": "https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00006.html" }, { "title": "RHSA-2017:2836", "trust": 0.8, "url": "https://access.redhat.com/errata/RHSA-2017:2836" }, { "title": "RHSA-2017:2837", "trust": 0.8, "url": "https://access.redhat.com/errata/RHSA-2017:2837" }, { "title": "Security fix, CVE-2017-14493, DHCPv6 - Stack buffer overflow.", "trust": 0.8, "url": "http://thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=commit;h=3d4ff1ba8419546490b464418223132529514033" }, { "title": "CHANGELOG", "trust": 0.8, "url": "http://thekelleys.org.uk/dnsmasq/CHANGELOG" }, { "title": "USN-3430-1", "trust": 0.8, "url": "https://usn.ubuntu.com/usn/USN-3430-1/" }, { "title": "USN-3430-2", "trust": 0.8, "url": "https://usn.ubuntu.com/usn/USN-3430-2/" }, { "title": "Dnsmasq Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=92841" }, { "title": "Red Hat: Critical: dnsmasq security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20172837 - Security Advisory" }, { "title": "Red Hat: Critical: dnsmasq security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20172836 - Security Advisory" }, { "title": "Arch Linux Issues: ", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=arch_linux_issues\u0026qid=CVE-2017-14493" }, { "title": "Ubuntu Security Notice: dnsmasq vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-3430-2" }, { "title": "Ubuntu Security Notice: dnsmasq regression", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-3430-3" }, { "title": "Ubuntu Security Notice: dnsmasq vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-3430-1" }, { "title": "Debian Security Advisories: DSA-3989-1 dnsmasq -- security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories\u0026qid=5c18698ecfe74c7de381531f8ed44dcf" }, { "title": "Amazon Linux 2: ALAS2-2019-1251", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux2\u0026qid=ALAS2-2019-1251" }, { "title": "Amazon Linux AMI: ALAS-2017-907", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami\u0026qid=ALAS-2017-907" }, { "title": "Arch Linux Advisories: [ASA-201710-1] dnsmasq: multiple issues", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=arch_linux_advisories\u0026qid=ASA-201710-1" }, { "title": "Oracle Solaris Third Party Bulletins: Oracle Solaris Third Party Bulletin - October 2017", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=oracle_solaris_third_party_bulletins\u0026qid=6283337cd31f81f24d445925f2138c0e" }, { "title": "Oracle Linux Bulletins: Oracle Linux Bulletin - October 2017", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=oracle_linux_bulletins\u0026qid=7251d5e5f2b1771951980ad7cfde50ba" }, { "title": "bof-dnsmasq-cve-2017-14493", "trust": 0.1, "url": "https://github.com/pupiles/bof-dnsmasq-cve-2017-14493 " }, { "title": "Safe libc", "trust": 0.1, "url": "https://github.com/introspection-libc/main " }, { "title": "What is this?\nHow does it work?\nHow to build the toolchain\nHow to build a program using the safe libc\nAnd in the real world?", "trust": 0.1, "url": "https://github.com/pekd/safe-libc " }, { "title": "What is this?\nHow does it work?\nHow to build the toolchain\nHow to build a program using the safe libc\nAnd in the real world?", "trust": 0.1, "url": "https://github.com/introspection-libc/safe-libc " }, { "title": "Awesome CVE PoC", "trust": 0.1, "url": "https://github.com/lnick2023/nicenice " }, { "title": "Awesome CVE PoC", "trust": 0.1, "url": "https://github.com/qazbnm456/awesome-cve-poc " }, { "title": "Awesome CVE PoC", "trust": 0.1, "url": "https://github.com/xbl3/awesome-cve-poc_qazbnm456 " }, { "title": "Threatpost", "trust": 0.1, "url": "https://threatpost.com/google-warns-of-dos-and-rce-bugs-in-dnsmasq/128238/" } ], "sources": [ { "db": "VULMON", "id": "CVE-2017-14493" }, { "db": "JVNDB", "id": "JVNDB-2017-008620" }, { "db": "CNNVD", "id": "CNNVD-201709-745" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-119", "trust": 1.8 }, { "problemtype": "CWE-121", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-008620" }, { "db": "NVD", "id": "CVE-2017-14493" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.9, "url": "https://www.kb.cert.org/vuls/id/973527" }, { "trust": 2.8, "url": "https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html" }, { "trust": 2.3, "url": "http://www.securityfocus.com/bid/101085" }, { "trust": 2.2, "url": "https://access.redhat.com/errata/rhsa-2017:2837" }, { "trust": 2.1, "url": "https://access.redhat.com/errata/rhsa-2017:2836" }, { "trust": 2.0, "url": "http://www.debian.org/security/2017/dsa-3989" }, { "trust": 1.7, "url": "http://www.thekelleys.org.uk/dnsmasq/doc.html" }, { "trust": 1.4, "url": "http://www.ubuntu.com/usn/usn-3430-1" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-14493" }, { "trust": 1.3, "url": "https://access.redhat.com/security/vulnerabilities/3199382" }, { "trust": 1.2, "url": "https://www.exploit-db.com/exploits/42943/" }, { "trust": 1.2, "url": "http://www.ubuntu.com/usn/usn-3430-2" }, { "trust": 1.2, "url": "https://security.gentoo.org/glsa/201710-27" }, { "trust": 1.1, "url": "http://thekelleys.org.uk/dnsmasq/changelog" }, { "trust": 1.1, "url": "http://www.securitytracker.com/id/1039474" }, { "trust": 1.1, "url": "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00006.html" }, { "trust": 1.1, "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4561" }, { "trust": 1.1, "url": "https://www.synology.com/support/security/synology_sa_17_59_dnsmasq" }, { "trust": 1.1, "url": "http://www.arubanetworks.com/assets/alert/aruba-psa-2017-005.txt" }, { "trust": 1.1, "url": "http://thekelleys.org.uk/gitweb/?p=dnsmasq.git%3ba=commit%3bh=3d4ff1ba8419546490b464418223132529514033" }, { "trust": 1.1, "url": "https://www.mail-archive.com/dnsmasq-discuss%40lists.thekelleys.org.uk/msg11665.html" }, { "trust": 1.1, "url": "https://www.mail-archive.com/dnsmasq-discuss%40lists.thekelleys.org.uk/msg11664.html" }, { "trust": 1.1, "url": "https://access.redhat.com/security/cve/cve-2017-14491" }, { "trust": 1.1, "url": "https://access.redhat.com/security/cve/cve-2017-14492" }, { "trust": 1.1, "url": "https://access.redhat.com/security/cve/cve-2017-14493" }, { "trust": 1.1, "url": "https://access.redhat.com/security/cve/cve-2017-14494" }, { "trust": 1.0, "url": "https://access.redhat.com/security/cve/cve-2017-14495" }, { "trust": 1.0, "url": "https://access.redhat.com/security/cve/cve-2017-14496" }, { "trust": 0.9, "url": "http://www.thekelleys.org.uk/dnsmasq/changelog" }, { "trust": 0.9, "url": "https://github.com/google/security-research-pocs/blob/master/vulnerabilities/dnsmasq/cve-2017-14491.py" }, { "trust": 0.9, "url": "https://github.com/google/security-research-pocs/blob/master/vulnerabilities/dnsmasq/cve-2017-14492.py" }, { "trust": 0.9, "url": "https://github.com/google/security-research-pocs/blob/master/vulnerabilities/dnsmasq/cve-2017-14493.py" }, { "trust": 0.9, "url": "https://github.com/google/security-research-pocs/blob/master/vulnerabilities/dnsmasq/cve-2017-14494.py" }, { "trust": 0.9, "url": "https://github.com/google/security-research-pocs/blob/master/vulnerabilities/dnsmasq/cve-2017-14495.py" }, { "trust": 0.9, "url": "https://github.com/kubernetes/kubernetes/blob/master/changelog.md" }, { "trust": 0.9, "url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2017\u0026m=slackware-security.601472" }, { "trust": 0.9, "url": "https://source.android.com/security/bulletin/2017-10-01" }, { "trust": 0.9, "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1495410" }, { "trust": 0.9, "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1495411" }, { "trust": 0.9, "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1495412" }, { "trust": 0.9, "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1495415" }, { "trust": 0.9, "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1495416" }, { "trust": 0.9, "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1495510" }, { "trust": 0.9, "url": "https://access.redhat.com/security/cve/cve-2017-13704" }, { "trust": 0.9, "url": "https://github.com/google/security-research-pocs/blob/master/vulnerabilities/dnsmasq/cve-2017-14496.py" }, { "trust": 0.9, "url": "https://ics-cert.us-cert.gov/advisories/icsa-17-332-01" }, { "trust": 0.8, "url": "https://www.ruckuswireless.com/security" }, { "trust": 0.8, "url": "https://www.zyxel.com/support/announcement_dnsmasq_vulnerabilities.shtml" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-14493" }, { "trust": 0.8, "url": "http://jvn.jp/vu/jvnvu93453933/index.html" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-14491" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-14494" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-14492" }, { "trust": 0.6, "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1495409bug1495409" }, { "trust": 0.5, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-14496" }, { "trust": 0.5, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-14495" }, { "trust": 0.3, "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1495409 bug 1495409" }, { "trust": 0.2, "url": "https://access.redhat.com/security/updates/classification/#critical" }, { "trust": 0.2, "url": "https://access.redhat.com/articles/11258" }, { "trust": 0.2, "url": "https://access.redhat.com/security/team/contact/" }, { "trust": 0.2, "url": "https://www.redhat.com/mailman/listinfo/rhsa-announce" }, { "trust": 0.2, "url": "https://bugzilla.redhat.com/):" }, { "trust": 0.2, "url": "https://access.redhat.com/security/team/key/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/119.html" }, { "trust": 0.1, "url": "https://github.com/pupiles/bof-dnsmasq-cve-2017-14493" }, { "trust": 0.1, "url": "https://tools.cisco.com/security/center/viewalert.x?alertid=55496" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://launchpad.net/bugs/1741262" }, { "trust": 0.1, "url": "https://www.ubuntu.com/usn/usn-3430-3" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/dnsmasq/2.76-5ubuntu0.1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/dnsmasq/2.75-1ubuntu0.16.04.3" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/dnsmasq/2.68-1ubuntu0.2" }, { "trust": 0.1, "url": "https://nvd.nist.gov/nvd.cfm?cvename=cve-2017-14495" }, { "trust": 0.1, "url": "http://creativecommons.org/licenses/by-sa/2.5" }, { "trust": 0.1, "url": "https://nvd.nist.gov/nvd.cfm?cvename=cve-2017-14493" }, { "trust": 0.1, "url": "https://nvd.nist.gov/nvd.cfm?cvename=cve-2017-14492" }, { "trust": 0.1, "url": "https://nvd.nist.gov/nvd.cfm?cvename=cve-2017-14491" }, { "trust": 0.1, "url": "https://security.gentoo.org/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/nvd.cfm?cvename=cve-2017-14496" }, { "trust": 0.1, "url": "https://bugs.gentoo.org." }, { "trust": 0.1, "url": "https://nvd.nist.gov/nvd.cfm?cvename=cve-2017-14494" } ], "sources": [ { "db": "CERT/CC", "id": "VU#973527" }, { "db": "VULMON", "id": "CVE-2017-14493" }, { "db": "BID", "id": "101085" }, { "db": "JVNDB", "id": "JVNDB-2017-008620" }, { "db": "PACKETSTORM", "id": "144490" }, { "db": "PACKETSTORM", "id": "144484" }, { "db": "PACKETSTORM", "id": "145652" }, { "db": "PACKETSTORM", "id": "144477" }, { "db": "PACKETSTORM", "id": "144469" }, { "db": "PACKETSTORM", "id": "144706" }, { "db": "CNNVD", "id": "CNNVD-201709-745" }, { "db": "NVD", "id": "CVE-2017-14493" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CERT/CC", "id": "VU#973527" }, { "db": "VULMON", "id": "CVE-2017-14493" }, { "db": "BID", "id": "101085" }, { "db": "JVNDB", "id": "JVNDB-2017-008620" }, { "db": "PACKETSTORM", "id": "144490" }, { "db": "PACKETSTORM", "id": "144484" }, { "db": "PACKETSTORM", "id": "145652" }, { "db": "PACKETSTORM", "id": "144477" }, { "db": "PACKETSTORM", "id": "144469" }, { "db": "PACKETSTORM", "id": "144706" }, { "db": "CNNVD", "id": "CNNVD-201709-745" }, { "db": "NVD", "id": "CVE-2017-14493" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-10-02T00:00:00", "db": "CERT/CC", "id": "VU#973527" }, { "date": "2017-10-03T00:00:00", "db": "VULMON", "id": "CVE-2017-14493" }, { "date": "2017-10-02T00:00:00", "db": "BID", "id": "101085" }, { "date": "2017-10-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2017-008620" }, { "date": "2017-10-03T20:21:00", "db": "PACKETSTORM", "id": "144490" }, { "date": "2017-10-03T05:19:24", "db": "PACKETSTORM", "id": "144484" }, { "date": "2018-01-04T17:50:40", "db": "PACKETSTORM", "id": "145652" }, { "date": "2017-10-02T11:11:00", "db": "PACKETSTORM", "id": "144477" }, { "date": "2017-10-02T13:13:00", "db": "PACKETSTORM", "id": "144469" }, { "date": "2017-10-23T13:54:05", "db": "PACKETSTORM", "id": "144706" }, { "date": "2017-09-18T00:00:00", "db": "CNNVD", "id": "CNNVD-201709-745" }, { "date": "2017-10-03T01:29:02.077000", "db": "NVD", "id": "CVE-2017-14493" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-02-02T00:00:00", "db": "CERT/CC", "id": "VU#973527" }, { "date": "2023-11-07T00:00:00", "db": "VULMON", "id": "CVE-2017-14493" }, { "date": "2017-10-02T00:00:00", "db": "BID", "id": "101085" }, { "date": "2017-10-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2017-008620" }, { "date": "2019-05-24T00:00:00", "db": "CNNVD", "id": "CNNVD-201709-745" }, { "date": "2024-11-21T03:12:54.433000", "db": "NVD", "id": "CVE-2017-14493" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote or local", "sources": [ { "db": "CNNVD", "id": "CNNVD-201709-745" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "dnsmasq Buffer error vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-008620" }, { "db": "CNNVD", "id": "CNNVD-201709-745" } ], "trust": 1.4 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201709-745" } ], "trust": 0.6 } }
