Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2017-14493 (GCVE-0-2017-14493)
Vulnerability from cvelistv5
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T19:27:40.669Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "1039474", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1039474", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://www.synology.com/support/security/Synology_SA_17_59_Dnsmasq", }, { name: "DSA-3989", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2017/dsa-3989", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://thekelleys.org.uk/gitweb/?p=dnsmasq.git%3Ba=commit%3Bh=3d4ff1ba8419546490b464418223132529514033", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://access.redhat.com/security/vulnerabilities/3199382", }, { name: "101085", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/101085", }, { name: "42943", tags: [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred", ], url: "https://www.exploit-db.com/exploits/42943/", }, { name: "USN-3430-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "http://www.ubuntu.com/usn/USN-3430-1", }, { name: "VU#973527", tags: [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred", ], url: "https://www.kb.cert.org/vuls/id/973527", }, { name: "GLSA-201710-27", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "https://security.gentoo.org/glsa/201710-27", }, { name: "USN-3430-2", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "http://www.ubuntu.com/usn/USN-3430-2", }, { name: "[dnsmasq-discuss] 20171002 Announce: dnsmasq-2.78.", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://www.mail-archive.com/dnsmasq-discuss%40lists.thekelleys.org.uk/msg11665.html", }, { name: "RHSA-2017:2836", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2017:2836", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://nvidia.custhelp.com/app/answers/detail/a_id/4561", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-005.txt", }, { name: "RHSA-2017:2837", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2017:2837", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://thekelleys.org.uk/dnsmasq/CHANGELOG", }, { name: "openSUSE-SU-2017:2633", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00006.html", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html", }, { name: "[dnsmasq-discuss] 20171002 IMPORTANT SECURITY INFORMATION.", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://www.mail-archive.com/dnsmasq-discuss%40lists.thekelleys.org.uk/msg11664.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2017-10-02T00:00:00", descriptions: [ { lang: "en", value: "Stack-based buffer overflow in dnsmasq before 2.78 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted DHCPv6 request.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-03-03T10:57:01", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "1039474", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1039474", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://www.synology.com/support/security/Synology_SA_17_59_Dnsmasq", }, { name: "DSA-3989", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2017/dsa-3989", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://thekelleys.org.uk/gitweb/?p=dnsmasq.git%3Ba=commit%3Bh=3d4ff1ba8419546490b464418223132529514033", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://access.redhat.com/security/vulnerabilities/3199382", }, { name: "101085", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/101085", }, { name: "42943", tags: [ "exploit", "x_refsource_EXPLOIT-DB", ], url: "https://www.exploit-db.com/exploits/42943/", }, { name: "USN-3430-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "http://www.ubuntu.com/usn/USN-3430-1", }, { name: "VU#973527", tags: [ "third-party-advisory", "x_refsource_CERT-VN", ], url: "https://www.kb.cert.org/vuls/id/973527", }, { name: "GLSA-201710-27", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "https://security.gentoo.org/glsa/201710-27", }, { name: "USN-3430-2", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "http://www.ubuntu.com/usn/USN-3430-2", }, { name: "[dnsmasq-discuss] 20171002 Announce: dnsmasq-2.78.", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://www.mail-archive.com/dnsmasq-discuss%40lists.thekelleys.org.uk/msg11665.html", }, { name: "RHSA-2017:2836", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2017:2836", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://nvidia.custhelp.com/app/answers/detail/a_id/4561", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-005.txt", }, { name: "RHSA-2017:2837", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2017:2837", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://thekelleys.org.uk/dnsmasq/CHANGELOG", }, { name: "openSUSE-SU-2017:2633", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00006.html", }, { tags: [ "x_refsource_MISC", ], url: "https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html", }, { name: "[dnsmasq-discuss] 20171002 IMPORTANT SECURITY INFORMATION.", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://www.mail-archive.com/dnsmasq-discuss%40lists.thekelleys.org.uk/msg11664.html", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2017-14493", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Stack-based buffer overflow in dnsmasq before 2.78 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted DHCPv6 request.