Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2015-8899 (GCVE-0-2015-8899)
Vulnerability from cvelistv5
- n/a
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T08:29:22.024Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "91031", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/91031" }, { "name": "[Dnsmasq-discuss] 20160418 Dnsmasq 2.75 on Ubuntu 16.04 crashes reproducibly", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2016q2/010479.html" }, { "name": "USN-3009-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-3009-1" }, { "name": "[Dnsmasq-discuss] 20160503 Dnsmasq 2.75 on Ubuntu 16.04 crashes reproducibly", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2016q2/010505.html" }, { "name": "[oss-security] 20160603 Re: CVE Request: Dnsmasq denial of service", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2016/06/04/2" }, { "name": "1036045", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1036045" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://thekelleys.org.uk/gitweb/?p=dnsmasq.git%3Ba=commit%3Bh=41a8d9e99be9f2cc8b02051dd322cb45e0faac87" }, { "name": "[oss-security] 20160603 CVE Request: Dnsmasq denial of service", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2016/06/03/7" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-04-18T00:00:00", "descriptions": [ { "lang": "en", "value": "Dnsmasq before 2.76 allows remote servers to cause a denial of service (crash) via a reply with an empty DNS address that has an (1) A or (2) AAAA record defined locally." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-11-25T19:57:01", "orgId": "cc1ad9ee-3454-478d-9317-d3e869d708bc", "shortName": "canonical" }, "references": [ { "name": "91031", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/91031" }, { "name": "[Dnsmasq-discuss] 20160418 Dnsmasq 2.75 on Ubuntu 16.04 crashes reproducibly", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2016q2/010479.html" }, { "name": "USN-3009-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-3009-1" }, { "name": "[Dnsmasq-discuss] 20160503 Dnsmasq 2.75 on Ubuntu 16.04 crashes reproducibly", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2016q2/010505.html" }, { "name": "[oss-security] 20160603 Re: CVE Request: Dnsmasq denial of service", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2016/06/04/2" }, { "name": "1036045", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1036045" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://thekelleys.org.uk/gitweb/?p=dnsmasq.git%3Ba=commit%3Bh=41a8d9e99be9f2cc8b02051dd322cb45e0faac87" }, { "name": "[oss-security] 20160603 CVE Request: Dnsmasq denial of service", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2016/06/03/7" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@ubuntu.com", "ID": "CVE-2015-8899", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Dnsmasq before 2.76 allows remote servers to cause a denial of service (crash) via a reply with an empty DNS address that has an (1) A or (2) AAAA record defined locally." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "91031", "refsource": "BID", "url": "http://www.securityfocus.com/bid/91031" }, { "name": "[Dnsmasq-discuss] 20160418 Dnsmasq 2.75 on Ubuntu 16.04 crashes reproducibly", "refsource": "MLIST", "url": "http://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2016q2/010479.html" }, { "name": "USN-3009-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-3009-1" }, { "name": "[Dnsmasq-discuss] 20160503 Dnsmasq 2.75 on Ubuntu 16.04 crashes reproducibly", "refsource": "MLIST", "url": "http://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2016q2/010505.html" }, { "name": "[oss-security] 20160603 Re: CVE Request: Dnsmasq denial of service", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2016/06/04/2" }, { "name": "1036045", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1036045" }, { "name": "http://thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=commit;h=41a8d9e99be9f2cc8b02051dd322cb45e0faac87", "refsource": "CONFIRM", "url": "http://thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=commit;h=41a8d9e99be9f2cc8b02051dd322cb45e0faac87" }, { "name": "[oss-security] 20160603 CVE Request: Dnsmasq denial of service", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2016/06/03/7" } ] } } } }, "cveMetadata": { "assignerOrgId": "cc1ad9ee-3454-478d-9317-d3e869d708bc", "assignerShortName": "canonical", "cveId": "CVE-2015-8899", "datePublished": "2016-06-30T17:00:00", "dateReserved": "2016-06-03T00:00:00", "dateUpdated": "2024-08-06T08:29:22.024Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2015-8899\",\"sourceIdentifier\":\"security@ubuntu.com\",\"published\":\"2016-06-30T17:59:00.157\",\"lastModified\":\"2025-04-12T10:46:40.837\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Dnsmasq before 2.76 allows remote servers to cause a denial of service (crash) via a reply with an empty DNS address that has an (1) A or (2) AAAA record defined locally.\"},{\"lang\":\"es\",\"value\":\"Dnsmasq en versiones anteriores a 2.76 permite a servidores remotos provocar una denegaci\u00f3n de servicio (ca\u00edda) a trav\u00e9s de una respuesta con una direcci\u00f3n DNS vac\u00eda que tiene una grabaci\u00f3n (1) A o (2) AAAA definida localmente.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:P\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-20\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E88A537F-F4D0-46B9-9E37-965233C2A355\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:thekelleys:dnsmasq:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.75\",\"matchCriteriaId\":\"B705C85C-B580-43B5-AAAA-CBA10885BB22\"}]}]}],\"references\":[{\"url\":\"http://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2016q2/010479.html\",\"source\":\"security@ubuntu.com\"},{\"url\":\"http://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2016q2/010505.html\",\"source\":\"security@ubuntu.com\"},{\"url\":\"http://thekelleys.org.uk/gitweb/?p=dnsmasq.git%3Ba=commit%3Bh=41a8d9e99be9f2cc8b02051dd322cb45e0faac87\",\"source\":\"security@ubuntu.com\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2016/06/03/7\",\"source\":\"security@ubuntu.com\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2016/06/04/2\",\"source\":\"security@ubuntu.com\"},{\"url\":\"http://www.securityfocus.com/bid/91031\",\"source\":\"security@ubuntu.com\"},{\"url\":\"http://www.securitytracker.com/id/1036045\",\"source\":\"security@ubuntu.com\"},{\"url\":\"http://www.ubuntu.com/usn/USN-3009-1\",\"source\":\"security@ubuntu.com\"},{\"url\":\"http://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2016q2/010479.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2016q2/010505.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://thekelleys.org.uk/gitweb/?p=dnsmasq.git%3Ba=commit%3Bh=41a8d9e99be9f2cc8b02051dd322cb45e0faac87\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2016/06/03/7\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2016/06/04/2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/91031\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securitytracker.com/id/1036045\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.ubuntu.com/usn/USN-3009-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}" } }
suse-su-2017:2617-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for dnsmasq", "title": "Title of the patch" }, { "category": "description", "text": "This update for dnsmasq fixes the following security issues:\n\n- CVE-2017-14491: 2 byte heap based overflow. [bsc#1060354]\n- CVE-2017-14492: heap based overflow. [bsc#1060355]\n- CVE-2017-14493: stack based overflow. [bsc#1060360]\n- CVE-2017-14494: DHCP - info leak. [bsc#1060361]\n- CVE-2017-14495: DNS - OOM DoS. [bsc#1060362]\n- CVE-2017-14496: DNS - DoS Integer underflow. [bsc#1060364]\n\nThis update brings a (small) potential incompatibility in the handling of\n\u0027basename\u0027 in --pxe-service. Please read the CHANGELOG and the documentation if\nyou are using this option.\n", "title": "Description of the patch" }, { "category": "details", "text": "sleposp3-dnsmasq-13296,slessp3-dnsmasq-13296", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2017_2617-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2017:2617-1", "url": "https://www.suse.com/support/update/announcement/2017/suse-su-20172617-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2017:2617-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2017-October/003269.html" }, { "category": "self", "summary": "SUSE Bug 1060354", "url": "https://bugzilla.suse.com/1060354" }, { "category": "self", "summary": "SUSE Bug 1060355", "url": "https://bugzilla.suse.com/1060355" }, { "category": "self", "summary": "SUSE Bug 1060360", "url": "https://bugzilla.suse.com/1060360" }, { "category": "self", "summary": "SUSE Bug 1060361", "url": "https://bugzilla.suse.com/1060361" }, { "category": "self", "summary": "SUSE Bug 1060362", "url": "https://bugzilla.suse.com/1060362" }, { "category": "self", "summary": "SUSE Bug 1060364", "url": "https://bugzilla.suse.com/1060364" }, { "category": "self", "summary": "SUSE CVE CVE-2015-3294 page", "url": "https://www.suse.com/security/cve/CVE-2015-3294/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8899 page", "url": "https://www.suse.com/security/cve/CVE-2015-8899/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-14491 page", "url": "https://www.suse.com/security/cve/CVE-2017-14491/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-14492 page", "url": "https://www.suse.com/security/cve/CVE-2017-14492/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-14493 page", "url": "https://www.suse.com/security/cve/CVE-2017-14493/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-14494 page", "url": "https://www.suse.com/security/cve/CVE-2017-14494/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-14495 page", "url": "https://www.suse.com/security/cve/CVE-2017-14495/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-14496 page", "url": "https://www.suse.com/security/cve/CVE-2017-14496/" } ], "title": "Security update for dnsmasq", "tracking": { "current_release_date": "2017-10-02T13:53:56Z", "generator": { "date": "2017-10-02T13:53:56Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2017:2617-1", "initial_release_date": "2017-10-02T13:53:56Z", "revision_history": [ { "date": "2017-10-02T13:53:56Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "dnsmasq-2.78-0.16.5.1.i586", "product": { "name": "dnsmasq-2.78-0.16.5.1.i586", "product_id": "dnsmasq-2.78-0.16.5.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "dnsmasq-2.78-0.16.5.1.s390x", "product": { "name": "dnsmasq-2.78-0.16.5.1.s390x", "product_id": "dnsmasq-2.78-0.16.5.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "dnsmasq-2.78-0.16.5.1.x86_64", "product": { "name": "dnsmasq-2.78-0.16.5.1.x86_64", "product_id": "dnsmasq-2.78-0.16.5.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Point of Sale 11 SP3", "product": { "name": "SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-pos:11:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP3-LTSS", "product": { "name": "SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_sles_ltss:11:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP3-TERADATA", "product": { "name": "SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:11:sp3:teradata" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-2.78-0.16.5.