gsd-2017-14493
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2017-14493", "description": "Stack-based buffer overflow in dnsmasq before 2.78 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted DHCPv6 request.", "id": "GSD-2017-14493", "references": [ "https://www.suse.com/security/cve/CVE-2017-14493.html", "https://www.debian.org/security/2017/dsa-3989", "https://access.redhat.com/errata/RHSA-2017:2837", "https://access.redhat.com/errata/RHSA-2017:2836", "https://ubuntu.com/security/CVE-2017-14493", "https://advisories.mageia.org/CVE-2017-14493.html", "https://security.archlinux.org/CVE-2017-14493", "https://alas.aws.amazon.com/cve/html/CVE-2017-14493.html", "https://linux.oracle.com/cve/CVE-2017-14493.html", "https://packetstormsecurity.com/files/cve/CVE-2017-14493" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2017-14493" ], "details": "Stack-based buffer overflow in dnsmasq before 2.78 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted DHCPv6 request.", "id": "GSD-2017-14493", "modified": "2023-12-13T01:21:12.870730Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2017-14493", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Stack-based buffer overflow in dnsmasq before 2.78 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted DHCPv6 request." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1039474", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1039474" }, { "name": "https://www.synology.com/support/security/Synology_SA_17_59_Dnsmasq", "refsource": "CONFIRM", "url": "https://www.synology.com/support/security/Synology_SA_17_59_Dnsmasq" }, { "name": "DSA-3989", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2017/dsa-3989" }, { "name": "http://thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=commit;h=3d4ff1ba8419546490b464418223132529514033", "refsource": "CONFIRM", "url": "http://thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=commit;h=3d4ff1ba8419546490b464418223132529514033" }, { "name": "https://access.redhat.com/security/vulnerabilities/3199382", "refsource": "CONFIRM", "url": "https://access.redhat.com/security/vulnerabilities/3199382" }, { "name": "101085", "refsource": "BID", "url": "http://www.securityfocus.com/bid/101085" }, { "name": "42943", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/42943/" }, { "name": "USN-3430-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-3430-1" }, { "name": "VU#973527", "refsource": "CERT-VN", "url": "https://www.kb.cert.org/vuls/id/973527" }, { "name": "GLSA-201710-27", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201710-27" }, { "name": "USN-3430-2", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-3430-2" }, { "name": "[dnsmasq-discuss] 20171002 Announce: dnsmasq-2.78.", "refsource": "MLIST", "url": "https://www.mail-archive.com/dnsmasq-discuss@lists.thekelleys.org.uk/msg11665.html" }, { "name": "RHSA-2017:2836", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2017:2836" }, { "name": "http://nvidia.custhelp.com/app/answers/detail/a_id/4561", "refsource": "CONFIRM", "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4561" }, { "name": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-005.txt", "refsource": "CONFIRM", "url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-005.txt" }, { "name": "RHSA-2017:2837", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2017:2837" }, { "name": "http://thekelleys.org.uk/dnsmasq/CHANGELOG", "refsource": "CONFIRM", "url": "http://thekelleys.org.uk/dnsmasq/CHANGELOG" }, { "name": "openSUSE-SU-2017:2633", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00006.html" }, { "name": "https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html", "refsource": "MISC", "url": "https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html" }, { "name": "[dnsmasq-discuss] 20171002 IMPORTANT SECURITY INFORMATION.", "refsource": "MLIST", "url": "https://www.mail-archive.com/dnsmasq-discuss@lists.thekelleys.org.uk/msg11664.html" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:17.04:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:7.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:opensuse:leap:42.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:thekelleys:dnsmasq:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.77", "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2017-14493" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "Stack-based buffer overflow in dnsmasq before 2.78 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted DHCPv6 request." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-119" } ] } ] }, "references": { "reference_data": [ { "name": "[dnsmasq-discuss] 20171002 Announce: dnsmasq-2.78.", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://www.mail-archive.com/dnsmasq-discuss@lists.thekelleys.org.uk/msg11665.html" }, { "name": "[dnsmasq-discuss] 20171002 IMPORTANT SECURITY INFORMATION.", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://www.mail-archive.com/dnsmasq-discuss@lists.thekelleys.org.uk/msg11664.html" }, { "name": "https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html", "refsource": "MISC", "tags": [ "Third Party Advisory" ], "url": "https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html" }, { "name": "http://thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=commit;h=3d4ff1ba8419546490b464418223132529514033", "refsource": "CONFIRM", "tags": [ "Vendor Advisory" ], "url": "http://thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=commit;h=3d4ff1ba8419546490b464418223132529514033" }, { "name": "http://thekelleys.org.uk/dnsmasq/CHANGELOG", "refsource": "CONFIRM", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "http://thekelleys.org.uk/dnsmasq/CHANGELOG" }, { "name": "1039474", "refsource": "SECTRACK", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1039474" }, { "name": "42943", "refsource": "EXPLOIT-DB", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "https://www.exploit-db.com/exploits/42943/" }, { "name": "101085", "refsource": "BID", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/101085" }, { "name": "VU#973527", "refsource": "CERT-VN", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://www.kb.cert.org/vuls/id/973527" }, { "name": "https://access.redhat.com/security/vulnerabilities/3199382", "refsource": "CONFIRM", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://access.redhat.com/security/vulnerabilities/3199382" }, { "name": "RHSA-2017:2837", "refsource": "REDHAT", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2017:2837" }, { "name": "RHSA-2017:2836", "refsource": "REDHAT", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2017:2836" }, { "name": "USN-3430-2", "refsource": "UBUNTU", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-3430-2" }, { "name": "USN-3430-1", "refsource": "UBUNTU", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-3430-1" }, { "name": "DSA-3989", "refsource": "DEBIAN", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2017/dsa-3989" }, { "name": "openSUSE-SU-2017:2633", "refsource": "SUSE", "tags": [ "Issue Tracking", "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00006.html" }, { "name": "http://nvidia.custhelp.com/app/answers/detail/a_id/4561", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4561" }, { "name": "GLSA-201710-27", "refsource": "GENTOO", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/201710-27" }, { "name": "https://www.synology.com/support/security/Synology_SA_17_59_Dnsmasq", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://www.synology.com/support/security/Synology_SA_17_59_Dnsmasq" }, { "name": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-005.txt", "refsource": "CONFIRM", "tags": [], "url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-005.txt" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.9 } }, "lastModifiedDate": "2018-03-04T02:29Z", "publishedDate": "2017-10-03T01:29Z" } } }
rhsa-2017_2837
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Critical" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for dnsmasq is now available for Red Hat Enterprise Linux 7.2 Extended Update Support and Red Hat Enterprise Linux 7.3 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The dnsmasq packages contain Dnsmasq, a lightweight DNS (Domain Name Server) forwarder and DHCP (Dynamic Host Configuration Protocol) server.\n\nSecurity Fix(es):\n\n* A heap buffer overflow was found in dnsmasq in the code responsible for building DNS replies. An attacker could send crafted DNS packets to dnsmasq which would cause it to crash or, potentially, execute arbitrary code. (CVE-2017-14491)\n\n* A heap buffer overflow was discovered in dnsmasq in the IPv6 router advertisement (RA) handling code. An attacker on the local network segment could send crafted RAs to dnsmasq which would cause it to crash or, potentially, execute arbitrary code. This issue only affected configurations using one of these options: enable-ra, ra-only, slaac, ra-names, ra-advrouter, or ra-stateless. (CVE-2017-14492)\n\n* A stack buffer overflow was found in dnsmasq in the DHCPv6 code. An attacker on the local network could send a crafted DHCPv6 request to dnsmasq which would cause it to a crash or, potentially, execute arbitrary code. (CVE-2017-14493)\n\n* An information leak was found in dnsmasq in the DHCPv6 relay code. An attacker on the local network could send crafted DHCPv6 packets to dnsmasq causing it to forward the contents of process memory, potentially leaking sensitive data. (CVE-2017-14494)\n\nRed Hat would like to thank Felix Wilhelm (Google Security Team), Fermin J. Serna (Google Security Team), Gabriel Campana (Google Security Team), Kevin Hamacher (Google Security Team), and Ron Bowes (Google Security Team) for reporting these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2017:2837", "url": "https://access.redhat.com/errata/RHSA-2017:2837" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#critical", "url": "https://access.redhat.com/security/updates/classification/#critical" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/3199382", "url": "https://access.redhat.com/security/vulnerabilities/3199382" }, { "category": "external", "summary": "1495409", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1495409" }, { "category": "external", "summary": "1495410", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1495410" }, { "category": "external", "summary": "1495411", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1495411" }, { "category": "external", "summary": "1495412", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1495412" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2017/rhsa-2017_2837.json" } ], "title": "Red Hat Security Advisory: dnsmasq security update", "tracking": { "current_release_date": "2024-11-22T11:34:10+00:00", "generator": { "date": "2024-11-22T11:34:10+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2017:2837", "initial_release_date": "2017-10-02T16:19:55+00:00", "revision_history": [ { "date": "2017-10-02T16:19:55+00:00", "number": "1", "summary": "Initial version" }, { "date": "2017-10-02T16:19:55+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T11:34:10+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode EUS (v. 7.2)", "product": { "name": "Red Hat Enterprise Linux ComputeNode EUS (v. 7.2)", "product_id": "7ComputeNode-7.2.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:7.2::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)", "product": { "name": "Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)", "product_id": "7ComputeNode-optional-7.2.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:7.2::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server EUS (v. 7.2)", "product": { "name": "Red Hat Enterprise Linux Server EUS (v. 7.2)", "product_id": "7Server-7.2.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:7.2::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional EUS (v. 7.2)", "product": { "name": "Red Hat Enterprise Linux Server Optional EUS (v. 7.2)", "product_id": "7Server-optional-7.2.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:7.2::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product": { "name": "Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:7.3::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product": { "name": "Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:7.3::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server EUS (v. 7.3)", "product": { "name": "Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:7.3::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product": { "name": "Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:7.3::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "dnsmasq-0:2.66-14.el7_2.2.x86_64", "product": { "name": "dnsmasq-0:2.66-14.el7_2.2.x86_64", "product_id": "dnsmasq-0:2.66-14.el7_2.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq@2.66-14.el7_2.2?arch=x86_64" } } }, { "category": "product_version", "name": "dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "product": { "name": "dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "product_id": "dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-debuginfo@2.66-14.el7_2.2?arch=x86_64" } } }, { "category": "product_version", "name": "dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "product": { "name": "dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "product_id": "dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-utils@2.66-14.el7_2.2?arch=x86_64" } } }, { "category": "product_version", "name": "dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "product": { "name": "dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "product_id": "dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-debuginfo@2.66-21.el7_3.2?arch=x86_64" } } }, { "category": "product_version", "name": "dnsmasq-0:2.66-21.el7_3.2.x86_64", "product": { "name": "dnsmasq-0:2.66-21.el7_3.2.x86_64", "product_id": "dnsmasq-0:2.66-21.el7_3.