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "1039474", refsource: "SECTRACK", url: "http://www.securitytracker.com/id/1039474", }, { name: "https://www.synology.com/support/security/Synology_SA_17_59_Dnsmasq", refsource: "CONFIRM", url: "https://www.synology.com/support/security/Synology_SA_17_59_Dnsmasq", }, { name: "DSA-3989", refsource: "DEBIAN", url: "http://www.debian.org/security/2017/dsa-3989", }, { name: "http://thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=commit;h=3d4ff1ba8419546490b464418223132529514033", refsource: "CONFIRM", url: "http://thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=commit;h=3d4ff1ba8419546490b464418223132529514033", }, { name: "https://access.redhat.com/security/vulnerabilities/3199382", refsource: "CONFIRM", url: "https://access.redhat.com/security/vulnerabilities/3199382", }, { name: "101085", refsource: "BID", url: "http://www.securityfocus.com/bid/101085", }, { name: "42943", refsource: "EXPLOIT-DB", url: "https://www.exploit-db.com/exploits/42943/", }, { name: "USN-3430-1", refsource: "UBUNTU", url: "http://www.ubuntu.com/usn/USN-3430-1", }, { name: "VU#973527", refsource: "CERT-VN", url: "https://www.kb.cert.org/vuls/id/973527", }, { name: "GLSA-201710-27", refsource: "GENTOO", url: "https://security.gentoo.org/glsa/201710-27", }, { name: "USN-3430-2", refsource: "UBUNTU", url: "http://www.ubuntu.com/usn/USN-3430-2", }, { name: "[dnsmasq-discuss] 20171002 Announce: dnsmasq-2.78.", refsource: "MLIST", url: "https://www.mail-archive.com/dnsmasq-discuss@lists.thekelleys.org.uk/msg11665.html", }, { name: "RHSA-2017:2836", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2017:2836", }, { name: "http://nvidia.custhelp.com/app/answers/detail/a_id/4561", refsource: "CONFIRM", url: "http://nvidia.custhelp.com/app/answers/detail/a_id/4561", }, { name: "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-005.txt", refsource: "CONFIRM", url: "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-005.txt", }, { name: "RHSA-2017:2837", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2017:2837", }, { name: "http://thekelleys.org.uk/dnsmasq/CHANGELOG", refsource: "CONFIRM", url: "http://thekelleys.org.uk/dnsmasq/CHANGELOG", }, { name: "openSUSE-SU-2017:2633", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00006.html", }, { name: "https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html", refsource: "MISC", url: "https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html", }, { name: "[dnsmasq-discuss] 20171002 IMPORTANT SECURITY INFORMATION.", refsource: "MLIST", url: "https://www.mail-archive.com/dnsmasq-discuss@lists.thekelleys.org.uk/msg11664.html", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2017-14493", datePublished: "2017-10-02T21:00:00", dateReserved: "2017-09-15T00:00:00", dateUpdated: "2024-08-05T19:27:40.669Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", "vulnerability-lookup:meta": { fkie_nvd: { configurations: "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*\", \"matchCriteriaId\": \"B5A6F2F3-4894-4392-8296-3B8DD2679084\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*\", \"matchCriteriaId\": \"F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:canonical:ubuntu_linux:17.04:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"588D4F37-0A56-47A4-B710-4D5F3D214FB9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"16F59A04-14CF-49E2-9973-645477EA09DA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:debian:debian_linux:7.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7B21E9A8-CE63-42C2-A11A-94D977A96DF1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DEECE5FC-CACF-4496-A3E7-164736409252\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:opensuse:leap:42.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1EA337A3-B9A3-4962-B8BD-8E0C7C5B28EB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5F65DAB0-3DAD-49FF-BC73-3581CC3D5BF3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"33C068A4-3780-4EAB-A937-6082DF847564\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"51EF4996-72F4-4FA4-814F-F5991E7A8318\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"825ECE2D-E232-46E0-A047-074B34DB1E97\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:thekelleys:dnsmasq:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.77\", \"matchCriteriaId\": \"B85D7A28-8CBA-4D77-AD30-DB3CA49F2F98\"}]}]}]", descriptions: "[{\"lang\": \"en\", \"value\": \"Stack-based buffer overflow in dnsmasq before 2.78 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted DHCPv6 request.\"}, {\"lang\": \"es\", \"value\": \"Un desbordamiento de b\\u00fafer basado en pila en dnsmasq en versiones anteriores a la 2.78 permite a los atacantes provocar una denegaci\\u00f3n de servicio (cierre inesperado) o ejecutar c\\u00f3digo arbitrario mediante una petici\\u00f3n DHCPv6 manipulada.\"}]", id: "CVE-2017-14493", lastModified: "2024-11-21T03:12:54.433", metrics: "{\"cvssMetricV30\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.0\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\", \"baseScore\": 9.8, \"baseSeverity\": \"CRITICAL\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 5.9}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:P/I:P/A:P\", \"baseScore\": 7.5, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"HIGH\", \"exploitabilityScore\": 10.0, \"impactScore\": 6.4, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}", published: "2017-10-03T01:29:02.077", references: "[{\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00006.html\", \"source\": \"cve@mitre.org\", \"tags\": [\"Issue Tracking\", \"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://nvidia.custhelp.com/app/answers/detail/a_id/4561\", \"source\": \"cve@mitre.