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:dnsmasq-2.78-0.16.5.1.i586" }, "product_reference": "dnsmasq-2.78-0.16.5.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-2.78-0.16.5.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.i586" }, "product_reference": "dnsmasq-2.78-0.16.5.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-2.78-0.16.5.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.s390x" }, "product_reference": "dnsmasq-2.78-0.16.5.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-2.78-0.16.5.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.x86_64" }, "product_reference": "dnsmasq-2.78-0.16.5.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-2.78-0.16.5.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.i586" }, "product_reference": "dnsmasq-2.78-0.16.5.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-2.78-0.16.5.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.s390x" }, "product_reference": "dnsmasq-2.78-0.16.5.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-2.78-0.16.5.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.x86_64" }, "product_reference": "dnsmasq-2.78-0.16.5.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-3294", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-3294" } ], "notes": [ { "category": "general", "text": "The tcp_request function in Dnsmasq before 2.73rc4 does not properly handle the return value of the setup_reply function, which allows remote attackers to read process memory and cause a denial of service (out-of-bounds read and crash) via a malformed DNS request.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-3294", "url": "https://www.suse.com/security/cve/CVE-2015-3294" }, { "category": "external", "summary": "SUSE Bug 923144 for CVE-2015-3294", "url": "https://bugzilla.suse.com/923144" }, { "category": "external", "summary": "SUSE Bug 928867 for CVE-2015-3294", "url": "https://bugzilla.suse.com/928867" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-02T13:53:56Z", "details": "moderate" } ], "title": "CVE-2015-3294" }, { "cve": "CVE-2015-8899", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8899" } ], "notes": [ { "category": "general", "text": "Dnsmasq before 2.76 allows remote servers to cause a denial of service (crash) via a reply with an empty DNS address that has an (1) A or (2) AAAA record defined locally.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8899", "url": "https://www.suse.com/security/cve/CVE-2015-8899" }, { "category": "external", "summary": "SUSE Bug 983273 for CVE-2015-8899", "url": "https://bugzilla.suse.com/983273" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-02T13:53:56Z", "details": "moderate" } ], "title": "CVE-2015-8899" }, { "cve": "CVE-2017-14491", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-14491" } ], "notes": [ { "category": "general", "text": "Heap-based buffer overflow in dnsmasq before 2.78 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted DNS response.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-14491", "url": "https://www.suse.com/security/cve/CVE-2017-14491" }, { "category": "external", "summary": "SUSE Bug 1060354 for CVE-2017-14491", "url": "https://bugzilla.suse.com/1060354" }, { "category": "external", "summary": "SUSE Bug 1060360 for CVE-2017-14491", "url": "https://bugzilla.suse.com/1060360" }, { "category": "external", "summary": "SUSE Bug 1060361 for CVE-2017-14491", "url": "https://bugzilla.suse.com/1060361" }, { "category": "external", "summary": "SUSE Bug 1060362 for CVE-2017-14491", "url": "https://bugzilla.suse.com/1060362" }, { "category": "external", "summary": "SUSE Bug 1060364 for CVE-2017-14491", "url": "https://bugzilla.suse.com/1060364" }, { "category": "external", "summary": "SUSE Bug 1063832 for CVE-2017-14491", "url": "https://bugzilla.suse.com/1063832" }, { "category": "external", "summary": "SUSE Bug 1143944 for CVE-2017-14491", "url": "https://bugzilla.suse.com/1143944" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-02T13:53:56Z", "details": "moderate" } ], "title": "CVE-2017-14491" }, { "cve": "CVE-2017-14492", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-14492" } ], "notes": [ { "category": "general", "text": "Heap-based buffer overflow in dnsmasq before 2.78 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted IPv6 router advertisement request.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-14492", "url": "https://www.suse.com/security/cve/CVE-2017-14492" }, { "category": "external", "summary": "SUSE Bug 1060355 for CVE-2017-14492", "url": "https://bugzilla.suse.com/1060355" }, { "category": "external", "summary": "SUSE Bug 1060360 for CVE-2017-14492", "url": "https://bugzilla.suse.com/1060360" }, { "category": "external", "summary": "SUSE Bug 1060361 for CVE-2017-14492", "url": "https://bugzilla.suse.com/1060361" }, { "category": "external", "summary": "SUSE Bug 1060362 for CVE-2017-14492", "url": "https://bugzilla.suse.com/1060362" }, { "category": "external", "summary": "SUSE Bug 1060364 for CVE-2017-14492", "url": "https://bugzilla.suse.com/1060364" }, { "category": "external", "summary": "SUSE Bug 1063832 for CVE-2017-14492", "url": "https://bugzilla.suse.com/1063832" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-02T13:53:56Z", "details": "moderate" } ], "title": "CVE-2017-14492" }, { "cve": "CVE-2017-14493", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-14493" } ], "notes": [ { "category": "general", "text": "Stack-based buffer overflow in dnsmasq before 2.78 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted DHCPv6 request.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-14493", "url": "https://www.suse.com/security/cve/CVE-2017-14493" }, { "category": "external", "summary": "SUSE Bug 1060360 for CVE-2017-14493", "url": "https://bugzilla.suse.com/1060360" }, { "category": "external", "summary": "SUSE Bug 1060361 for CVE-2017-14493", "url": "https://bugzilla.suse.com/1060361" }, { "category": "external", "summary": "SUSE Bug 1060362 for CVE-2017-14493", "url": "https://bugzilla.suse.com/1060362" }, { "category": "external", "summary": "SUSE Bug 1060364 for CVE-2017-14493", "url": "https://bugzilla.suse.com/1060364" }, { "category": "external", "summary": "SUSE Bug 1063832 for CVE-2017-14493", "url": "https://bugzilla.suse.com/1063832" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-02T13:53:56Z", "details": "moderate" } ], "title": "CVE-2017-14493" }, { "cve": "CVE-2017-14494", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-14494" } ], "notes": [ { "category": "general", "text": "dnsmasq before 2.78, when configured as a relay, allows remote attackers to obtain sensitive memory information via vectors involving handling DHCPv6 forwarded requests.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-14494", "url": "https://www.suse.com/security/cve/CVE-2017-14494" }, { "category": "external", "summary": "SUSE Bug 1060360 for CVE-2017-14494", "url": "https://bugzilla.suse.com/1060360" }, { "category": "external", "summary": "SUSE Bug 1060361 for CVE-2017-14494", "url": "https://bugzilla.suse.com/1060361" }, { "category": "external", "summary": "SUSE Bug 1060362 for CVE-2017-14494", "url": "https://bugzilla.suse.com/1060362" }, { "category": "external", "summary": "SUSE Bug 1060364 for CVE-2017-14494", "url": "https://bugzilla.suse.com/1060364" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-02T13:53:56Z", "details": "moderate" } ], "title": "CVE-2017-14494" }, { "cve": "CVE-2017-14495", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-14495" } ], "notes": [ { "category": "general", "text": "Memory leak in dnsmasq before 2.78, when the --add-mac, --add-cpe-id or --add-subnet option is specified, allows remote attackers to cause a denial of service (memory consumption) via vectors involving DNS response creation.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-14495", "url": "https://www.suse.com/security/cve/CVE-2017-14495" }, { "category": "external", "summary": "SUSE Bug 1060360 for CVE-2017-14495", "url": "https://bugzilla.suse.com/1060360" }, { "category": "external", "summary": "SUSE Bug 1060361 for CVE-2017-14495", "url": "https://bugzilla.suse.com/1060361" }, { "category": "external", "summary": "SUSE Bug 1060362 for CVE-2017-14495", "url": "https://bugzilla.suse.com/1060362" }, { "category": "external", "summary": "SUSE Bug 1060364 for CVE-2017-14495", "url": "https://bugzilla.suse.com/1060364" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-02T13:53:56Z", "details": "important" } ], "title": "CVE-2017-14495" }, { "cve": "CVE-2017-14496", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-14496" } ], "notes": [ { "category": "general", "text": "Integer underflow in the add_pseudoheader function in dnsmasq before 2.78 , when the --add-mac, --add-cpe-id or --add-subnet option is specified, allows remote attackers to cause a denial of service via a crafted DNS request.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-14496", "url": "https://www.suse.com/security/cve/CVE-2017-14496" }, { "category": "external", "summary": "SUSE Bug 1060360 for CVE-2017-14496", "url": "https://bugzilla.suse.com/1060360" }, { "category": "external", "summary": "SUSE Bug 1060361 for CVE-2017-14496", "url": "https://bugzilla.suse.com/1060361" }, { "category": "external", "summary": "SUSE Bug 1060362 for CVE-2017-14496", "url": "https://bugzilla.suse.com/1060362" }, { "category": "external", "summary": "SUSE Bug 1060364 for CVE-2017-14496", "url": "https://bugzilla.suse.com/1060364" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-02T13:53:56Z", "details": "important" } ], "title": "CVE-2017-14496" } ] }