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq@2.66-21.el7_3.2?arch=x86_64" } } }, { "category": "product_version", "name": "dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", "product": { "name": "dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", "product_id": "dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-utils@2.66-21.el7_3.2?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "dnsmasq-0:2.66-14.el7_2.2.src", "product": { "name": "dnsmasq-0:2.66-14.el7_2.2.src", "product_id": "dnsmasq-0:2.66-14.el7_2.2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq@2.66-14.el7_2.2?arch=src" } } }, { "category": "product_version", "name": "dnsmasq-0:2.66-21.el7_3.2.src", "product": { "name": "dnsmasq-0:2.66-21.el7_3.2.src", "product_id": "dnsmasq-0:2.66-21.el7_3.2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq@2.66-21.el7_3.2?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "product": { "name": "dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "product_id": "dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-utils@2.66-14.el7_2.2?arch=s390x" } } }, { "category": "product_version", "name": "dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "product": { "name": "dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "product_id": "dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-debuginfo@2.66-14.el7_2.2?arch=s390x" } } }, { "category": "product_version", "name": "dnsmasq-0:2.66-14.el7_2.2.s390x", "product": { "name": "dnsmasq-0:2.66-14.el7_2.2.s390x", "product_id": "dnsmasq-0:2.66-14.el7_2.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq@2.66-14.el7_2.2?arch=s390x" } } }, { "category": "product_version", "name": "dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "product": { "name": "dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "product_id": "dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-utils@2.66-21.el7_3.2?arch=s390x" } } }, { "category": "product_version", "name": "dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "product": { "name": "dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "product_id": "dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-debuginfo@2.66-21.el7_3.2?arch=s390x" } } }, { "category": "product_version", "name": "dnsmasq-0:2.66-21.el7_3.2.s390x", "product": { "name": "dnsmasq-0:2.66-21.el7_3.2.s390x", "product_id": "dnsmasq-0:2.66-21.el7_3.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq@2.66-21.el7_3.2?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "product": { "name": "dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "product_id": "dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-utils@2.66-14.el7_2.2?arch=ppc64" } } }, { "category": "product_version", "name": "dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "product": { "name": "dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "product_id": "dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-debuginfo@2.66-14.el7_2.2?arch=ppc64" } } }, { "category": "product_version", "name": "dnsmasq-0:2.66-14.el7_2.2.ppc64", "product": { "name": "dnsmasq-0:2.66-14.el7_2.2.ppc64", "product_id": "dnsmasq-0:2.66-14.el7_2.2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq@2.66-14.el7_2.2?arch=ppc64" } } }, { "category": "product_version", "name": "dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "product": { "name": "dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "product_id": "dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-utils@2.66-21.el7_3.2?arch=ppc64" } } }, { "category": "product_version", "name": "dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "product": { "name": "dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "product_id": "dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-debuginfo@2.66-21.el7_3.2?arch=ppc64" } } }, { "category": "product_version", "name": "dnsmasq-0:2.66-21.el7_3.2.ppc64", "product": { "name": "dnsmasq-0:2.66-21.el7_3.2.ppc64", "product_id": "dnsmasq-0:2.66-21.el7_3.2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq@2.66-21.el7_3.2?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "product": { "name": "dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "product_id": "dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-utils@2.66-14.el7_2.2?arch=ppc64le" } } }, { "category": "product_version", "name": "dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "product": { "name": "dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "product_id": "dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-debuginfo@2.66-14.el7_2.2?arch=ppc64le" } } }, { "category": "product_version", "name": "dnsmasq-0:2.66-14.el7_2.2.ppc64le", "product": { "name": "dnsmasq-0:2.66-14.el7_2.2.ppc64le", "product_id": "dnsmasq-0:2.66-14.el7_2.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq@2.66-14.el7_2.2?arch=ppc64le" } } }, { "category": "product_version", "name": "dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "product": { "name": "dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "product_id": "dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-utils@2.66-21.el7_3.2?arch=ppc64le" } } }, { "category": "product_version", "name": "dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "product": { "name": "dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "product_id": "dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-debuginfo@2.66-21.el7_3.2?arch=ppc64le" } } }, { "category": "product_version", "name": "dnsmasq-0:2.66-21.el7_3.2.ppc64le", "product": { "name": "dnsmasq-0:2.66-21.el7_3.2.ppc64le", "product_id": "dnsmasq-0:2.66-21.el7_3.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq@2.66-21.el7_3.2?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.66-14.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.2)", "product_id": "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64" }, "product_reference": "dnsmasq-0:2.66-14.el7_2.2.ppc64", "relates_to_product_reference": "7ComputeNode-7.2.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.66-14.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.2)", "product_id": "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le" }, "product_reference": "dnsmasq-0:2.66-14.el7_2.2.ppc64le", "relates_to_product_reference": "7ComputeNode-7.2.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.66-14.el7_2.2.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.2)", "product_id": "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x" }, "product_reference": "dnsmasq-0:2.66-14.el7_2.2.s390x", "relates_to_product_reference": "7ComputeNode-7.2.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.66-14.el7_2.2.src as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.2)", "product_id": "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src" }, "product_reference": "dnsmasq-0:2.66-14.el7_2.2.src", "relates_to_product_reference": "7ComputeNode-7.2.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.66-14.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.2)", "product_id": "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64" }, "product_reference": "dnsmasq-0:2.66-14.el7_2.2.x86_64", "relates_to_product_reference": "7ComputeNode-7.2.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.2)", "product_id": "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64" }, "product_reference": "dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "relates_to_product_reference": "7ComputeNode-7.2.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.2)", "product_id": "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le" }, "product_reference": "dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "relates_to_product_reference": "7ComputeNode-7.2.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.2)", "product_id": "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x" }, "product_reference": "dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "relates_to_product_reference": "7ComputeNode-7.2.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.2)", "product_id": "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64" }, "product_reference": "dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "relates_to_product_reference": "7ComputeNode-7.2.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.66-14.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.2)", "product_id": "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64" }, "product_reference": "dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "relates_to_product_reference": "7ComputeNode-7.2.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.2)", "product_id": "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le" }, "product_reference": "dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "relates_to_product_reference": "7ComputeNode-7.2.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.66-14.el7_2.2.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.2)", "product_id": "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x" }, "product_reference": "dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "relates_to_product_reference": "7ComputeNode-7.2.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.66-14.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.2)", "product_id": "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64" }, "product_reference": "dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "relates_to_product_reference": "7ComputeNode-7.2.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.66-21.el7_3.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64" }, "product_reference": "dnsmasq-0:2.66-21.el7_3.2.ppc64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.66-21.el7_3.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le" }, "product_reference": "dnsmasq-0:2.66-21.el7_3.2.ppc64le", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.66-21.el7_3.2.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x" }, "product_reference": "dnsmasq-0:2.66-21.el7_3.2.s390x", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.66-21.el7_3.2.src as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src" }, "product_reference": "dnsmasq-0:2.66-21.el7_3.2.src", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.66-21.el7_3.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64" }, "product_reference": "dnsmasq-0:2.66-21.el7_3.2.x86_64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64" }, "product_reference": "dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le" }, "product_reference": "dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x" }, "product_reference": "dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64" }, "product_reference": "dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.66-21.el7_3.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64" }, "product_reference": "dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le" }, "product_reference": "dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.66-21.el7_3.2.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x" }, "product_reference": "dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.66-21.el7_3.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64" }, "product_reference": "dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.66-14.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)", "product_id": "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64" }, "product_reference": "dnsmasq-0:2.66-14.el7_2.2.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.2.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.66-14.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)", "product_id": "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le" }, "product_reference": "dnsmasq-0:2.66-14.el7_2.2.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.2.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.66-14.el7_2.2.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)", "product_id": "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x" }, "product_reference": "dnsmasq-0:2.66-14.el7_2.2.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.2.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.66-14.el7_2.2.src as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)", "product_id": "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src" }, "product_reference": "dnsmasq-0:2.66-14.el7_2.2.src", "relates_to_product_reference": "7ComputeNode-optional-7.2.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.66-14.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)", "product_id": "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64" }, "product_reference": "dnsmasq-0:2.66-14.el7_2.2.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.2.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)", "product_id": "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64" }, "product_reference": "dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.2.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)", "product_id": "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le" }, "product_reference": "dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.2.