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://thekelleys.org.uk/dnsmasq/CHANGELOG\", \"source\": \"cve@mitre.org\", \"tags\": [\"Release Notes\", \"Vendor Advisory\"]}, {\"url\": \"http://thekelleys.org.uk/gitweb/?p=dnsmasq.git%3Ba=commit%3Bh=3d4ff1ba8419546490b464418223132529514033\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-005.txt\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.debian.org/security/2017/dsa-3989\", \"source\": \"cve@mitre.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.securityfocus.com/bid/101085\", \"source\": \"cve@mitre.org\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.securitytracker.com/id/1039474\", \"source\": \"cve@mitre.org\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.ubuntu.com/usn/USN-3430-1\", \"source\": \"cve@mitre.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.ubuntu.com/usn/USN-3430-2\", \"source\": \"cve@mitre.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2017:2836\", \"source\": \"cve@mitre.org\", \"tags\": [\"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2017:2837\", \"source\": \"cve@mitre.org\", \"tags\": [\"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://access.redhat.com/security/vulnerabilities/3199382\", \"source\": \"cve@mitre.org\", \"tags\": [\"Issue Tracking\", \"Third Party Advisory\"]}, {\"url\": \"https://security.gentoo.org/glsa/201710-27\", \"source\": \"cve@mitre.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html\", \"source\": \"cve@mitre.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.exploit-db.com/exploits/42943/\", \"source\": \"cve@mitre.org\", \"tags\": [\"Exploit\", \"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"https://www.kb.cert.org/vuls/id/973527\", \"source\": \"cve@mitre.org\", \"tags\": [\"Third Party Advisory\", \"US Government Resource\"]}, {\"url\": \"https://www.mail-archive.com/dnsmasq-discuss%40lists.thekelleys.org.uk/msg11664.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://www.mail-archive.com/dnsmasq-discuss%40lists.thekelleys.org.uk/msg11665.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://www.synology.com/support/security/Synology_SA_17_59_Dnsmasq\", \"source\": \"cve@mitre.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00006.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Issue Tracking\", \"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://nvidia.custhelp.com/app/answers/detail/a_id/4561\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://thekelleys.org.uk/dnsmasq/CHANGELOG\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Release Notes\", \"Vendor Advisory\"]}, {\"url\": \"http://thekelleys.org.uk/gitweb/?p=dnsmasq.git%3Ba=commit%3Bh=3d4ff1ba8419546490b464418223132529514033\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-005.txt\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.debian.org/security/2017/dsa-3989\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.securityfocus.com/bid/101085\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.securitytracker.com/id/1039474\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.ubuntu.com/usn/USN-3430-1\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.ubuntu.com/usn/USN-3430-2\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2017:2836\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2017:2837\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://access.redhat.com/security/vulnerabilities/3199382\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Issue Tracking\", \"Third Party Advisory\"]}, {\"url\": \"https://security.gentoo.org/glsa/201710-27\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.exploit-db.com/exploits/42943/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\", \"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"https://www.kb.cert.org/vuls/id/973527\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"US Government Resource\"]}, {\"url\": \"https://www.mail-archive.com/dnsmasq-discuss%40lists.thekelleys.org.uk/msg11664.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://www.mail-archive.com/dnsmasq-discuss%40lists.thekelleys.org.uk/msg11665.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://www.synology.com/support/security/Synology_SA_17_59_Dnsmasq\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}]", sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-119\"}]}]", }, nvd: "{\"cve\":{\"id\":\"CVE-2017-14493\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2017-10-03T01:29:02.077\",\"lastModified\":\"2025-04-20T01:37:25.860\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Stack-based buffer overflow in dnsmasq before 2.78 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted DHCPv6 request.\"},{\"lang\":\"es\",\"value\":\"Un desbordamiento de búfer basado en pila en dnsmasq en versiones anteriores a la 2.78 permite a los atacantes provocar una denegación de servicio (cierre inesperado) o ejecutar código arbitrario mediante una petición DHCPv6 manipulada.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":7.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-119\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"B5A6F2F3-4894-4392-8296-3B8DD2679084\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:17.04:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"588D4F37-0A56-47A4-B710-4D5F3D214FB9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"16F59A04-14CF-49E2-9973-645477EA09DA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:7.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7B21E9A8-CE63-42C2-A11A-94D977A96DF1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEECE5FC-CACF-4496-A3E7-164736409252\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:opensuse:leap:42.