suse-su-2016:3269-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for dnsmasq", "title": "Title of the patch" }, { "category": "description", "text": "This update for dnsmasq fixes the following issues:\n\n- CVE-2015-8899: Denial of service between local and remote dns entries (bsc#983273)\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-OpenStack-Cloud-6-2016-1912,SUSE-SLE-DESKTOP-12-SP1-2016-1912,SUSE-SLE-DESKTOP-12-SP2-2016-1912,SUSE-SLE-RPI-12-SP2-2016-1912,SUSE-SLE-SERVER-12-SP1-2016-1912,SUSE-SLE-SERVER-12-SP2-2016-1912", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_3269-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2016:3269-1", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20163269-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2016:3269-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2016-December/002524.html" }, { "category": "self", "summary": "SUSE Bug 983273", "url": "https://bugzilla.suse.com/983273" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8899 page", "url": "https://www.suse.com/security/cve/CVE-2015-8899/" } ], "title": "Security update for dnsmasq", "tracking": { "current_release_date": "2016-12-23T17:02:50Z", "generator": { "date": "2016-12-23T17:02:50Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2016:3269-1", "initial_release_date": "2016-12-23T17:02:50Z", "revision_history": [ { "date": "2016-12-23T17:02:50Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "dnsmasq-2.71-13.1.aarch64", "product": { "name": "dnsmasq-2.71-13.1.aarch64", "product_id": "dnsmasq-2.71-13.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "dnsmasq-2.71-13.1.ppc64le", "product": { "name": "dnsmasq-2.71-13.1.ppc64le", "product_id": "dnsmasq-2.71-13.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "dnsmasq-2.71-13.1.s390x", "product": { "name": "dnsmasq-2.71-13.1.s390x", "product_id": "dnsmasq-2.71-13.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "dnsmasq-utils-2.71-13.1.x86_64", "product": { "name": "dnsmasq-utils-2.71-13.1.x86_64", "product_id": "dnsmasq-utils-2.71-13.1.x86_64" } }, { "category": "product_version", "name": "dnsmasq-2.71-13.1.x86_64", "product": { "name": "dnsmasq-2.71-13.1.x86_64", "product_id": "dnsmasq-2.71-13.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE OpenStack Cloud 6", "product": { "name": "SUSE OpenStack Cloud 6", "product_id": "SUSE OpenStack Cloud 6", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-openstack-cloud:6" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Desktop 12 SP1", "product": { "name": "SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sled:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Desktop 12 SP2", "product": { "name": "SUSE Linux Enterprise Desktop 12 SP2", "product_id": "SUSE Linux Enterprise Desktop 12 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sled:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2", "product": { "name": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2", "product_id": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP1", "product": { "name": "SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP2", "product": { "name": "SUSE Linux Enterprise Server 12 SP2", "product_id": "SUSE Linux Enterprise Server 12 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-2.71-13.1.x86_64 as component of SUSE OpenStack Cloud 6", "product_id": "SUSE OpenStack Cloud 6:dnsmasq-utils-2.71-13.1.x86_64" }, "product_reference": "dnsmasq-utils-2.71-13.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 6" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-2.71-13.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1:dnsmasq-2.71-13.1.x86_64" }, "product_reference": "dnsmasq-2.71-13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-2.71-13.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP2", "product_id": "SUSE Linux Enterprise Desktop 12 SP2:dnsmasq-2.71-13.1.x86_64" }, "product_reference": "dnsmasq-2.71-13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-2.71-13.1.aarch64 as component of SUSE Linux Enterprise Server for Raspberry Pi 12 SP2", "product_id": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:dnsmasq-2.71-13.1.aarch64" }, "product_reference": "dnsmasq-2.71-13.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-2.71-13.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:dnsmasq-2.71-13.1.ppc64le" }, "product_reference": "dnsmasq-2.71-13.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-2.71-13.1.s390x as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:dnsmasq-2.71-13.1.s390x" }, "product_reference": "dnsmasq-2.71-13.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-2.71-13.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:dnsmasq-2.71-13.1.x86_64" }, "product_reference": "dnsmasq-2.71-13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-2.71-13.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:dnsmasq-2.71-13.1.ppc64le" }, "product_reference": "dnsmasq-2.71-13.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-2.71-13.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:dnsmasq-2.71-13.1.s390x" }, "product_reference": "dnsmasq-2.71-13.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-2.71-13.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:dnsmasq-2.71-13.1.x86_64" }, "product_reference": "dnsmasq-2.71-13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-2.71-13.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP2", "product_id": "SUSE Linux Enterprise Server 12 SP2:dnsmasq-2.71-13.1.aarch64" }, "product_reference": "dnsmasq-2.71-13.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-2.71-13.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2", "product_id": "SUSE Linux Enterprise Server 12 SP2:dnsmasq-2.71-13.1.ppc64le" }, "product_reference": "dnsmasq-2.71-13.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-2.71-13.1.s390x as component of SUSE Linux Enterprise Server 12 SP2", "product_id": "SUSE Linux Enterprise Server 12 SP2:dnsmasq-2.71-13.1.s390x" }, "product_reference": "dnsmasq-2.71-13.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-2.71-13.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2", "product_id": "SUSE Linux Enterprise Server 12 SP2:dnsmasq-2.71-13.1.x86_64" }, "product_reference": "dnsmasq-2.71-13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-2.71-13.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:dnsmasq-2.71-13.1.aarch64" }, "product_reference": "dnsmasq-2.71-13.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-2.71-13.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:dnsmasq-2.71-13.1.ppc64le" }, "product_reference": "dnsmasq-2.71-13.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-2.71-13.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:dnsmasq-2.71-13.1.s390x" }, "product_reference": "dnsmasq-2.71-13.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-2.71-13.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:dnsmasq-2.71-13.1.x86_64" }, "product_reference": "dnsmasq-2.71-13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-8899", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8899" } ], "notes": [ { "category": "general", "text": "Dnsmasq before 2.76 allows remote servers to cause a denial of service (crash) via a reply with an empty DNS address that has an (1) A or (2) AAAA record defined locally.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:dnsmasq-2.71-13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:dnsmasq-2.71-13.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:dnsmasq-2.71-13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:dnsmasq-2.71-13.1.s390x", "SUSE Linux Enterprise Server 12 SP1:dnsmasq-2.71-13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:dnsmasq-2.71-13.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:dnsmasq-2.71-13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:dnsmasq-2.71-13.1.s390x", "SUSE Linux Enterprise Server 12 SP2:dnsmasq-2.71-13.1.x86_64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:dnsmasq-2.71-13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:dnsmasq-2.71-13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:dnsmasq-2.71-13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:dnsmasq-2.71-13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:dnsmasq-2.71-13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:dnsmasq-2.71-13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:dnsmasq-2.71-13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:dnsmasq-2.71-13.1.x86_64", "SUSE OpenStack Cloud 6:dnsmasq-utils-2.71-13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8899", "url": "https://www.suse.com/security/cve/CVE-2015-8899" }, { "category": "external", "summary": "SUSE Bug 983273 for CVE-2015-8899", "url": "https://bugzilla.suse.com/983273" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:dnsmasq-2.71-13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:dnsmasq-2.71-13.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:dnsmasq-2.71-13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:dnsmasq-2.71-13.1.s390x", "SUSE Linux Enterprise Server 12 SP1:dnsmasq-2.71-13.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:dnsmasq-2.71-13.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:dnsmasq-2.71-13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:dnsmasq-2.71-13.1.s390x", "SUSE Linux Enterprise Server 12 SP2:dnsmasq-2.71-13.1.x86_64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:dnsmasq-2.71-13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:dnsmasq-2.71-13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:dnsmasq-2.71-13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:dnsmasq-2.71-13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:dnsmasq-2.71-13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:dnsmasq-2.71-13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:dnsmasq-2.71-13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:dnsmasq-2.71-13.1.x86_64", "SUSE OpenStack Cloud 6:dnsmasq-utils-2.71-13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-12-23T17:02:50Z", "details": "moderate" } ], "title": "CVE-2015-8899" } ] }
suse-su-2016:3199-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for dnsmasq", "title": "Title of the patch" }, { "category": "description", "text": "This update for dnsmasq fixes the following issues:\n\n- CVE-2015-8899: Denial of service between local and remote dns entries (bsc#983273)\n", "title": "Description of the patch" }, { "category": "details", "text": "slessp4-dnsmasq-12899", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_3199-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2016:3199-1", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20163199-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2016:3199-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2016-December/002500.html" }, { "category": "self", "summary": "SUSE Bug 983273", "url": "https://bugzilla.suse.com/983273" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8899 page", "url": "https://www.suse.com/security/cve/CVE-2015-8899/" } ], "title": "Security update for dnsmasq", "tracking": { "current_release_date": "2016-12-20T12:18:38Z", "generator": { "date": "2016-12-20T12:18:38Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2016:3199-1", "initial_release_date": "2016-12-20T12:18:38Z", "revision_history": [ { "date": "2016-12-20T12:18:38Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "dnsmasq-2.71-0.16.3.i586", "product": { "name": "dnsmasq-2.71-0.16.3.i586", "product_id": "dnsmasq-2.71-0.16.3.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "dnsmasq-2.71-0.16.3.ia64", "product": { "name": "dnsmasq-2.71-0.16.3.ia64", "product_id": "dnsmasq-2.71-0.16.3.ia64" } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "dnsmasq-2.71-0.16.3.ppc64", "product": { "name": "dnsmasq-2.71-0.16.3.ppc64", "product_id": "dnsmasq-2.71-0.16.3.ppc64" } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "dnsmasq-2.71-0.16.3.s390x", "product": { "name": "dnsmasq-2.71-0.16.3.s390x", "product_id": "dnsmasq-2.71-0.16.3.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "dnsmasq-2.71-0.16.3.x86_64", "product": { "name": "dnsmasq-2.71-0.16.3.x86_64", "product_id": "dnsmasq-2.71-0.16.3.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP4", "product": { "name": "SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_sles:11:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:11:sp4" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-2.71-0.16.3.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.71-0.16.3.i586" }, "product_reference": "dnsmasq-2.71-0.16.3.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-2.71-0.16.3.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.71-0.16.3.ia64" }, "product_reference": "dnsmasq-2.71-0.16.3.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-2.71-0.16.3.