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)", "product_id": "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x" }, "product_reference": "dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.2.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)", "product_id": "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64" }, "product_reference": "dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.2.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.66-14.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)", "product_id": "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64" }, "product_reference": "dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.2.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)", "product_id": "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le" }, "product_reference": "dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.2.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.66-14.el7_2.2.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)", "product_id": "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x" }, "product_reference": "dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.2.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.66-14.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)", "product_id": "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64" }, "product_reference": "dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.2.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.66-21.el7_3.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64" }, "product_reference": "dnsmasq-0:2.66-21.el7_3.2.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.66-21.el7_3.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le" }, "product_reference": "dnsmasq-0:2.66-21.el7_3.2.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.66-21.el7_3.2.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x" }, "product_reference": "dnsmasq-0:2.66-21.el7_3.2.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.66-21.el7_3.2.src as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src" }, "product_reference": "dnsmasq-0:2.66-21.el7_3.2.src", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.66-21.el7_3.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64" }, "product_reference": "dnsmasq-0:2.66-21.el7_3.2.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64" }, "product_reference": "dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le" }, "product_reference": "dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x" }, "product_reference": "dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64" }, "product_reference": "dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.66-21.el7_3.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64" }, "product_reference": "dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le" }, "product_reference": "dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.66-21.el7_3.2.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x" }, "product_reference": "dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.66-21.el7_3.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64" }, "product_reference": "dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.66-14.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)", "product_id": "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64" }, "product_reference": "dnsmasq-0:2.66-14.el7_2.2.ppc64", "relates_to_product_reference": "7Server-7.2.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.66-14.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)", "product_id": "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le" }, "product_reference": "dnsmasq-0:2.66-14.el7_2.2.ppc64le", "relates_to_product_reference": "7Server-7.2.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.66-14.el7_2.2.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)", "product_id": "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x" }, "product_reference": "dnsmasq-0:2.66-14.el7_2.2.s390x", "relates_to_product_reference": "7Server-7.2.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.66-14.el7_2.2.src as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)", "product_id": "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src" }, "product_reference": "dnsmasq-0:2.66-14.el7_2.2.src", "relates_to_product_reference": "7Server-7.2.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.66-14.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)", "product_id": "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64" }, "product_reference": "dnsmasq-0:2.66-14.el7_2.2.x86_64", "relates_to_product_reference": "7Server-7.2.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)", "product_id": "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64" }, "product_reference": "dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "relates_to_product_reference": "7Server-7.2.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)", "product_id": "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le" }, "product_reference": "dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "relates_to_product_reference": "7Server-7.2.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)", "product_id": "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x" }, "product_reference": "dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "relates_to_product_reference": "7Server-7.2.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)", "product_id": "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64" }, "product_reference": "dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "relates_to_product_reference": "7Server-7.2.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.66-14.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)", "product_id": "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64" }, "product_reference": "dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "relates_to_product_reference": "7Server-7.2.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)", "product_id": "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le" }, "product_reference": "dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "relates_to_product_reference": "7Server-7.2.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.66-14.el7_2.2.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)", "product_id": "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x" }, "product_reference": "dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "relates_to_product_reference": "7Server-7.2.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.66-14.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)", "product_id": "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64" }, "product_reference": "dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "relates_to_product_reference": "7Server-7.2.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.66-21.el7_3.2.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64" }, "product_reference": "dnsmasq-0:2.66-21.el7_3.2.ppc64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.66-21.el7_3.2.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le" }, "product_reference": "dnsmasq-0:2.66-21.el7_3.2.ppc64le", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.66-21.el7_3.2.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x" }, "product_reference": "dnsmasq-0:2.66-21.el7_3.2.s390x", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.66-21.el7_3.2.src as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src" }, "product_reference": "dnsmasq-0:2.66-21.el7_3.2.src", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.66-21.el7_3.2.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64" }, "product_reference": "dnsmasq-0:2.66-21.el7_3.2.x86_64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64" }, "product_reference": "dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le" }, "product_reference": "dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x" }, "product_reference": "dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64" }, "product_reference": "dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.66-21.el7_3.2.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64" }, "product_reference": "dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le" }, "product_reference": "dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.66-21.el7_3.2.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x" }, "product_reference": "dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.66-21.el7_3.2.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64" }, "product_reference": "dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.66-14.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)", "product_id": "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64" }, "product_reference": "dnsmasq-0:2.66-14.el7_2.2.ppc64", "relates_to_product_reference": "7Server-optional-7.2.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.66-14.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)", "product_id": "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le" }, "product_reference": "dnsmasq-0:2.66-14.el7_2.2.ppc64le", "relates_to_product_reference": "7Server-optional-7.2.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.66-14.el7_2.2.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)", "product_id": "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x" }, "product_reference": "dnsmasq-0:2.66-14.el7_2.2.s390x", "relates_to_product_reference": "7Server-optional-7.2.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.66-14.el7_2.2.src as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)", "product_id": "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src" }, "product_reference": "dnsmasq-0:2.66-14.el7_2.2.src", "relates_to_product_reference": "7Server-optional-7.2.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.66-14.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)", "product_id": "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64" }, "product_reference": "dnsmasq-0:2.66-14.el7_2.2.x86_64", "relates_to_product_reference": "7Server-optional-7.2.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)", "product_id": "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64" }, "product_reference": "dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "relates_to_product_reference": "7Server-optional-7.2.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)", "product_id": "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le" }, "product_reference": "dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "relates_to_product_reference": "7Server-optional-7.2.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)", "product_id": "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x" }, "product_reference": "dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "relates_to_product_reference": "7Server-optional-7.2.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)", "product_id": "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64" }, "product_reference": "dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "relates_to_product_reference": "7Server-optional-7.2.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.66-14.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)", "product_id": "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64" }, "product_reference": "dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "relates_to_product_reference": "7Server-optional-7.2.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)", "product_id": "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le" }, "product_reference": "dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "relates_to_product_reference": "7Server-optional-7.2.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.66-14.el7_2.2.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)", "product_id": "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x" }, "product_reference": "dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "relates_to_product_reference": "7Server-optional-7.2.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.66-14.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)", "product_id": "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64" }, "product_reference": "dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "relates_to_product_reference": "7Server-optional-7.2.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.66-21.el7_3.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64" }, "product_reference": "dnsmasq-0:2.66-21.el7_3.2.ppc64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.66-21.el7_3.2.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le" }, "product_reference": "dnsmasq-0:2.66-21.el7_3.2.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.66-21.el7_3.2.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x" }, "product_reference": "dnsmasq-0:2.66-21.el7_3.2.s390x", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.66-21.el7_3.2.src as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src" }, "product_reference": "dnsmasq-0:2.66-21.el7_3.2.src", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.66-21.el7_3.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64" }, "product_reference": "dnsmasq-0:2.66-21.el7_3.2.x86_64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64" }, "product_reference": "dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le" }, "product_reference": "dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x" }, "product_reference": "dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64" }, "product_reference": "dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.66-21.el7_3.