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1EA337A3-B9A3-4962-B8BD-8E0C7C5B28EB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5F65DAB0-3DAD-49FF-BC73-3581CC3D5BF3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"33C068A4-3780-4EAB-A937-6082DF847564\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"51EF4996-72F4-4FA4-814F-F5991E7A8318\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"825ECE2D-E232-46E0-A047-074B34DB1E97\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:thekelleys:dnsmasq:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.77\",\"matchCriteriaId\":\"B85D7A28-8CBA-4D77-AD30-DB3CA49F2F98\"}]}]}],\"references\":[{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00006.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Issue Tracking\",\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://nvidia.custhelp.com/app/answers/detail/a_id/4561\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://thekelleys.org.uk/dnsmasq/CHANGELOG\",\"source\":\"cve@mitre.org\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"http://thekelleys.org.uk/gitweb/?p=dnsmasq.git%3Ba=commit%3Bh=3d4ff1ba8419546490b464418223132529514033\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-005.txt\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.debian.org/security/2017/dsa-3989\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/101085\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1039474\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-3430-1\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-3430-2\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:2836\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:2837\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/security/vulnerabilities/3199382\",\"source\":\"cve@mitre.org\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/201710-27\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.exploit-db.com/exploits/42943/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://www.kb.cert.org/vuls/id/973527\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"https://www.mail-archive.com/dnsmasq-discuss%40lists.thekelleys.org.uk/msg11664.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://www.mail-archive.com/dnsmasq-discuss%40lists.thekelleys.org.uk/msg11665.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://www.synology.com/support/security/Synology_SA_17_59_Dnsmasq\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00006.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://nvidia.custhelp.com/app/answers/detail/a_id/4561\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://thekelleys.org.uk/dnsmasq/CHANGELOG\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"http://thekelleys.org.uk/gitweb/?p=dnsmasq.git%3Ba=commit%3Bh=3d4ff1ba8419546490b464418223132529514033\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-005.txt\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.debian.org/security/2017/dsa-3989\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/101085\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1039474\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-3430-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-3430-2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:2836\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:2837\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/security/vulnerabilities/3199382\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/201710-27\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.exploit-db.com/exploits/42943/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://www.kb.cert.org/vuls/id/973527\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"https://www.mail-archive.com/dnsmasq-discuss%40lists.thekelleys.org.uk/msg11664.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.mail-archive.com/dnsmasq-discuss%40lists.thekelleys.org.uk/msg11665.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.synology.com/support/security/Synology_SA_17_59_Dnsmasq\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}", }, }
var-201710-0449
Vulnerability from variot
Stack-based buffer overflow in dnsmasq before 2.78 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted DHCPv6 request. Dnsmasq versions 2.77 and earlier contains multiple vulnerabilities. dnsmasq Contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
===================================================================== Red Hat Security Advisory
Synopsis: Critical: dnsmasq security update Advisory ID: RHSA-2017:2836-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2017:2836 Issue date: 2017-10-02 CVE Names: CVE-2017-14491 CVE-2017-14492 CVE-2017-14493 CVE-2017-14494 CVE-2017-14495 CVE-2017-14496 =====================================================================
- Summary:
An update for dnsmasq is now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
- Relevant releases/architectures:
Red Hat Enterprise Linux Client (v. 7) - x86_64 Red Hat Enterprise Linux Client Optional (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64 Red Hat Enterprise Linux Server (v. 7) - aarch64, ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 7) - aarch64, ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - x86_64 Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64
- Description:
The dnsmasq packages contain Dnsmasq, a lightweight DNS (Domain Name Server) forwarder and DHCP (Dynamic Host Configuration Protocol) server.