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.71-0.16.3.ppc64" }, "product_reference": "dnsmasq-2.71-0.16.3.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-2.71-0.16.3.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.71-0.16.3.s390x" }, "product_reference": "dnsmasq-2.71-0.16.3.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-2.71-0.16.3.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.71-0.16.3.x86_64" }, "product_reference": "dnsmasq-2.71-0.16.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-2.71-0.16.3.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.71-0.16.3.i586" }, "product_reference": "dnsmasq-2.71-0.16.3.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-2.71-0.16.3.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.71-0.16.3.ia64" }, "product_reference": "dnsmasq-2.71-0.16.3.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-2.71-0.16.3.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.71-0.16.3.ppc64" }, "product_reference": "dnsmasq-2.71-0.16.3.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-2.71-0.16.3.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.71-0.16.3.s390x" }, "product_reference": "dnsmasq-2.71-0.16.3.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-2.71-0.16.3.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.71-0.16.3.x86_64" }, "product_reference": "dnsmasq-2.71-0.16.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-8899", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8899" } ], "notes": [ { "category": "general", "text": "Dnsmasq before 2.76 allows remote servers to cause a denial of service (crash) via a reply with an empty DNS address that has an (1) A or (2) AAAA record defined locally.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.71-0.16.3.i586", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.71-0.16.3.ia64", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.71-0.16.3.ppc64", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.71-0.16.3.s390x", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.71-0.16.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.71-0.16.3.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.71-0.16.3.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.71-0.16.3.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.71-0.16.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.71-0.16.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8899", "url": "https://www.suse.com/security/cve/CVE-2015-8899" }, { "category": "external", "summary": "SUSE Bug 983273 for CVE-2015-8899", "url": "https://bugzilla.suse.com/983273" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.71-0.16.3.i586", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.71-0.16.3.ia64", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.71-0.16.3.ppc64", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.71-0.16.3.s390x", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.71-0.16.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.71-0.16.3.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.71-0.16.3.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.71-0.16.3.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.71-0.16.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.71-0.16.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-12-20T12:18:38Z", "details": "moderate" } ], "title": "CVE-2015-8899" } ] }
suse-su-2017:2616-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for dnsmasq", "title": "Title of the patch" }, { "category": "description", "text": "This update for dnsmasq fixes the following issues.\n\nRemedy the following security issues:\n\n- CVE-2017-14491: 2 byte heap based overflow. [bsc#1060354]\n- CVE-2017-14492: heap based overflow. [bsc#1060355]\n- CVE-2017-14493: stack based overflow. [bsc#1060360]\n- CVE-2017-14494: DHCP - info leak. [bsc#1060361]\n- CVE-2017-14495: DNS - OOM DoS. [bsc#1060362]\n- CVE-2017-14496: DNS - DoS Integer underflow. [bsc#1060364]\n- Prevent a man-in-the-middle attack (bsc#972164, fate#321175).\n\nFurthermore, the following issues have been fixed:\n\n- Fix DHCP relaying, broken in 2.76 and 2.77.\n- Update to version 2.78 (fate#321175, fate#322030, bsc#1035227).\n- Fix PXE booting for UEFI architectures (fate#322030).\n- Drop PrivateDevices=yes which breaks logging (bsc#902511, bsc#904537)\n- Build with support for DNSSEC (fate#318323, bsc#908137).\n\nPlease note that this update brings a (small) potential incompatibility in the\nhandling of \u0027basename\u0027 in --pxe-service. Please read the CHANGELOG and the\ndocumentation if you are using this option.\n\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SERVER-12-2017-1616", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2017_2616-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2017:2616-1", "url": "https://www.suse.com/support/update/announcement/2017/suse-su-20172616-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2017:2616-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2017-October/003268.html" }, { "category": "self", "summary": "SUSE Bug 1035227", "url": "https://bugzilla.suse.com/1035227" }, { "category": "self", "summary": "SUSE Bug 1060354", "url": "https://bugzilla.suse.com/1060354" }, { "category": "self", "summary": "SUSE Bug 1060355", "url": "https://bugzilla.suse.com/1060355" }, { "category": "self", "summary": "SUSE Bug 1060360", "url": "https://bugzilla.suse.com/1060360" }, { "category": "self", "summary": "SUSE Bug 1060361", "url": "https://bugzilla.suse.com/1060361" }, { "category": "self", "summary": "SUSE Bug 1060362", "url": "https://bugzilla.suse.com/1060362" }, { "category": "self", "summary": "SUSE Bug 1060364", "url": "https://bugzilla.suse.com/1060364" }, { "category": "self", "summary": "SUSE Bug 902511", "url": "https://bugzilla.suse.com/902511" }, { "category": "self", "summary": "SUSE Bug 904537", "url": "https://bugzilla.suse.com/904537" }, { "category": "self", "summary": "SUSE Bug 908137", "url": "https://bugzilla.suse.com/908137" }, { "category": "self", "summary": "SUSE Bug 972164", "url": "https://bugzilla.suse.com/972164" }, { "category": "self", "summary": "SUSE CVE CVE-2015-3294 page", "url": "https://www.suse.com/security/cve/CVE-2015-3294/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8899 page", "url": "https://www.suse.com/security/cve/CVE-2015-8899/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-14491 page", "url": "https://www.suse.com/security/cve/CVE-2017-14491/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-14492 page", "url": "https://www.suse.com/security/cve/CVE-2017-14492/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-14493 page", "url": "https://www.suse.com/security/cve/CVE-2017-14493/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-14494 page", "url": "https://www.suse.com/security/cve/CVE-2017-14494/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-14495 page", "url": "https://www.suse.com/security/cve/CVE-2017-14495/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-14496 page", "url": "https://www.suse.com/security/cve/CVE-2017-14496/" } ], "title": "Security update for dnsmasq", "tracking": { "current_release_date": "2017-10-02T13:53:30Z", "generator": { "date": "2017-10-02T13:53:30Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2017:2616-1", "initial_release_date": "2017-10-02T13:53:30Z", "revision_history": [ { "date": "2017-10-02T13:53:30Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "dnsmasq-2.78-6.6.1.ppc64le", "product": { "name": "dnsmasq-2.78-6.6.1.ppc64le", "product_id": "dnsmasq-2.78-6.6.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "dnsmasq-2.78-6.6.1.s390x", "product": { "name": "dnsmasq-2.78-6.6.1.s390x", "product_id": "dnsmasq-2.78-6.6.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "dnsmasq-2.78-6.6.1.x86_64", "product": { "name": "dnsmasq-2.78-6.6.1.x86_64", "product_id": "dnsmasq-2.78-6.6.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server 12-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-2.78-6.6.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.ppc64le" }, "product_reference": "dnsmasq-2.78-6.6.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-2.78-6.6.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.s390x" }, "product_reference": "dnsmasq-2.78-6.6.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-2.78-6.6.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.x86_64" }, "product_reference": "dnsmasq-2.78-6.6.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-3294", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-3294" } ], "notes": [ { "category": "general", "text": "The tcp_request function in Dnsmasq before 2.73rc4 does not properly handle the return value of the setup_reply function, which allows remote attackers to read process memory and cause a denial of service (out-of-bounds read and crash) via a malformed DNS request.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-3294", "url": "https://www.suse.com/security/cve/CVE-2015-3294" }, { "category": "external", "summary": "SUSE Bug 923144 for CVE-2015-3294", "url": "https://bugzilla.suse.com/923144" }, { "category": "external", "summary": "SUSE Bug 928867 for CVE-2015-3294", "url": "https://bugzilla.suse.com/928867" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-02T13:53:30Z", "details": "moderate" } ], "title": "CVE-2015-3294" }, { "cve": "CVE-2015-8899", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8899" } ], "notes": [ { "category": "general", "text": "Dnsmasq before 2.76 allows remote servers to cause a denial of service (crash) via a reply with an empty DNS address that has an (1) A or (2) AAAA record defined locally.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8899", "url": "https://www.suse.com/security/cve/CVE-2015-8899" }, { "category": "external", "summary": "SUSE Bug 983273 for CVE-2015-8899", "url": "https://bugzilla.suse.com/983273" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-02T13:53:30Z", "details": "moderate" } ], "title": "CVE-2015-8899" }, { "cve": "CVE-2017-14491", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-14491" } ], "notes": [ { "category": "general", "text": "Heap-based buffer overflow in dnsmasq before 2.78 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted DNS response.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-14491", "url": "https://www.suse.com/security/cve/CVE-2017-14491" }, { "category": "external", "summary": "SUSE Bug 1060354 for CVE-2017-14491", "url": "https://bugzilla.suse.com/1060354" }, { "category": "external", "summary": "SUSE Bug 1060360 for CVE-2017-14491", "url": "https://bugzilla.suse.com/1060360" }, { "category": "external", "summary": "SUSE Bug 1060361 for CVE-2017-14491", "url": "https://bugzilla.suse.com/1060361" }, { "category": "external", "summary": "SUSE Bug 1060362 for CVE-2017-14491", "url": "https://bugzilla.suse.com/1060362" }, { "category": "external", "summary": "SUSE Bug 1060364 for CVE-2017-14491", "url": "https://bugzilla.suse.com/1060364" }, { "category": "external", "summary": "SUSE Bug 1063832 for CVE-2017-14491", "url": "https://bugzilla.suse.com/1063832" }, { "category": "external", "summary": "SUSE Bug 1143944 for CVE-2017-14491", "url": "https://bugzilla.suse.com/1143944" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-02T13:53:30Z", "details": "moderate" } ], "title": "CVE-2017-14491" }, { "cve": "CVE-2017-14492", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-14492" } ], "notes": [ { "category": "general", "text": "Heap-based buffer overflow in dnsmasq before 2.78 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted IPv6 router advertisement request.