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64" }, "product_reference": "dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le" }, "product_reference": "dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.66-21.el7_3.2.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x" }, "product_reference": "dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.66-21.el7_3.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64" }, "product_reference": "dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", "relates_to_product_reference": "7Server-optional-7.3.EUS" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Felix Wilhelm", "Fermin J. Serna", "Gabriel Campana", "Kevin Hamacher", "Ron Bowes" ], "organization": "Google Security Team" } ], "cve": "CVE-2017-14491", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2017-09-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1495409" } ], "notes": [ { "category": "description", "text": "A heap buffer overflow was found in dnsmasq in the code responsible for building DNS replies. An attacker could send crafted DNS packets to dnsmasq which would cause it to crash or, potentially, execute arbitrary code.", "title": "Vulnerability description" }, { "category": "summary", "text": "dnsmasq: heap overflow in the code responsible for building DNS replies", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform includes the dnsmasq-utils RPM which does not contain this flaw\u0027s affected code-paths; Red Hat OpenStack Platform is therefore listed as not affected.\n\nHowever, because all versions of Red Hat OpenStack Platform are based on Red Hat Enterprise Linux, all Red Hat OpenStack Platform users should absolutely upgrade the dnsmasq RPM from Red Hat Enterprise Linux as a matter of urgency using standard update mechanisms (such as \u0027yum update\u0027 or \u0027openstack overcloud update\u0027).", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-14491" }, { "category": "external", "summary": "RHBZ#1495409", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1495409" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-14491", "url": "https://www.cve.org/CVERecord?id=CVE-2017-14491" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-14491", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-14491" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/3199382", "url": "https://access.redhat.com/security/vulnerabilities/3199382" }, { "category": "external", "summary": "https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html", "url": "https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html" } ], "release_date": "2017-10-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-10-02T16:19:55+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:2837" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "dnsmasq: heap overflow in the code responsible for building DNS replies" }, { "acknowledgments": [ { "names": [ "Felix Wilhelm", "Fermin J. Serna", "Gabriel Campana", "Kevin Hamacher", "Ron Bowes" ], "organization": "Google Security Team" } ], "cve": "CVE-2017-14492", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2017-09-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1495410" } ], "notes": [ { "category": "description", "text": "A heap buffer overflow was discovered in dnsmasq in the IPv6 router advertisement (RA) handling code. An attacker on the local network segment could send crafted RAs to dnsmasq which would cause it to crash or, potentially, execute arbitrary code. This issue only affected configurations using one of these options: enable-ra, ra-only, slaac, ra-names, ra-advrouter, or ra-stateless.", "title": "Vulnerability description" }, { "category": "summary", "text": "dnsmasq: heap overflow in the IPv6 router advertisement code", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform includes the dnsmasq-utils RPM which does not contain this flaw\u0027s affected code-paths; Red Hat OpenStack Platform is therefore listed as not affected.\n\nHowever, because all versions of Red Hat OpenStack Platform are based on Red Hat Enterprise Linux, all Red Hat OpenStack Platform users should absolutely upgrade the dnsmasq RPM from Red Hat Enterprise Linux as a matter of urgency using standard update mechanisms (such as \u0027yum update\u0027 or \u0027openstack overcloud update\u0027).", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-14492" }, { "category": "external", "summary": "RHBZ#1495410", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1495410" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-14492", "url": "https://www.cve.org/CVERecord?id=CVE-2017-14492" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-14492", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-14492" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/3199382", "url": "https://access.redhat.com/security/vulnerabilities/3199382" }, { "category": "external", "summary": "https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html", "url": "https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html" } ], "release_date": "2017-10-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-10-02T16:19:55+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:2837" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 8.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:A/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "dnsmasq: heap overflow in the IPv6 router advertisement code" }, { "acknowledgments": [ { "names": [ "Felix Wilhelm", "Fermin J. Serna", "Gabriel Campana", "Kevin Hamacher", "Ron Bowes" ], "organization": "Google Security Team" } ], "cve": "CVE-2017-14493", "cwe": { "id": "CWE-121", "name": "Stack-based Buffer Overflow" }, "discovery_date": "2017-09-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1495411" } ], "notes": [ { "category": "description", "text": "A stack buffer overflow was found in dnsmasq in the DHCPv6 code. An attacker on the local network could send a crafted DHCPv6 request to dnsmasq which would cause it to a crash or, potentially, execute arbitrary code.", "title": "Vulnerability description" }, { "category": "summary", "text": "dnsmasq: stack buffer overflow in the DHCPv6 code", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform includes the dnsmasq-utils RPM which does not contain this flaw\u0027s affected code-paths; Red Hat OpenStack Platform is therefore listed as not affected.\n\nHowever, because all versions of Red Hat OpenStack Platform are based on Red Hat Enterprise Linux, all Red Hat OpenStack Platform users should absolutely upgrade the dnsmasq RPM from Red Hat Enterprise Linux as a matter of urgency using standard update mechanisms (such as \u0027yum update\u0027 or \u0027openstack overcloud update\u0027).", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-14493" }, { "category": "external", "summary": "RHBZ#1495411", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1495411" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-14493", "url": "https://www.cve.org/CVERecord?id=CVE-2017-14493" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-14493", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-14493" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/3199382", "url": "https://access.redhat.com/security/vulnerabilities/3199382" }, { "category": "external", "summary": "https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html", "url": "https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html" } ], "release_date": "2017-10-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-10-02T16:19:55+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:2837" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 8.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:A/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "dnsmasq: stack buffer overflow in the DHCPv6 code" }, { "acknowledgments": [ { "names": [ "Felix Wilhelm", "Fermin J. Serna", "Gabriel Campana", "Kevin Hamacher", "Ron Bowes" ], "organization": "Google Security Team" } ], "cve": "CVE-2017-14494", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2017-09-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1495412" } ], "notes": [ { "category": "description", "text": "An information leak was found in dnsmasq in the DHCPv6 relay code. An attacker on the local network could send crafted DHCPv6 packets to dnsmasq causing it to forward the contents of process memory, potentially leaking sensitive data.", "title": "Vulnerability description" }, { "category": "summary", "text": "dnsmasq: information leak in the DHCPv6 relay code", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform includes the dnsmasq-utils RPM which does not contain this flaw\u0027s affected code-paths; Red Hat OpenStack Platform is therefore listed as not affected.\n\nHowever, because all versions of Red Hat OpenStack Platform are based on Red Hat Enterprise Linux, all Red Hat OpenStack Platform users should absolutely upgrade the dnsmasq RPM from Red Hat Enterprise Linux as a matter of urgency using standard update mechanisms (such as \u0027yum update\u0027 or \u0027openstack overcloud update\u0027).", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-14494" }, { "category": "external", "summary": "RHBZ#1495412", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1495412" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-14494", "url": "https://www.cve.org/CVERecord?id=CVE-2017-14494" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-14494", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-14494" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/3199382", "url": "https://access.redhat.com/security/vulnerabilities/3199382" }, { "category": "external", "summary": "https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html", "url": "https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html" } ], "release_date": "2017-10-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-10-02T16:19:55+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:2837" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 7.8, "confidentialityImpact": "COMPLETE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:N/A:N", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "dnsmasq: information leak in the DHCPv6 relay code" } ] }
rhsa-2017_2836
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Critical" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for dnsmasq is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The dnsmasq packages contain Dnsmasq, a lightweight DNS (Domain Name Server) forwarder and DHCP (Dynamic Host Configuration Protocol) server.\n\nSecurity Fix(es):\n\n* A heap buffer overflow was found in dnsmasq in the code responsible for building DNS replies. An attacker could send crafted DNS packets to dnsmasq which would cause it to crash or, potentially, execute arbitrary code. (CVE-2017-14491)\n\n* A heap buffer overflow was discovered in dnsmasq in the IPv6 router advertisement (RA) handling code. An attacker on the local network segment could send crafted RAs to dnsmasq which would cause it to crash or, potentially, execute arbitrary code. This issue only affected configurations using one of these options: enable-ra, ra-only, slaac, ra-names, ra-advrouter, or ra-stateless. (CVE-2017-14492)\n\n* A stack buffer overflow was found in dnsmasq in the DHCPv6 code. An attacker on the local network could send a crafted DHCPv6 request to dnsmasq which would cause it to a crash or, potentially, execute arbitrary code. (CVE-2017-14493)\n\n* An information leak was found in dnsmasq in the DHCPv6 relay code. An attacker on the local network could send crafted DHCPv6 packets to dnsmasq causing it to forward the contents of process memory, potentially leaking sensitive data. (CVE-2017-14494)\n\n* A memory exhaustion flaw was found in dnsmasq in the EDNS0 code. An attacker could send crafted DNS packets which would trigger memory allocations which would never be freed, leading to unbounded memory consumption and eventually a crash. This issue only affected configurations using one of the options: add-mac, add-cpe-id, or add-subnet. (CVE-2017-14495)\n\n* An integer underflow flaw leading to a buffer over-read was found in dnsmasq in the EDNS0 code. An attacker could send crafted DNS packets to dnsmasq which would cause it to crash. This issue only affected configurations using one of the options: add-mac, add-cpe-id, or add-subnet. (CVE-2017-14496)\n\nRed Hat would like to thank Felix Wilhelm (Google Security Team), Fermin J. Serna (Google Security Team), Gabriel Campana (Google Security Team), Kevin Hamacher (Google Security Team), and Ron Bowes (Google Security Team) for reporting these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2017:2836", "url": "https://access.redhat.com/errata/RHSA-2017:2836" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#critical", "url": "https://access.redhat.com/security/updates/classification/#critical" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/3199382", "url": "https://access.redhat.com/security/vulnerabilities/3199382" }, { "category": "external", "summary": "1495409", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1495409" }, { "category": "external", "summary": "1495410", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1495410" }, { "category": "external", "summary": "1495411", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1495411" }, { "category": "external", "summary": "1495412", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1495412" }, { "category": "external", "summary": "1495415", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1495415" }, { "category": "external", "summary": "1495416", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1495416" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2017/rhsa-2017_2836.json" } ], "title": "Red Hat Security Advisory: dnsmasq security update", "tracking": { "current_release_date": "2024-11-22T11:34:05+00:00", "generator": { "date": "2024-11-22T11:34:05+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2017:2836", "initial_release_date": "2017-10-02T17:18:46+00:00", "revision_history": [ { "date": "2017-10-02T17:18:46+00:00", "number": "1", "summary": "Initial version" }, { "date": "2017-10-02T17:18:46+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T11:34:05+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Client (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.4.