Security Fix(es):
-
A heap buffer overflow was found in dnsmasq in the code responsible for building DNS replies. (CVE-2017-14491)
-
A heap buffer overflow was discovered in dnsmasq in the IPv6 router advertisement (RA) handling code. This issue only affected configurations using one of these options: enable-ra, ra-only, slaac, ra-names, ra-advrouter, or ra-stateless. (CVE-2017-14492)
-
A stack buffer overflow was found in dnsmasq in the DHCPv6 code. (CVE-2017-14493)
-
An information leak was found in dnsmasq in the DHCPv6 relay code. An attacker on the local network could send crafted DHCPv6 packets to dnsmasq causing it to forward the contents of process memory, potentially leaking sensitive data. (CVE-2017-14494)
-
A memory exhaustion flaw was found in dnsmasq in the EDNS0 code. An attacker could send crafted DNS packets which would trigger memory allocations which would never be freed, leading to unbounded memory consumption and eventually a crash. This issue only affected configurations using one of the options: add-mac, add-cpe-id, or add-subnet. (CVE-2017-14495)
-
An integer underflow flaw leading to a buffer over-read was found in dnsmasq in the EDNS0 code. An attacker could send crafted DNS packets to dnsmasq which would cause it to crash. This issue only affected configurations using one of the options: add-mac, add-cpe-id, or add-subnet. (CVE-2017-14496)
Red Hat would like to thank Felix Wilhelm (Google Security Team), Fermin J. Serna (Google Security Team), Gabriel Campana (Google Security Team), Kevin Hamacher (Google Security Team), and Ron Bowes (Google Security Team) for reporting these issues.
- Solution:
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
- Bugs fixed (https://bugzilla.redhat.com/):
1495409 - CVE-2017-14491 dnsmasq: heap overflow in the code responsible for building DNS replies 1495410 - CVE-2017-14492 dnsmasq: heap overflow in the IPv6 router advertisement code 1495411 - CVE-2017-14493 dnsmasq: stack buffer overflow in the DHCPv6 code 1495412 - CVE-2017-14494 dnsmasq: information leak in the DHCPv6 relay code 1495415 - CVE-2017-14495 dnsmasq: memory exhaustion vulnerability in the EDNS0 code 1495416 - CVE-2017-14496 dnsmasq: integer underflow leading to buffer over-read in the EDNS0 code
- Package List:
Red Hat Enterprise Linux Client (v. 7):
Source: dnsmasq-2.76-2.el7_4.2.src.rpm
x86_64: dnsmasq-2.76-2.el7_4.2.x86_64.rpm dnsmasq-debuginfo-2.76-2.el7_4.2.x86_64.rpm
Red Hat Enterprise Linux Client Optional (v. 7):
x86_64: dnsmasq-debuginfo-2.76-2.el7_4.2.x86_64.rpm dnsmasq-utils-2.76-2.el7_4.2.x86_64.rpm
Red Hat Enterprise Linux ComputeNode (v. 7):
Source: dnsmasq-2.76-2.el7_4.2.src.rpm
x86_64: dnsmasq-2.76-2.el7_4.2.x86_64.rpm dnsmasq-debuginfo-2.76-2.el7_4.2.x86_64.rpm
Red Hat Enterprise Linux ComputeNode Optional (v. 7):