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-14492", "url": "https://www.suse.com/security/cve/CVE-2017-14492" }, { "category": "external", "summary": "SUSE Bug 1060355 for CVE-2017-14492", "url": "https://bugzilla.suse.com/1060355" }, { "category": "external", "summary": "SUSE Bug 1060360 for CVE-2017-14492", "url": "https://bugzilla.suse.com/1060360" }, { "category": "external", "summary": "SUSE Bug 1060361 for CVE-2017-14492", "url": "https://bugzilla.suse.com/1060361" }, { "category": "external", "summary": "SUSE Bug 1060362 for CVE-2017-14492", "url": "https://bugzilla.suse.com/1060362" }, { "category": "external", "summary": "SUSE Bug 1060364 for CVE-2017-14492", "url": "https://bugzilla.suse.com/1060364" }, { "category": "external", "summary": "SUSE Bug 1063832 for CVE-2017-14492", "url": "https://bugzilla.suse.com/1063832" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-02T13:53:30Z", "details": "moderate" } ], "title": "CVE-2017-14492" }, { "cve": "CVE-2017-14493", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-14493" } ], "notes": [ { "category": "general", "text": "Stack-based buffer overflow in dnsmasq before 2.78 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted DHCPv6 request.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-14493", "url": "https://www.suse.com/security/cve/CVE-2017-14493" }, { "category": "external", "summary": "SUSE Bug 1060360 for CVE-2017-14493", "url": "https://bugzilla.suse.com/1060360" }, { "category": "external", "summary": "SUSE Bug 1060361 for CVE-2017-14493", "url": "https://bugzilla.suse.com/1060361" }, { "category": "external", "summary": "SUSE Bug 1060362 for CVE-2017-14493", "url": "https://bugzilla.suse.com/1060362" }, { "category": "external", "summary": "SUSE Bug 1060364 for CVE-2017-14493", "url": "https://bugzilla.suse.com/1060364" }, { "category": "external", "summary": "SUSE Bug 1063832 for CVE-2017-14493", "url": "https://bugzilla.suse.com/1063832" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-02T13:53:30Z", "details": "moderate" } ], "title": "CVE-2017-14493" }, { "cve": "CVE-2017-14494", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-14494" } ], "notes": [ { "category": "general", "text": "dnsmasq before 2.78, when configured as a relay, allows remote attackers to obtain sensitive memory information via vectors involving handling DHCPv6 forwarded requests.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-14494", "url": "https://www.suse.com/security/cve/CVE-2017-14494" }, { "category": "external", "summary": "SUSE Bug 1060360 for CVE-2017-14494", "url": "https://bugzilla.suse.com/1060360" }, { "category": "external", "summary": "SUSE Bug 1060361 for CVE-2017-14494", "url": "https://bugzilla.suse.com/1060361" }, { "category": "external", "summary": "SUSE Bug 1060362 for CVE-2017-14494", "url": "https://bugzilla.suse.com/1060362" }, { "category": "external", "summary": "SUSE Bug 1060364 for CVE-2017-14494", "url": "https://bugzilla.suse.com/1060364" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-02T13:53:30Z", "details": "moderate" } ], "title": "CVE-2017-14494" }, { "cve": "CVE-2017-14495", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-14495" } ], "notes": [ { "category": "general", "text": "Memory leak in dnsmasq before 2.78, when the --add-mac, --add-cpe-id or --add-subnet option is specified, allows remote attackers to cause a denial of service (memory consumption) via vectors involving DNS response creation.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-14495", "url": "https://www.suse.com/security/cve/CVE-2017-14495" }, { "category": "external", "summary": "SUSE Bug 1060360 for CVE-2017-14495", "url": "https://bugzilla.suse.com/1060360" }, { "category": "external", "summary": "SUSE Bug 1060361 for CVE-2017-14495", "url": "https://bugzilla.suse.com/1060361" }, { "category": "external", "summary": "SUSE Bug 1060362 for CVE-2017-14495", "url": "https://bugzilla.suse.com/1060362" }, { "category": "external", "summary": "SUSE Bug 1060364 for CVE-2017-14495", "url": "https://bugzilla.suse.com/1060364" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-02T13:53:30Z", "details": "important" } ], "title": "CVE-2017-14495" }, { "cve": "CVE-2017-14496", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-14496" } ], "notes": [ { "category": "general", "text": "Integer underflow in the add_pseudoheader function in dnsmasq before 2.78 , when the --add-mac, --add-cpe-id or --add-subnet option is specified, allows remote attackers to cause a denial of service via a crafted DNS request.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-14496", "url": "https://www.suse.com/security/cve/CVE-2017-14496" }, { "category": "external", "summary": "SUSE Bug 1060360 for CVE-2017-14496", "url": "https://bugzilla.suse.com/1060360" }, { "category": "external", "summary": "SUSE Bug 1060361 for CVE-2017-14496", "url": "https://bugzilla.suse.com/1060361" }, { "category": "external", "summary": "SUSE Bug 1060362 for CVE-2017-14496", "url": "https://bugzilla.suse.com/1060362" }, { "category": "external", "summary": "SUSE Bug 1060364 for CVE-2017-14496", "url": "https://bugzilla.suse.com/1060364" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-02T13:53:30Z", "details": "important" } ], "title": "CVE-2017-14496" } ] }
suse-su-2016:3257-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for dnsmasq", "title": "Title of the patch" }, { "category": "description", "text": "This update for dnsmasq fixes the following issues:\n\n- CVE-2015-8899: Denial of service between local and remote dns entries (bsc#983273)\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE12-CLOUD-5-2016-1906", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_3257-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2016:3257-1", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20163257-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2016:3257-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2016-December/002521.html" }, { "category": "self", "summary": "SUSE Bug 983273", "url": "https://bugzilla.suse.com/983273" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8899 page", "url": "https://www.suse.com/security/cve/CVE-2015-8899/" } ], "title": "Security update for dnsmasq", "tracking": { "current_release_date": "2016-12-23T11:31:23Z", "generator": { "date": "2016-12-23T11:31:23Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2016:3257-1", "initial_release_date": "2016-12-23T11:31:23Z", "revision_history": [ { "date": "2016-12-23T11:31:23Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "dnsmasq-utils-2.71-6.3.1.x86_64", "product": { "name": "dnsmasq-utils-2.71-6.3.1.x86_64", "product_id": "dnsmasq-utils-2.71-6.3.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Cloud Compute Node for SUSE Linux Enterprise 12 5", "product": { "name": "SUSE Cloud Compute Node for SUSE Linux Enterprise 12 5", "product_id": "SUSE Cloud Compute Node for SUSE Linux Enterprise 12 5", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-sle12-cloud-compute:5" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-2.71-6.3.1.x86_64 as component of SUSE Cloud Compute Node for SUSE Linux Enterprise 12 5", "product_id": "SUSE Cloud Compute Node for SUSE Linux Enterprise 12 5:dnsmasq-utils-2.71-6.3.1.x86_64" }, "product_reference": "dnsmasq-utils-2.71-6.3.1.x86_64", "relates_to_product_reference": "SUSE Cloud Compute Node for SUSE Linux Enterprise 12 5" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-8899", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8899" } ], "notes": [ { "category": "general", "text": "Dnsmasq before 2.76 allows remote servers to cause a denial of service (crash) via a reply with an empty DNS address that has an (1) A or (2) AAAA record defined locally.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Cloud Compute Node for SUSE Linux Enterprise 12 5:dnsmasq-utils-2.71-6.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8899", "url": "https://www.suse.com/security/cve/CVE-2015-8899" }, { "category": "external", "summary": "SUSE Bug 983273 for CVE-2015-8899", "url": "https://bugzilla.suse.com/983273" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Cloud Compute Node for SUSE Linux Enterprise 12 5:dnsmasq-utils-2.71-6.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-12-23T11:31:23Z", "details": "moderate" } ], "title": "CVE-2015-8899" } ] }
suse-su-2017:2619-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for dnsmasq", "title": "Title of the patch" }, { "category": "description", "text": "This update for dnsmasq fixes the following security issues:\n\n- CVE-2017-14491: 2 byte heap based overflow. [bsc#1060354]\n- CVE-2017-14492: heap based overflow. [bsc#1060355]\n- CVE-2017-14493: stack based overflow. [bsc#1060360]\n- CVE-2017-14494: DHCP - info leak. [bsc#1060361]\n- CVE-2017-14495: DNS - OOM DoS. [bsc#1060362]\n- CVE-2017-14496: DNS - DoS Integer underflow. [bsc#1060364]\n\nThis update brings a (small) potential incompatibility in the handling of\n\u0027basename\u0027 in --pxe-service. Please read the CHANGELOG and the documentation if\nyou are using this option.\n", "title": "Description of the patch" }, { "category": "details", "text": "slessp4-dnsmasq-13294", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2017_2619-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2017:2619-1", "url": "https://www.suse.com/support/update/announcement/2017/suse-su-20172619-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2017:2619-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2017-October/003271.html" }, { "category": "self", "summary": "SUSE Bug 1060354", "url": "https://bugzilla.suse.com/1060354" }, { "category": "self", "summary": "SUSE Bug 1060355", "url": "https://bugzilla.suse.com/1060355" }, { "category": "self", "summary": "SUSE Bug 1060360", "url": "https://bugzilla.suse.com/1060360" }, { "category": "self", "summary": "SUSE Bug 1060361", "url": "https://bugzilla.suse.com/1060361" }, { "category": "self", "summary": "SUSE Bug 1060362", "url": "https://bugzilla.suse.com/1060362" }, { "category": "self", "summary": "SUSE Bug 1060364", "url": "https://bugzilla.suse.com/1060364" }, { "category": "self", "summary": "SUSE CVE CVE-2015-3294 page", "url": "https://www.suse.com/security/cve/CVE-2015-3294/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8899 page", "url": "https://www.suse.com/security/cve/CVE-2015-8899/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-14491 page", "url": "https://www.suse.com/security/cve/CVE-2017-14491/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-14492 page", "url": "https://www.suse.com/security/cve/CVE-2017-14492/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-14493 page", "url": "https://www.suse.com/security/cve/CVE-2017-14493/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-14494 page", "url": "https://www.suse.com/security/cve/CVE-2017-14494/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-14495 page", "url": "https://www.suse.com/security/cve/CVE-2017-14495/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-14496 page", "url": "https://www.suse.com/security/cve/CVE-2017-14496/" } ], "title": "Security update for dnsmasq", "tracking": { "current_release_date": "2017-10-02T13:51:46Z", "generator": { "date": "2017-10-02T13:51:46Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2017:2619-1", "initial_release_date": "2017-10-02T13:51:46Z", "revision_history": [ { "date": "2017-10-02T13:51:46Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "dnsmasq-2.78-0.17.5.1.i586", "product": { "name": "dnsmasq-2.78-0.17.5.1.i586", "product_id": "dnsmasq-2.78-0.17.5.