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Client Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.4.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode (v. 7)", "product": { "name": "Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.4.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.4.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "dnsmasq-0:2.76-2.el7_4.2.x86_64", "product": { "name": "dnsmasq-0:2.76-2.el7_4.2.x86_64", "product_id": "dnsmasq-0:2.76-2.el7_4.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq@2.76-2.el7_4.2?arch=x86_64" } } }, { "category": "product_version", "name": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "product": { "name": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "product_id": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-debuginfo@2.76-2.el7_4.2?arch=x86_64" } } }, { "category": "product_version", "name": "dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "product": { "name": "dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "product_id": "dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-utils@2.76-2.el7_4.2?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "dnsmasq-0:2.76-2.el7_4.2.src", "product": { "name": "dnsmasq-0:2.76-2.el7_4.2.src", "product_id": "dnsmasq-0:2.76-2.el7_4.2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq@2.76-2.el7_4.2?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "dnsmasq-0:2.76-2.el7_4.2.ppc64le", "product": { "name": "dnsmasq-0:2.76-2.el7_4.2.ppc64le", "product_id": "dnsmasq-0:2.76-2.el7_4.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq@2.76-2.el7_4.2?arch=ppc64le" } } }, { "category": "product_version", "name": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "product": { "name": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "product_id": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-debuginfo@2.76-2.el7_4.2?arch=ppc64le" } } }, { "category": "product_version", "name": "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "product": { "name": "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "product_id": "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-utils@2.76-2.el7_4.2?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "dnsmasq-0:2.76-2.el7_4.2.ppc64", "product": { "name": "dnsmasq-0:2.76-2.el7_4.2.ppc64", "product_id": "dnsmasq-0:2.76-2.el7_4.2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq@2.76-2.el7_4.2?arch=ppc64" } } }, { "category": "product_version", "name": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "product": { "name": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "product_id": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-debuginfo@2.76-2.el7_4.2?arch=ppc64" } } }, { "category": "product_version", "name": "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "product": { "name": "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "product_id": "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-utils@2.76-2.el7_4.2?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "dnsmasq-0:2.76-2.el7_4.2.s390x", "product": { "name": "dnsmasq-0:2.76-2.el7_4.2.s390x", "product_id": "dnsmasq-0:2.76-2.el7_4.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq@2.76-2.el7_4.2?arch=s390x" } } }, { "category": "product_version", "name": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "product": { "name": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "product_id": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-debuginfo@2.76-2.el7_4.2?arch=s390x" } } }, { "category": "product_version", "name": "dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "product": { "name": "dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "product_id": "dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-utils@2.76-2.el7_4.2?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "product": { "name": "dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "product_id": "dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-utils@2.76-2.el7_4.2?arch=aarch64" } } }, { "category": "product_version", "name": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "product": { "name": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "product_id": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-debuginfo@2.76-2.el7_4.2?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-2.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64" }, "product_reference": "dnsmasq-0:2.76-2.el7_4.2.ppc64", "relates_to_product_reference": "7Client-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-2.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le" }, "product_reference": "dnsmasq-0:2.76-2.el7_4.2.ppc64le", "relates_to_product_reference": "7Client-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-2.el7_4.2.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x" }, "product_reference": "dnsmasq-0:2.76-2.el7_4.2.s390x", "relates_to_product_reference": "7Client-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-2.el7_4.2.src as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src" }, "product_reference": "dnsmasq-0:2.76-2.el7_4.2.src", "relates_to_product_reference": "7Client-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-2.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64" }, "product_reference": "dnsmasq-0:2.76-2.el7_4.2.x86_64", "relates_to_product_reference": "7Client-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64" }, "product_reference": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "relates_to_product_reference": "7Client-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64" }, "product_reference": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "relates_to_product_reference": "7Client-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le" }, "product_reference": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "relates_to_product_reference": "7Client-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x" }, "product_reference": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "relates_to_product_reference": "7Client-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64" }, "product_reference": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "relates_to_product_reference": "7Client-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-2.el7_4.2.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64" }, "product_reference": "dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "relates_to_product_reference": "7Client-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64" }, "product_reference": "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "relates_to_product_reference": "7Client-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le" }, "product_reference": "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "relates_to_product_reference": "7Client-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-2.el7_4.2.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x" }, "product_reference": "dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "relates_to_product_reference": "7Client-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-2.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64" }, "product_reference": "dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "relates_to_product_reference": "7Client-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-2.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64" }, "product_reference": "dnsmasq-0:2.76-2.el7_4.2.ppc64", "relates_to_product_reference": "7Client-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-2.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le" }, "product_reference": "dnsmasq-0:2.76-2.el7_4.2.ppc64le", "relates_to_product_reference": "7Client-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-2.el7_4.2.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x" }, "product_reference": "dnsmasq-0:2.76-2.el7_4.2.s390x", "relates_to_product_reference": "7Client-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-2.el7_4.2.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src" }, "product_reference": "dnsmasq-0:2.76-2.el7_4.2.src", "relates_to_product_reference": "7Client-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-2.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64" }, "product_reference": "dnsmasq-0:2.76-2.el7_4.2.x86_64", "relates_to_product_reference": "7Client-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64" }, "product_reference": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "relates_to_product_reference": "7Client-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64" }, "product_reference": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "relates_to_product_reference": "7Client-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le" }, "product_reference": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "relates_to_product_reference": "7Client-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x" }, "product_reference": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "relates_to_product_reference": "7Client-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64" }, "product_reference": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "relates_to_product_reference": "7Client-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-2.el7_4.2.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64" }, "product_reference": "dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "relates_to_product_reference": "7Client-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64" }, "product_reference": "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "relates_to_product_reference": "7Client-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le" }, "product_reference": "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "relates_to_product_reference": "7Client-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-2.el7_4.2.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x" }, "product_reference": "dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "relates_to_product_reference": "7Client-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-2.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64" }, "product_reference": "dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "relates_to_product_reference": "7Client-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-2.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64" }, "product_reference": "dnsmasq-0:2.76-2.el7_4.2.ppc64", "relates_to_product_reference": "7ComputeNode-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-2.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le" }, "product_reference": "dnsmasq-0:2.76-2.el7_4.2.ppc64le", "relates_to_product_reference": "7ComputeNode-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-2.el7_4.2.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x" }, "product_reference": "dnsmasq-0:2.76-2.el7_4.2.s390x", "relates_to_product_reference": "7ComputeNode-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-2.el7_4.2.src as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src" }, "product_reference": "dnsmasq-0:2.76-2.el7_4.2.src", "relates_to_product_reference": "7ComputeNode-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-2.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64" }, "product_reference": "dnsmasq-0:2.76-2.el7_4.2.x86_64", "relates_to_product_reference": "7ComputeNode-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64" }, "product_reference": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "relates_to_product_reference": "7ComputeNode-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64" }, "product_reference": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "relates_to_product_reference": "7ComputeNode-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le" }, "product_reference": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "relates_to_product_reference": "7ComputeNode-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x" }, "product_reference": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "relates_to_product_reference": "7ComputeNode-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64" }, "product_reference": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "relates_to_product_reference": "7ComputeNode-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-2.el7_4.2.