Bug 38379 - dnsmasq: Denial of service (4.1)
dnsmasq: Denial of service (4.1)
Status: CLOSED FIXED
Product: UCS
Classification: Unclassified
Component: Security updates
UCS 4.1
Other Linux
: P2 normal (vote)
: UCS 4.1-4-errata
Assigned To: Arvid Requate
Felix Botner
:
Depends on: 45617
Blocks:
  Show dependency treegraph
 
Reported: 2015-04-28 16:09 CEST by Arvid Requate
Modified: 2017-11-08 16:06 CET (History)
1 user (show)

See Also:
What kind of report is it?: Security Issue
What type of bug is this?: ---
Who will be affected by this bug?: ---
How will those affected feel about the bug?: ---
User Pain:
Enterprise Customer affected?:
School Customer affected?:
ISV affected?:
Waiting Support:
Flags outvoted (downgraded) after PO Review:
Ticket number:
Bug group (optional): Security
Max CVSS v3 score: 9.8 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
requate: Patch_Available+


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Arvid Requate univentionstaff 2015-04-28 16:09:30 CEST
Crash on receipt of certain malformed DNS requests (CVE-2015-3294)

Patch in upstream 2.73rc4:
http://thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=commit;h=ad4a8ff7d9097008d7623df8543df435bfddeac8
Comment 1 Arvid Requate univentionstaff 2015-05-06 11:35:09 CEST
Fix available upstream in Debian package version 2.62-3+deb7u2
Comment 2 Arvid Requate univentionstaff 2015-05-11 12:29:57 CEST
Regression fixed in 2.62-3+deb7u3
Comment 3 Arvid Requate univentionstaff 2017-10-30 17:36:17 CET
2.62-3+deb7u4 fixes:

* DNS heap buffer overflow (CVE-2017-14491)
* DHCPv6 RA heap overflow (CVE-2017-14492)
* Infoleak handling DHCPv6 forwarded requests (CVE-2017-14494)
Comment 4 Arvid Requate univentionstaff 2017-10-30 17:51:51 CET
Advisory: dnsmasq.yaml
Comment 5 Felix Botner univentionstaff 2017-11-01 16:47:51 CET
OK - dnsmasq
dnsmasq -d -q
dnsmasq: gestartet, Version 2.62, Cachegröße 150
dnsmasq: Übersetzungsoptionen: IPv6 GNU-getopt DBus i18n IDN DHCP DHCPv6 no-Lua TFTP conntrack
dnsmasq: lese /etc/resolv.conf
dnsmasq: Benutze Namensserver 192.168.0.3#53
dnsmasq: ignoriere Namensserver 10.200.7.150 - lokale Schnittstelle
dnsmasq: /etc/hosts gelesen - 7 Adressen
dnsmasq: query[A] ping.de from 10.200.7.150
dnsmasq: forwarded ping.de to 192.168.0.3
dnsmasq: reply ping.de is 83.97.42.2
dnsmasq: query[A] ping.de from 10.200.7.150
dnsmasq: cached ping.de is 83.97.42.2

OK - YAML
Comment 6 Arvid Requate univentionstaff 2017-11-08 16:06:42 CET
<http://errata.software-univention.de/ucs/4.1/481.html>