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "dnsmasq-2.78-0.17.5.1.ia64", "product": { "name": "dnsmasq-2.78-0.17.5.1.ia64", "product_id": "dnsmasq-2.78-0.17.5.1.ia64" } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "dnsmasq-2.78-0.17.5.1.ppc64", "product": { "name": "dnsmasq-2.78-0.17.5.1.ppc64", "product_id": "dnsmasq-2.78-0.17.5.1.ppc64" } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "dnsmasq-2.78-0.17.5.1.s390x", "product": { "name": "dnsmasq-2.78-0.17.5.1.s390x", "product_id": "dnsmasq-2.78-0.17.5.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "dnsmasq-2.78-0.17.5.1.x86_64", "product": { "name": "dnsmasq-2.78-0.17.5.1.x86_64", "product_id": "dnsmasq-2.78-0.17.5.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP4", "product": { "name": "SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_sles:11:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:11:sp4" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-2.78-0.17.5.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.i586" }, "product_reference": "dnsmasq-2.78-0.17.5.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-2.78-0.17.5.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.ia64" }, "product_reference": "dnsmasq-2.78-0.17.5.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-2.78-0.17.5.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.ppc64" }, "product_reference": "dnsmasq-2.78-0.17.5.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-2.78-0.17.5.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.s390x" }, "product_reference": "dnsmasq-2.78-0.17.5.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-2.78-0.17.5.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.x86_64" }, "product_reference": "dnsmasq-2.78-0.17.5.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-2.78-0.17.5.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.i586" }, "product_reference": "dnsmasq-2.78-0.17.5.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-2.78-0.17.5.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.ia64" }, "product_reference": "dnsmasq-2.78-0.17.5.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-2.78-0.17.5.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.ppc64" }, "product_reference": "dnsmasq-2.78-0.17.5.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-2.78-0.17.5.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.s390x" }, "product_reference": "dnsmasq-2.78-0.17.5.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-2.78-0.17.5.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.x86_64" }, "product_reference": "dnsmasq-2.78-0.17.5.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-3294", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-3294" } ], "notes": [ { "category": "general", "text": "The tcp_request function in Dnsmasq before 2.73rc4 does not properly handle the return value of the setup_reply function, which allows remote attackers to read process memory and cause a denial of service (out-of-bounds read and crash) via a malformed DNS request.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.i586", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.ia64", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.s390x", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-3294", "url": "https://www.suse.com/security/cve/CVE-2015-3294" }, { "category": "external", "summary": "SUSE Bug 923144 for CVE-2015-3294", "url": "https://bugzilla.suse.com/923144" }, { "category": "external", "summary": "SUSE Bug 928867 for CVE-2015-3294", "url": "https://bugzilla.suse.com/928867" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.i586", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.ia64", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.s390x", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-02T13:51:46Z", "details": "moderate" } ], "title": "CVE-2015-3294" }, { "cve": "CVE-2015-8899", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8899" } ], "notes": [ { "category": "general", "text": "Dnsmasq before 2.76 allows remote servers to cause a denial of service (crash) via a reply with an empty DNS address that has an (1) A or (2) AAAA record defined locally.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.i586", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.ia64", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.s390x", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8899", "url": "https://www.suse.com/security/cve/CVE-2015-8899" }, { "category": "external", "summary": "SUSE Bug 983273 for CVE-2015-8899", "url": "https://bugzilla.suse.com/983273" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.i586", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.ia64", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.s390x", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-02T13:51:46Z", "details": "moderate" } ], "title": "CVE-2015-8899" }, { "cve": "CVE-2017-14491", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-14491" } ], "notes": [ { "category": "general", "text": "Heap-based buffer overflow in dnsmasq before 2.78 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted DNS response.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.i586", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.ia64", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.s390x", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-14491", "url": "https://www.suse.com/security/cve/CVE-2017-14491" }, { "category": "external", "summary": "SUSE Bug 1060354 for CVE-2017-14491", "url": "https://bugzilla.suse.com/1060354" }, { "category": "external", "summary": "SUSE Bug 1060360 for CVE-2017-14491", "url": "https://bugzilla.suse.com/1060360" }, { "category": "external", "summary": "SUSE Bug 1060361 for CVE-2017-14491", "url": "https://bugzilla.suse.com/1060361" }, { "category": "external", "summary": "SUSE Bug 1060362 for CVE-2017-14491", "url": "https://bugzilla.suse.com/1060362" }, { "category": "external", "summary": "SUSE Bug 1060364 for CVE-2017-14491", "url": "https://bugzilla.suse.com/1060364" }, { "category": "external", "summary": "SUSE Bug 1063832 for CVE-2017-14491", "url": "https://bugzilla.suse.com/1063832" }, { "category": "external", "summary": "SUSE Bug 1143944 for CVE-2017-14491", "url": "https://bugzilla.suse.com/1143944" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.i586", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.ia64", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.s390x", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.i586", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.ia64", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.s390x", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-02T13:51:46Z", "details": "moderate" } ], "title": "CVE-2017-14491" }, { "cve": "CVE-2017-14492", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-14492" } ], "notes": [ { "category": "general", "text": "Heap-based buffer overflow in dnsmasq before 2.78 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted IPv6 router advertisement request.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.i586", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.ia64", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.s390x", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-14492", "url": "https://www.suse.com/security/cve/CVE-2017-14492" }, { "category": "external", "summary": "SUSE Bug 1060355 for CVE-2017-14492", "url": "https://bugzilla.suse.com/1060355" }, { "category": "external", "summary": "SUSE Bug 1060360 for CVE-2017-14492", "url": "https://bugzilla.suse.com/1060360" }, { "category": "external", "summary": "SUSE Bug 1060361 for CVE-2017-14492", "url": "https://bugzilla.suse.com/1060361" }, { "category": "external", "summary": "SUSE Bug 1060362 for CVE-2017-14492", "url": "https://bugzilla.suse.com/1060362" }, { "category": "external", "summary": "SUSE Bug 1060364 for CVE-2017-14492", "url": "https://bugzilla.suse.com/1060364" }, { "category": "external", "summary": "SUSE Bug 1063832 for CVE-2017-14492", "url": "https://bugzilla.suse.com/1063832" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.i586", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.ia64", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.s390x", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.i586", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.ia64", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.s390x", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-02T13:51:46Z", "details": "moderate" } ], "title": "CVE-2017-14492" }, { "cve": "CVE-2017-14493", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-14493" } ], "notes": [ { "category": "general", "text": "Stack-based buffer overflow in dnsmasq before 2.78 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted DHCPv6 request.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.i586", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.ia64", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.s390x", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-14493", "url": "https://www.suse.com/security/cve/CVE-2017-14493" }, { "category": "external", "summary": "SUSE Bug 1060360 for CVE-2017-14493", "url": "https://bugzilla.suse.com/1060360" }, { "category": "external", "summary": "SUSE Bug 1060361 for CVE-2017-14493", "url": "https://bugzilla.suse.com/1060361" }, { "category": "external", "summary": "SUSE Bug 1060362 for CVE-2017-14493", "url": "https://bugzilla.suse.com/1060362" }, { "category": "external", "summary": "SUSE Bug 1060364 for CVE-2017-14493", "url": "https://bugzilla.suse.com/1060364" }, { "category": "external", "summary": "SUSE Bug 1063832 for CVE-2017-14493", "url": "https://bugzilla.suse.com/1063832" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.i586", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.ia64", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.s390x", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.i586", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.ia64", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.s390x", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-02T13:51:46Z", "details": "moderate" } ], "title": "CVE-2017-14493" }, { "cve": "CVE-2017-14494", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-14494" } ], "notes": [ { "category": "general", "text": "dnsmasq before 2.78, when configured as a relay, allows remote attackers to obtain sensitive memory information via vectors involving handling DHCPv6 forwarded requests.