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64" }, "product_reference": "dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "relates_to_product_reference": "7ComputeNode-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64" }, "product_reference": "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "relates_to_product_reference": "7ComputeNode-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le" }, "product_reference": "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "relates_to_product_reference": "7ComputeNode-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-2.el7_4.2.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x" }, "product_reference": "dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "relates_to_product_reference": "7ComputeNode-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-2.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64" }, "product_reference": "dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "relates_to_product_reference": "7ComputeNode-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-2.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64" }, "product_reference": "dnsmasq-0:2.76-2.el7_4.2.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-2.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le" }, "product_reference": "dnsmasq-0:2.76-2.el7_4.2.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-2.el7_4.2.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x" }, "product_reference": "dnsmasq-0:2.76-2.el7_4.2.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-2.el7_4.2.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src" }, "product_reference": "dnsmasq-0:2.76-2.el7_4.2.src", "relates_to_product_reference": "7ComputeNode-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-2.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64" }, "product_reference": "dnsmasq-0:2.76-2.el7_4.2.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64" }, "product_reference": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "relates_to_product_reference": "7ComputeNode-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64" }, "product_reference": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le" }, "product_reference": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x" }, "product_reference": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64" }, "product_reference": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-2.el7_4.2.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64" }, "product_reference": "dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "relates_to_product_reference": "7ComputeNode-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64" }, "product_reference": "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le" }, "product_reference": "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-2.el7_4.2.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x" }, "product_reference": "dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-2.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64" }, "product_reference": "dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-2.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64" }, "product_reference": "dnsmasq-0:2.76-2.el7_4.2.ppc64", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-2.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le" }, "product_reference": "dnsmasq-0:2.76-2.el7_4.2.ppc64le", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-2.el7_4.2.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x" }, "product_reference": "dnsmasq-0:2.76-2.el7_4.2.s390x", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-2.el7_4.2.src as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src" }, "product_reference": "dnsmasq-0:2.76-2.el7_4.2.src", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-2.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64" }, "product_reference": "dnsmasq-0:2.76-2.el7_4.2.x86_64", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64" }, "product_reference": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64" }, "product_reference": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le" }, "product_reference": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x" }, "product_reference": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64" }, "product_reference": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-2.el7_4.2.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64" }, "product_reference": "dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64" }, "product_reference": "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le" }, "product_reference": "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-2.el7_4.2.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x" }, "product_reference": "dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-2.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64" }, "product_reference": "dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-2.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64" }, "product_reference": "dnsmasq-0:2.76-2.el7_4.2.ppc64", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-2.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le" }, "product_reference": "dnsmasq-0:2.76-2.el7_4.2.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-2.el7_4.2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x" }, "product_reference": "dnsmasq-0:2.76-2.el7_4.2.s390x", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-2.el7_4.2.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src" }, "product_reference": "dnsmasq-0:2.76-2.el7_4.2.src", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-2.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64" }, "product_reference": "dnsmasq-0:2.76-2.el7_4.2.x86_64", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64" }, "product_reference": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64" }, "product_reference": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le" }, "product_reference": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x" }, "product_reference": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64" }, "product_reference": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-2.el7_4.2.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64" }, "product_reference": "dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64" }, "product_reference": "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le" }, "product_reference": "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-2.el7_4.2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x" }, "product_reference": "dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-2.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64" }, "product_reference": "dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-2.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64" }, "product_reference": "dnsmasq-0:2.76-2.el7_4.2.ppc64", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-2.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le" }, "product_reference": "dnsmasq-0:2.76-2.el7_4.2.ppc64le", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-2.el7_4.2.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x" }, "product_reference": "dnsmasq-0:2.76-2.el7_4.2.s390x", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-2.el7_4.2.src as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src" }, "product_reference": "dnsmasq-0:2.76-2.el7_4.2.src", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-2.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64" }, "product_reference": "dnsmasq-0:2.76-2.el7_4.2.x86_64", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64" }, "product_reference": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64" }, "product_reference": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le" }, "product_reference": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x" }, "product_reference": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64" }, "product_reference": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-2.el7_4.2.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64" }, "product_reference": "dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64" }, "product_reference": "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le" }, "product_reference": "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-2.el7_4.2.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x" }, "product_reference": "dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-2.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64" }, "product_reference": "dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-2.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64" }, "product_reference": "dnsmasq-0:2.76-2.el7_4.2.ppc64", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-2.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le" }, "product_reference": "dnsmasq-0:2.76-2.el7_4.2.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-2.el7_4.2.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x" }, "product_reference": "dnsmasq-0:2.76-2.el7_4.2.s390x", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-2.el7_4.2.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src" }, "product_reference": "dnsmasq-0:2.76-2.el7_4.2.src", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-2.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64" }, "product_reference": "dnsmasq-0:2.76-2.el7_4.2.x86_64", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64" }, "product_reference": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64" }, "product_reference": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le" }, "product_reference": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x" }, "product_reference": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64" }, "product_reference": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-2.el7_4.2.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64" }, "product_reference": "dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64" }, "product_reference": "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le" }, "product_reference": "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-2.el7_4.2.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x" }, "product_reference": "dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-2.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64" }, "product_reference": "dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "relates_to_product_reference": "7Workstation-optional-7.4.Z" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Felix Wilhelm", "Fermin J. Serna", "Gabriel Campana", "Kevin Hamacher", "Ron Bowes" ], "organization": "Google Security Team" } ], "cve": "CVE-2017-14491", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2017-09-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1495409" } ], "notes": [ { "category": "description", "text": "A heap buffer overflow was found in dnsmasq in the code responsible for building DNS replies. An attacker could send crafted DNS packets to dnsmasq which would cause it to crash or, potentially, execute arbitrary code.", "title": "Vulnerability description" }, { "category": "summary", "text": "dnsmasq: heap overflow in the code responsible for building DNS replies", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform includes the dnsmasq-utils RPM which does not contain this flaw\u0027s affected code-paths; Red Hat OpenStack Platform is therefore listed as not affected.\n\nHowever, because all versions of Red Hat OpenStack Platform are based on Red Hat Enterprise Linux, all Red Hat OpenStack Platform users should absolutely upgrade the dnsmasq RPM from Red Hat Enterprise Linux as a matter of urgency using standard update mechanisms (such as \u0027yum update\u0027 or \u0027openstack overcloud update\u0027).", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-14491" }, { "category": "external", "summary": "RHBZ#1495409", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1495409" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-14491", "url": "https://www.cve.org/CVERecord?id=CVE-2017-14491" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-14491", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-14491" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/3199382", "url": "https://access.redhat.com/security/vulnerabilities/3199382" }, { "category": "external", "summary": "https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html", "url": "https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html" } ], "release_date": "2017-10-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-10-02T17:18:46+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:2836" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "dnsmasq: heap overflow in the code responsible for building DNS replies" }, { "acknowledgments": [ { "names": [ "Felix Wilhelm", "Fermin J. Serna", "Gabriel Campana", "Kevin Hamacher", "Ron Bowes" ], "organization": "Google Security Team" } ], "cve": "CVE-2017-14492", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2017-09-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1495410" } ], "notes": [ { "category": "description", "text": "A heap buffer overflow was discovered in dnsmasq in the IPv6 router advertisement (RA) handling code. An attacker on the local network segment could send crafted RAs to dnsmasq which would cause it to crash or, potentially, execute arbitrary code. This issue only affected configurations using one of these options: enable-ra, ra-only, slaac, ra-names, ra-advrouter, or ra-stateless.", "title": "Vulnerability description" }, { "category": "summary", "text": "dnsmasq: heap overflow in the IPv6 router advertisement code", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform includes the dnsmasq-utils RPM which does not contain this flaw\u0027s affected code-paths; Red Hat OpenStack Platform is therefore listed as not affected.