x86_64: dnsmasq-debuginfo-2.76-2.el7_4.2.x86_64.rpm dnsmasq-utils-2.76-2.el7_4.2.x86_64.rpm
Red Hat Enterprise Linux Server (v. 7):
Source: dnsmasq-2.76-2.el7_4.2.src.rpm
aarch64: dnsmasq-2.76-2.el7_4.2.aarch64.rpm dnsmasq-debuginfo-2.76-2.el7_4.2.aarch64.rpm
ppc64: dnsmasq-2.76-2.el7_4.2.ppc64.rpm dnsmasq-debuginfo-2.76-2.el7_4.2.ppc64.rpm
ppc64le: dnsmasq-2.76-2.el7_4.2.ppc64le.rpm dnsmasq-debuginfo-2.76-2.el7_4.2.ppc64le.rpm
s390x: dnsmasq-2.76-2.el7_4.2.s390x.rpm dnsmasq-debuginfo-2.76-2.el7_4.2.s390x.rpm
x86_64: dnsmasq-2.76-2.el7_4.2.x86_64.rpm dnsmasq-debuginfo-2.76-2.el7_4.2.x86_64.rpm
Red Hat Enterprise Linux Server Optional (v. 7):
aarch64: dnsmasq-debuginfo-2.76-2.el7_4.2.aarch64.rpm dnsmasq-utils-2.76-2.el7_4.2.aarch64.rpm
ppc64: dnsmasq-debuginfo-2.76-2.el7_4.2.ppc64.rpm dnsmasq-utils-2.76-2.el7_4.2.ppc64.rpm
ppc64le: dnsmasq-debuginfo-2.76-2.el7_4.2.ppc64le.rpm dnsmasq-utils-2.76-2.el7_4.2.ppc64le.rpm
s390x: dnsmasq-debuginfo-2.76-2.el7_4.2.s390x.rpm dnsmasq-utils-2.76-2.el7_4.2.s390x.rpm
x86_64: dnsmasq-debuginfo-2.76-2.el7_4.2.x86_64.rpm dnsmasq-utils-2.76-2.el7_4.2.x86_64.rpm
Red Hat Enterprise Linux Workstation (v. 7):
Source: dnsmasq-2.76-2.el7_4.2.src.rpm
x86_64: dnsmasq-2.76-2.el7_4.2.x86_64.rpm dnsmasq-debuginfo-2.76-2.el7_4.2.x86_64.rpm
Red Hat Enterprise Linux Workstation Optional (v. 7):
x86_64: dnsmasq-debuginfo-2.76-2.el7_4.2.x86_64.rpm dnsmasq-utils-2.76-2.el7_4.2.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/
- References:
https://access.redhat.com/security/cve/CVE-2017-14491 https://access.redhat.com/security/cve/CVE-2017-14492 https://access.redhat.com/security/cve/CVE-2017-14493 https://access.redhat.com/security/cve/CVE-2017-14494 https://access.redhat.com/security/cve/CVE-2017-14495 https://access.redhat.com/security/cve/CVE-2017-14496 https://access.redhat.com/security/updates/classification/#critical https://access.redhat.com/security/vulnerabilities/3199382
- Contact:
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/
Copyright 2017 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1
iD8DBQFZ0opYXlSAg2UNWIIRAr0dAJ9rIL1FgNTJUf2I9jjKFFlfkCd/kwCfV+bX SfoCV7+qG2nwqlHKLZOlhIU= =iWfU -----END PGP SIGNATURE-----
-- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce . =========================================================================== Ubuntu Security Notice USN-3430-3 January 04, 2018
dnsmasq regression
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 12.04 ESM
Summary:
USN-3430-2 introduced regression in Dnsmasq.
Software Description: - dnsmasq: Small caching DNS proxy and DHCP/TFTP server
Details:
USN-3430-2 fixed several vulnerabilities. The update introduced a new regression that breaks DNS resolution. This update addresses the problem.
We apologize for the inconvenience.