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.i586", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.ia64", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.s390x", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-14494", "url": "https://www.suse.com/security/cve/CVE-2017-14494" }, { "category": "external", "summary": "SUSE Bug 1060360 for CVE-2017-14494", "url": "https://bugzilla.suse.com/1060360" }, { "category": "external", "summary": "SUSE Bug 1060361 for CVE-2017-14494", "url": "https://bugzilla.suse.com/1060361" }, { "category": "external", "summary": "SUSE Bug 1060362 for CVE-2017-14494", "url": "https://bugzilla.suse.com/1060362" }, { "category": "external", "summary": "SUSE Bug 1060364 for CVE-2017-14494", "url": "https://bugzilla.suse.com/1060364" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.i586", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.ia64", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.s390x", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.i586", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.ia64", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.s390x", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-02T13:51:46Z", "details": "moderate" } ], "title": "CVE-2017-14494" }, { "cve": "CVE-2017-14495", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-14495" } ], "notes": [ { "category": "general", "text": "Memory leak in dnsmasq before 2.78, when the --add-mac, --add-cpe-id or --add-subnet option is specified, allows remote attackers to cause a denial of service (memory consumption) via vectors involving DNS response creation.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.i586", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.ia64", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.s390x", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-14495", "url": "https://www.suse.com/security/cve/CVE-2017-14495" }, { "category": "external", "summary": "SUSE Bug 1060360 for CVE-2017-14495", "url": "https://bugzilla.suse.com/1060360" }, { "category": "external", "summary": "SUSE Bug 1060361 for CVE-2017-14495", "url": "https://bugzilla.suse.com/1060361" }, { "category": "external", "summary": "SUSE Bug 1060362 for CVE-2017-14495", "url": "https://bugzilla.suse.com/1060362" }, { "category": "external", "summary": "SUSE Bug 1060364 for CVE-2017-14495", "url": "https://bugzilla.suse.com/1060364" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.i586", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.ia64", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.s390x", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.i586", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.ia64", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.s390x", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-02T13:51:46Z", "details": "important" } ], "title": "CVE-2017-14495" }, { "cve": "CVE-2017-14496", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-14496" } ], "notes": [ { "category": "general", "text": "Integer underflow in the add_pseudoheader function in dnsmasq before 2.78 , when the --add-mac, --add-cpe-id or --add-subnet option is specified, allows remote attackers to cause a denial of service via a crafted DNS request.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.i586", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.ia64", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.s390x", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-14496", "url": "https://www.suse.com/security/cve/CVE-2017-14496" }, { "category": "external", "summary": "SUSE Bug 1060360 for CVE-2017-14496", "url": "https://bugzilla.suse.com/1060360" }, { "category": "external", "summary": "SUSE Bug 1060361 for CVE-2017-14496", "url": "https://bugzilla.suse.com/1060361" }, { "category": "external", "summary": "SUSE Bug 1060362 for CVE-2017-14496", "url": "https://bugzilla.suse.com/1060362" }, { "category": "external", "summary": "SUSE Bug 1060364 for CVE-2017-14496", "url": "https://bugzilla.suse.com/1060364" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.i586", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.ia64", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.s390x", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.i586", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.ia64", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.s390x", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-02T13:51:46Z", "details": "important" } ], "title": "CVE-2017-14496" } ] }
fkie_cve-2015-8899
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
canonical | ubuntu_linux | 15.10 | |
canonical | ubuntu_linux | 16.04 | |
thekelleys | dnsmasq | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*", "matchCriteriaId": "E88A537F-F4D0-46B9-9E37-965233C2A355", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "matchCriteriaId": "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:thekelleys:dnsmasq:*:*:*:*:*:*:*:*", "matchCriteriaId": "B705C85C-B580-43B5-AAAA-CBA10885BB22", "versionEndIncluding": "2.75", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Dnsmasq before 2.76 allows remote servers to cause a denial of service (crash) via a reply with an empty DNS address that has an (1) A or (2) AAAA record defined locally." }, { "lang": "es", "value": "Dnsmasq en versiones anteriores a 2.76 permite a servidores remotos provocar una denegaci\u00f3n de servicio (ca\u00edda) a trav\u00e9s de una respuesta con una direcci\u00f3n DNS vac\u00eda que tiene una grabaci\u00f3n (1) A o (2) AAAA definida localmente." } ], "id": "CVE-2015-8899", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2016-06-30T17:59:00.157", "references": [ { "source": "security@ubuntu.com", "url": "http://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2016q2/010479.html" }, { "source": "security@ubuntu.com", "url": "http://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2016q2/010505.html" }, { "source": "security@ubuntu.com", "url": "http://thekelleys.org.uk/gitweb/?p=dnsmasq.git%3Ba=commit%3Bh=41a8d9e99be9f2cc8b02051dd322cb45e0faac87" }, { "source": "security@ubuntu.com", "url": "http://www.openwall.com/lists/oss-security/2016/06/03/7" }, { "source": "security@ubuntu.com", "url": "http://www.openwall.com/lists/oss-security/2016/06/04/2" }, { "source": "security@ubuntu.com", "url": "http://www.securityfocus.com/bid/91031" }, { "source": "security@ubuntu.com", "url": "http://www.securitytracker.com/id/1036045" }, { "source": "security@ubuntu.com", "url": "http://www.ubuntu.com/usn/USN-3009-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2016q2/010479.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2016q2/010505.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://thekelleys.org.uk/gitweb/?p=dnsmasq.git%3Ba=commit%3Bh=41a8d9e99be9f2cc8b02051dd322cb45e0faac87" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2016/06/03/7" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2016/06/04/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/91031" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1036045" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-3009-1" } ], "sourceIdentifier": "security@ubuntu.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
cnvd-2016-03870
Vulnerability from cnvd
Title: Dnsmasq拒绝服务漏洞
Description:
Dnsmasq是软件开发者Simon Kelley所研发的一款使用C语言编写的开源轻量级DNS转发和DHCP、TFTP服务器。
Dnsmasq 2.75版本中存在拒绝服务漏洞。攻击者可利用该漏洞造成拒绝服务。
Severity: 中
Patch Name: Dnsmasq拒绝服务漏洞的补丁
Patch Description:
Dnsmasq是软件开发者Simon Kelley所研发的一款使用C语言编写的开源轻量级DNS转发和DHCP、TFTP服务器。
Dnsmasq 2.75版本中存在拒绝服务漏洞。攻击者可利用该漏洞造成拒绝服务。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description:
目前厂商已经发布了升级补丁以修复此安全问题,补丁获取链接: http://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2016q2/010479.html
Reference: http://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2016q2/010479.html http://www.openwall.com/lists/oss-security/2016/06/04/2
Name | Dnsmasq Dnsmasq 2.75 |
---|
{ "cves": { "cve": { "cveNumber": "CVE-2015-8899" } }, "description": "Dnsmasq\u662f\u8f6f\u4ef6\u5f00\u53d1\u8005Simon Kelley\u6240\u7814\u53d1\u7684\u4e00\u6b3e\u4f7f\u7528C\u8bed\u8a00\u7f16\u5199\u7684\u5f00\u6e90\u8f7b\u91cf\u7ea7DNS\u8f6c\u53d1\u548cDHCP\u3001TFTP\u670d\u52a1\u5668\u3002\r\n\r\nDnsmasq 2.75\u7248\u672c\u4e2d\u5b58\u5728\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e\u3002\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u9020\u6210\u62d2\u7edd\u670d\u52a1\u3002", "discovererName": "unknown", "formalWay": "\u76ee\u524d\u5382\u5546\u5df2\u7ecf\u53d1\u5e03\u4e86\u5347\u7ea7\u8865\u4e01\u4ee5\u4fee\u590d\u6b64\u5b89\u5168\u95ee\u9898\uff0c\u8865\u4e01\u83b7\u53d6\u94fe\u63a5\uff1a\r\nhttp://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2016q2/010479.html", "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e", "number": "CNVD-2016-03870", "openTime": "2016-06-08", "patchDescription": "Dnsmasq\u662f\u8f6f\u4ef6\u5f00\u53d1\u8005Simon Kelley\u6240\u7814\u53d1\u7684\u4e00\u6b3e\u4f7f\u7528C\u8bed\u8a00\u7f16\u5199\u7684\u5f00\u6e90\u8f7b\u91cf\u7ea7DNS\u8f6c\u53d1\u548cDHCP\u3001TFTP\u670d\u52a1\u5668\u3002\r\n\r\nDnsmasq 2.75\u7248\u672c\u4e2d\u5b58\u5728\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e\u3002\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u9020\u6210\u62d2\u7edd\u670d\u52a1\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002", "patchName": "Dnsmasq\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e\u7684\u8865\u4e01", "products": { "product": "Dnsmasq Dnsmasq 2.75" }, "referenceLink": "http://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2016q2/010479.html\r\nhttp://www.openwall.com/lists/oss-security/2016/06/04/2", "serverity": "\u4e2d", "submitTime": "2016-06-07", "title": "Dnsmasq\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e" }
opensuse-su-2024:10195-1