\n\nHowever, because all versions of Red Hat OpenStack Platform are based on Red Hat Enterprise Linux, all Red Hat OpenStack Platform users should absolutely upgrade the dnsmasq RPM from Red Hat Enterprise Linux as a matter of urgency using standard update mechanisms (such as \u0027yum update\u0027 or \u0027openstack overcloud update\u0027).", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-14492" }, { "category": "external", "summary": "RHBZ#1495410", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1495410" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-14492", "url": "https://www.cve.org/CVERecord?id=CVE-2017-14492" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-14492", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-14492" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/3199382", "url": "https://access.redhat.com/security/vulnerabilities/3199382" }, { "category": "external", "summary": "https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html", "url": "https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html" } ], "release_date": "2017-10-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-10-02T17:18:46+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:2836" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 8.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:A/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "dnsmasq: heap overflow in the IPv6 router advertisement code" }, { "acknowledgments": [ { "names": [ "Felix Wilhelm", "Fermin J. Serna", "Gabriel Campana", "Kevin Hamacher", "Ron Bowes" ], "organization": "Google Security Team" } ], "cve": "CVE-2017-14493", "cwe": { "id": "CWE-121", "name": "Stack-based Buffer Overflow" }, "discovery_date": "2017-09-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1495411" } ], "notes": [ { "category": "description", "text": "A stack buffer overflow was found in dnsmasq in the DHCPv6 code. An attacker on the local network could send a crafted DHCPv6 request to dnsmasq which would cause it to a crash or, potentially, execute arbitrary code.", "title": "Vulnerability description" }, { "category": "summary", "text": "dnsmasq: stack buffer overflow in the DHCPv6 code", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform includes the dnsmasq-utils RPM which does not contain this flaw\u0027s affected code-paths; Red Hat OpenStack Platform is therefore listed as not affected.\n\nHowever, because all versions of Red Hat OpenStack Platform are based on Red Hat Enterprise Linux, all Red Hat OpenStack Platform users should absolutely upgrade the dnsmasq RPM from Red Hat Enterprise Linux as a matter of urgency using standard update mechanisms (such as \u0027yum update\u0027 or \u0027openstack overcloud update\u0027).", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-14493" }, { "category": "external", "summary": "RHBZ#1495411", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1495411" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-14493", "url": "https://www.cve.org/CVERecord?id=CVE-2017-14493" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-14493", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-14493" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/3199382", "url": "https://access.redhat.com/security/vulnerabilities/3199382" }, { "category": "external", "summary": "https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html", "url": "https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html" } ], "release_date": "2017-10-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-10-02T17:18:46+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:2836" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 8.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:A/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "dnsmasq: stack buffer overflow in the DHCPv6 code" }, { "acknowledgments": [ { "names": [ "Felix Wilhelm", "Fermin J. Serna", "Gabriel Campana", "Kevin Hamacher", "Ron Bowes" ], "organization": "Google Security Team" } ], "cve": "CVE-2017-14494", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2017-09-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1495412" } ], "notes": [ { "category": "description", "text": "An information leak was found in dnsmasq in the DHCPv6 relay code. An attacker on the local network could send crafted DHCPv6 packets to dnsmasq causing it to forward the contents of process memory, potentially leaking sensitive data.", "title": "Vulnerability description" }, { "category": "summary", "text": "dnsmasq: information leak in the DHCPv6 relay code", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform includes the dnsmasq-utils RPM which does not contain this flaw\u0027s affected code-paths; Red Hat OpenStack Platform is therefore listed as not affected.\n\nHowever, because all versions of Red Hat OpenStack Platform are based on Red Hat Enterprise Linux, all Red Hat OpenStack Platform users should absolutely upgrade the dnsmasq RPM from Red Hat Enterprise Linux as a matter of urgency using standard update mechanisms (such as \u0027yum update\u0027 or \u0027openstack overcloud update\u0027).", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-14494" }, { "category": "external", "summary": "RHBZ#1495412", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1495412" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-14494", "url": "https://www.cve.org/CVERecord?id=CVE-2017-14494" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-14494", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-14494" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/3199382", "url": "https://access.redhat.com/security/vulnerabilities/3199382" }, { "category": "external", "summary": "https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html", "url": "https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html" } ], "release_date": "2017-10-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-10-02T17:18:46+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:2836" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 7.8, "confidentialityImpact": "COMPLETE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:N/A:N", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "dnsmasq: information leak in the DHCPv6 relay code" }, { "acknowledgments": [ { "names": [ "Felix Wilhelm", "Fermin J. Serna", "Gabriel Campana", "Kevin Hamacher", "Ron Bowes" ], "organization": "Google Security Team" } ], "cve": "CVE-2017-14495", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2017-09-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1495415" } ], "notes": [ { "category": "description", "text": "A memory exhaustion flaw was found in dnsmasq in the EDNS0 code. An attacker could send crafted DNS packets which would trigger memory allocations which would never be freed, leading to unbounded memory consumption and eventually a crash. This issue only affected configurations using one of the options: add-mac, add-cpe-id, or add-subnet.", "title": "Vulnerability description" }, { "category": "summary", "text": "dnsmasq: memory exhaustion vulnerability in the EDNS0 code", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform includes the dnsmasq-utils RPM which does not contain this flaw\u0027s affected code-paths; Red Hat OpenStack Platform is therefore listed as not affected.\n\nHowever, because all versions of Red Hat OpenStack Platform are based on Red Hat Enterprise Linux, all Red Hat OpenStack Platform users should absolutely upgrade the dnsmasq RPM from Red Hat Enterprise Linux as a matter of urgency using standard update mechanisms (such as \u0027yum update\u0027 or \u0027openstack overcloud update\u0027).", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-14495" }, { "category": "external", "summary": "RHBZ#1495415", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1495415" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-14495", "url": "https://www.cve.org/CVERecord?id=CVE-2017-14495" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-14495", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-14495" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/3199382", "url": "https://access.redhat.com/security/vulnerabilities/3199382" }, { "category": "external", "summary": "https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html", "url": "https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html" } ], "release_date": "2017-10-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-10-02T17:18:46+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:2836" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "dnsmasq: memory exhaustion vulnerability in the EDNS0 code" }, { "acknowledgments": [ { "names": [ "Felix Wilhelm", "Fermin J. Serna", "Gabriel Campana", "Kevin Hamacher", "Ron Bowes" ], "organization": "Google Security Team" } ], "cve": "CVE-2017-14496", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2017-09-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1495416" } ], "notes": [ { "category": "description", "text": "An integer underflow flaw leading to a buffer over-read was found in dnsmasq in the EDNS0 code. An attacker could send crafted DNS packets to dnsmasq which would cause it to crash. This issue only affected configurations using one of the options: add-mac, add-cpe-id, or add-subnet.", "title": "Vulnerability description" }, { "category": "summary", "text": "dnsmasq: integer underflow leading to buffer over-read in the EDNS0 code", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform includes the dnsmasq-utils RPM which does not contain this flaw\u0027s affected code-paths; Red Hat OpenStack Platform is therefore listed as not affected.\n\nHowever, because all versions of Red Hat OpenStack Platform are based on Red Hat Enterprise Linux, all Red Hat OpenStack Platform users should absolutely upgrade the dnsmasq RPM from Red Hat Enterprise Linux as a matter of urgency using standard update mechanisms (such as \u0027yum update\u0027 or \u0027openstack overcloud update\u0027).", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-14496" }, { "category": "external", "summary": "RHBZ#1495416", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1495416" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-14496", "url": "https://www.cve.org/CVERecord?id=CVE-2017-14496" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-14496", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-14496" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/3199382", "url": "https://access.redhat.com/security/vulnerabilities/3199382" }, { "category": "external", "summary": "https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html", "url": "https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html" } ], "release_date": "2017-10-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-10-02T17:18:46+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:2836" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "dnsmasq: integer underflow leading to buffer over-read in the EDNS0 code" } ] }
ghsa-7mpq-366q-m6vq
Vulnerability from github
Stack-based buffer overflow in dnsmasq before 2.78 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted DHCPv6 request.
{ "affected": [], "aliases": [ "CVE-2017-14493" ], "database_specific": { "cwe_ids": [ "CWE-119" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2017-10-03T01:29:00Z", "severity": "CRITICAL" }, "details": "Stack-based buffer overflow in dnsmasq before 2.78 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted DHCPv6 request.", "id": "GHSA-7mpq-366q-m6vq", "modified": "2022-05-14T03:40:36Z", "published": "2022-05-14T03:40:36Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-14493" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2017:2836" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2017:2837" }, { "type": "WEB", "url": "https://access.redhat.com/security/vulnerabilities/3199382" }, { "type": "WEB", "url": "https://security.gentoo.org/glsa/201710-27" }, { "type": "WEB", "url": "https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html" }, { "type": "WEB", "url": "https://www.exploit-db.com/exploits/42943" }, { "type": "WEB", "url": "https://www.kb.cert.org/vuls/id/973527" }, { "type": "WEB", "url": "https://www.mail-archive.com/dnsmasq-discuss@lists.thekelleys.org.uk/msg11664.html" }, { "type": "WEB", "url": "https://www.mail-archive.com/dnsmasq-discuss@lists.thekelleys.org.uk/msg11665.html" }, { "type": "WEB", "url": "https://www.synology.com/support/security/Synology_SA_17_59_Dnsmasq" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00006.html" }, { "type": "WEB", "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4561" }, { "type": "WEB", "url": "http://thekelleys.org.uk/dnsmasq/CHANGELOG" }, { "type": "WEB", "url": "http://thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=commit;h=3d4ff1ba8419546490b464418223132529514033" }, { "type": "WEB", "url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-005.txt" }, { "type": "WEB", "url": "http://www.debian.org/security/2017/dsa-3989" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/101085" }, { "type": "WEB", "url": "http://www.securitytracker.com/id/1039474" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/USN-3430-1" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/USN-3430-2" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ] }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.