Vulnerability from csaf_opensuse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "dnsmasq-2.76-1.3 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the dnsmasq-2.76-1.3 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2024-10195", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10195-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2015-3294 page", "url": "https://www.suse.com/security/cve/CVE-2015-3294/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8899 page", "url": "https://www.suse.com/security/cve/CVE-2015-8899/" } ], "title": "dnsmasq-2.76-1.3 on GA media", "tracking": { "current_release_date": "2024-06-15T00:00:00Z", "generator": { "date": "2024-06-15T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2024:10195-1", "initial_release_date": "2024-06-15T00:00:00Z", "revision_history": [ { "date": "2024-06-15T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "dnsmasq-2.76-1.3.aarch64", "product": { "name": "dnsmasq-2.76-1.3.aarch64", "product_id": "dnsmasq-2.76-1.3.aarch64" } }, { "category": "product_version", "name": "dnsmasq-utils-2.76-1.3.aarch64", "product": { "name": "dnsmasq-utils-2.76-1.3.aarch64", "product_id": "dnsmasq-utils-2.76-1.3.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "dnsmasq-2.76-1.3.ppc64le", "product": { "name": "dnsmasq-2.76-1.3.ppc64le", "product_id": "dnsmasq-2.76-1.3.ppc64le" } }, { "category": "product_version", "name": "dnsmasq-utils-2.76-1.3.ppc64le", "product": { "name": "dnsmasq-utils-2.76-1.3.ppc64le", "product_id": "dnsmasq-utils-2.76-1.3.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "dnsmasq-2.76-1.3.s390x", "product": { "name": "dnsmasq-2.76-1.3.s390x", "product_id": "dnsmasq-2.76-1.3.s390x" } }, { "category": "product_version", "name": "dnsmasq-utils-2.76-1.3.s390x", "product": { "name": "dnsmasq-utils-2.76-1.3.s390x", "product_id": "dnsmasq-utils-2.76-1.3.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "dnsmasq-2.76-1.3.x86_64", "product": { "name": "dnsmasq-2.76-1.3.x86_64", "product_id": "dnsmasq-2.76-1.3.x86_64" } }, { "category": "product_version", "name": "dnsmasq-utils-2.76-1.3.x86_64", "product": { "name": "dnsmasq-utils-2.76-1.3.x86_64", "product_id": "dnsmasq-utils-2.76-1.3.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-2.76-1.3.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:dnsmasq-2.76-1.3.aarch64" }, "product_reference": "dnsmasq-2.76-1.3.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-2.76-1.3.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:dnsmasq-2.76-1.3.ppc64le" }, "product_reference": "dnsmasq-2.76-1.3.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-2.76-1.3.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:dnsmasq-2.76-1.3.s390x" }, "product_reference": "dnsmasq-2.76-1.3.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-2.76-1.3.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:dnsmasq-2.76-1.3.x86_64" }, "product_reference": "dnsmasq-2.76-1.3.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-2.76-1.3.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:dnsmasq-utils-2.76-1.3.aarch64" }, "product_reference": "dnsmasq-utils-2.76-1.3.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-2.76-1.3.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:dnsmasq-utils-2.76-1.3.ppc64le" }, "product_reference": "dnsmasq-utils-2.76-1.3.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-2.76-1.3.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:dnsmasq-utils-2.76-1.3.s390x" }, "product_reference": "dnsmasq-utils-2.76-1.3.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-2.76-1.3.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:dnsmasq-utils-2.76-1.3.x86_64" }, "product_reference": "dnsmasq-utils-2.76-1.3.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-3294", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-3294" } ], "notes": [ { "category": "general", "text": "The tcp_request function in Dnsmasq before 2.73rc4 does not properly handle the return value of the setup_reply function, which allows remote attackers to read process memory and cause a denial of service (out-of-bounds read and crash) via a malformed DNS request.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:dnsmasq-2.76-1.3.aarch64", "openSUSE Tumbleweed:dnsmasq-2.76-1.3.ppc64le", "openSUSE Tumbleweed:dnsmasq-2.76-1.3.s390x", "openSUSE Tumbleweed:dnsmasq-2.76-1.3.x86_64", "openSUSE Tumbleweed:dnsmasq-utils-2.76-1.3.aarch64", "openSUSE Tumbleweed:dnsmasq-utils-2.76-1.3.ppc64le", "openSUSE Tumbleweed:dnsmasq-utils-2.76-1.3.s390x", "openSUSE Tumbleweed:dnsmasq-utils-2.76-1.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-3294", "url": "https://www.suse.com/security/cve/CVE-2015-3294" }, { "category": "external", "summary": "SUSE Bug 923144 for CVE-2015-3294", "url": "https://bugzilla.suse.com/923144" }, { "category": "external", "summary": "SUSE Bug 928867 for CVE-2015-3294", "url": "https://bugzilla.suse.com/928867" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:dnsmasq-2.76-1.3.aarch64", "openSUSE Tumbleweed:dnsmasq-2.76-1.3.ppc64le", "openSUSE Tumbleweed:dnsmasq-2.76-1.3.s390x", "openSUSE Tumbleweed:dnsmasq-2.76-1.3.x86_64", "openSUSE Tumbleweed:dnsmasq-utils-2.76-1.3.aarch64", "openSUSE Tumbleweed:dnsmasq-utils-2.76-1.3.ppc64le", "openSUSE Tumbleweed:dnsmasq-utils-2.76-1.3.s390x", "openSUSE Tumbleweed:dnsmasq-utils-2.76-1.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2015-3294" }, { "cve": "CVE-2015-8899", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8899" } ], "notes": [ { "category": "general", "text": "Dnsmasq before 2.76 allows remote servers to cause a denial of service (crash) via a reply with an empty DNS address that has an (1) A or (2) AAAA record defined locally.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:dnsmasq-2.76-1.3.aarch64", "openSUSE Tumbleweed:dnsmasq-2.76-1.3.ppc64le", "openSUSE Tumbleweed:dnsmasq-2.76-1.3.s390x", "openSUSE Tumbleweed:dnsmasq-2.76-1.3.x86_64", "openSUSE Tumbleweed:dnsmasq-utils-2.76-1.3.aarch64", "openSUSE Tumbleweed:dnsmasq-utils-2.76-1.3.ppc64le", "openSUSE Tumbleweed:dnsmasq-utils-2.76-1.3.s390x", "openSUSE Tumbleweed:dnsmasq-utils-2.76-1.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8899", "url": "https://www.suse.com/security/cve/CVE-2015-8899" }, { "category": "external", "summary": "SUSE Bug 983273 for CVE-2015-8899", "url": "https://bugzilla.suse.com/983273" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:dnsmasq-2.76-1.3.aarch64", "openSUSE Tumbleweed:dnsmasq-2.76-1.3.ppc64le", "openSUSE Tumbleweed:dnsmasq-2.76-1.3.s390x", "openSUSE Tumbleweed:dnsmasq-2.76-1.3.x86_64", "openSUSE Tumbleweed:dnsmasq-utils-2.76-1.3.aarch64", "openSUSE Tumbleweed:dnsmasq-utils-2.76-1.3.ppc64le", "openSUSE Tumbleweed:dnsmasq-utils-2.76-1.3.s390x", "openSUSE Tumbleweed:dnsmasq-utils-2.76-1.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2015-8899" } ] }
gsd-2015-8899
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2015-8899", "description": "Dnsmasq before 2.76 allows remote servers to cause a denial of service (crash) via a reply with an empty DNS address that has an (1) A or (2) AAAA record defined locally.", "id": "GSD-2015-8899", "references": [ "https://www.suse.com/security/cve/CVE-2015-8899.html", "https://ubuntu.com/security/CVE-2015-8899" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2015-8899" ], "details": "Dnsmasq before 2.76 allows remote servers to cause a denial of service (crash) via a reply with an empty DNS address that has an (1) A or (2) AAAA record defined locally.", "id": "GSD-2015-8899", "modified": "2023-12-13T01:20:03.751827Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "security@ubuntu.com", "ID": "CVE-2015-8899", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Dnsmasq before 2.76 allows remote servers to cause a denial of service (crash) via a reply with an empty DNS address that has an (1) A or (2) AAAA record defined locally." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "91031", "refsource": "BID", "url": "http://www.securityfocus.com/bid/91031" }, { "name": "[Dnsmasq-discuss] 20160418 Dnsmasq 2.75 on Ubuntu 16.04 crashes reproducibly", "refsource": "MLIST", "url": "http://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2016q2/010479.html" }, { "name": "USN-3009-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-3009-1" }, { "name": "[Dnsmasq-discuss] 20160503 Dnsmasq 2.75 on Ubuntu 16.04 crashes reproducibly", "refsource": "MLIST", "url": "http://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2016q2/010505.html" }, { "name": "[oss-security] 20160603 Re: CVE Request: Dnsmasq denial of service", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2016/06/04/2" }, { "name": "1036045", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1036045" }, { "name": "http://thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=commit;h=41a8d9e99be9f2cc8b02051dd322cb45e0faac87", "refsource": "CONFIRM", "url": "http://thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=commit;h=41a8d9e99be9f2cc8b02051dd322cb45e0faac87" }, { "name": "[oss-security] 20160603 CVE Request: Dnsmasq denial of service", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2016/06/03/7" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:thekelleys:dnsmasq:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.75", "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "security@ubuntu.com", "ID": "CVE-2015-8899" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "Dnsmasq before 2.76 allows remote servers to cause a denial of service (crash) via a reply with an empty DNS address that has an (1) A or (2) AAAA record defined locally." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-20" } ] } ] }, "references": { "reference_data": [ { "name": "[oss-security] 20160603 Re: CVE Request: Dnsmasq denial of service", "refsource": "MLIST", "tags": [], "url": "http://www.openwall.com/lists/oss-security/2016/06/04/2" }, { "name": "[oss-security] 20160603 CVE Request: Dnsmasq denial of service", "refsource": "MLIST", "tags": [], "url": "http://www.openwall.com/lists/oss-security/2016/06/03/7" }, { "name": "USN-3009-1", "refsource": "UBUNTU", "tags": [], "url": "http://www.ubuntu.com/usn/USN-3009-1" }, { "name": "http://thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=commit;h=41a8d9e99be9f2cc8b02051dd322cb45e0faac87", "refsource": "CONFIRM", "tags": [], "url": "http://thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=commit;h=41a8d9e99be9f2cc8b02051dd322cb45e0faac87" }, { "name": "[Dnsmasq-discuss] 20160503 Dnsmasq 2.75 on Ubuntu 16.04 crashes reproducibly", "refsource": "MLIST", "tags": [], "url": "http://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2016q2/010505.html" }, { "name": "[Dnsmasq-discuss] 20160418 Dnsmasq 2.75 on Ubuntu 16.04 crashes reproducibly", "refsource": "MLIST", "tags": [], "url": "http://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2016q2/010479.html" }, { "name": "1036045", "refsource": "SECTRACK", "tags": [], "url": "http://www.securitytracker.com/id/1036045" }, { "name": "91031", "refsource": "BID", "tags": [], "url": "http://www.securityfocus.com/bid/91031" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.6 } }, "lastModifiedDate": "2016-11-28T19:50Z", "publishedDate": "2016-06-30T17:59Z" } } }
ghsa-f299-rcx3-c9vw
Vulnerability from github
Dnsmasq before 2.76 allows remote servers to cause a denial of service (crash) via a reply with an empty DNS address that has an (1) A or (2) AAAA record defined locally.
{ "affected": [], "aliases": [ "CVE-2015-8899" ], "database_specific": { "cwe_ids": [ "CWE-20" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2016-06-30T17:59:00Z", "severity": "HIGH" }, "details": "Dnsmasq before 2.76 allows remote servers to cause a denial of service (crash) via a reply with an empty DNS address that has an (1) A or (2) AAAA record defined locally.", "id": "GHSA-f299-rcx3-c9vw", "modified": "2025-04-12T13:01:32Z", "published": "2022-05-17T03:43:41Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8899" }, { "type": "WEB", "url": "http://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2016q2/010479.html" }, { "type": "WEB", "url": "http://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2016q2/010505.html" }, { "type": "WEB", "url": "http://thekelleys.org.uk/gitweb/?p=dnsmasq.git%3Ba=commit%3Bh=41a8d9e99be9f2cc8b02051dd322cb45e0faac87" }, { "type": "WEB", "url": "http://thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=commit;h=41a8d9e99be9f2cc8b02051dd322cb45e0faac87" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2016/06/03/7" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2016/06/04/2" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/91031" }, { "type": "WEB", "url": "http://www.securitytracker.com/id/1036045" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/USN-3009-1" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ] }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.