Original advisory details:
Felix Wilhelm, Fermin J. Serna, Gabriel Campana and Kevin Hamacher discovered that Dnsmasq incorrectly handled DNS requests. (CVE-2017-14491)
Felix Wilhelm, Fermin J. (CVE-2017-14492)
Felix Wilhelm, Fermin J. Serna, Gabriel Campana and Kevin Hamacher discovered that Dnsmasq incorrectly handled DHCPv6 requests. (CVE-2017-14493)
Felix Wilhelm, Fermin J. Serna, Gabriel Campana and Kevin Hamacher discovered that Dnsmasq incorrectly handled DHCPv6 packets. (CVE-2017-14494)
Felix Wilhelm, Fermin J. Serna, Gabriel Campana and Kevin Hamacher discovered that Dnsmasq incorrectly handled DNS requests. (CVE-2017-14495)
Felix Wilhelm, Fermin J. Serna, Gabriel Campana and Kevin Hamacher discovered that Dnsmasq incorrectly handled DNS requests. (CVE-2017-14496)
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 12.04 ESM: dnsmasq=C2=A02.59-4ubuntu0.4 dnsmasq-base2.59-4ubuntu0.4 dnsmasq-utils2.59-4ubuntu0.4
After a standard system update you need to reboot your computer to make all the necessary changes. 7.3) - ppc64, ppc64le, s390x, x86_64
-
Gentoo Linux Security Advisory GLSA 201710-27
https://security.gentoo.org/
Severity: Normal Title: Dnsmasq: Multiple vulnerabilities Date: October 23, 2017 Bugs: #632692 ID: 201710-27
Synopsis
Multiple vulnerabilities have been found in Dnsmasq, the worst of which may allow remote attackers to execute arbitrary code.
Affected packages
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 net-dns/dnsmasq < 2.78 >= 2.78
Description
Multiple vulnerabilities have been discovered in Dnsmasq.
Workaround
There is no known workaround at this time.
Resolution
All Dnsmasq users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=net-dns/dnsmasq-2.78"
References
[ 1 ] CVE-2017-14491 https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-14491 [ 2 ] CVE-2017-14492 https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-14492 [ 3 ] CVE-2017-14493 https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-14493 [ 4 ] CVE-2017-14494 https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-14494 [ 5 ] CVE-2017-14495 https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-14495 [ 6 ] CVE-2017-14496 https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-14496
Availability
This GLSA and any updates to it are available for viewing at the Gentoo Security Website:
https://security.gentoo.org/glsa/201710-27
Concerns?
Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.
License
Copyright 2017 Gentoo Foundation, Inc; referenced text belongs to its owner(s).
The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", affected_products: { "@id": "https://www.variotdbs.pl/ref/affected_products", }, configurations: { "@id": "https://www.variotdbs.pl/ref/configurations", }, credits: { "@id": "https://www.variotdbs.pl/ref/credits", }, cvss: { "@id": "https://www.variotdbs.pl/ref/cvss/", }, description: { "@id": "https://www.variotdbs.pl/ref/description/", }, exploit_availability: { "@id": "https://www.variotdbs.pl/ref/exploit_availability/", }, external_ids: { "@id": "https://www.variotdbs.pl/ref/external_ids/", }, iot: { "@id": "https://www.variotdbs.pl/ref/iot/", }, iot_taxonomy: { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/", }, patch: { "@id": "https://www.variotdbs.pl/ref/patch/", }, problemtype_data: { "@id": "https://www.variotdbs.pl/ref/problemtype_data/", }, references: { "@id": "https://www.variotdbs.pl/ref/references/", }, sources: { "@id": "https://www.variotdbs.pl/ref/sources/", }, sources_release_date: { "@id": "https://www.variotdbs.pl/ref/sources_release_date/", }, sources_update_date: { "@id": "https://www.variotdbs.pl/ref/sources_update_date/", }, threat_type: { "@id": "https://www.variotdbs.pl/ref/threat_type/", }, title: { "@id": "https://www.variotdbs.pl/ref/title/", }, type: { "@id": "https://www.variotdbs.pl/ref/type/", }, }, "@id": "https://www.variotdbs.pl/vuln/VAR-201710-0449", affected_products: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { model: "leap", scope: "eq", trust: 1.3, vendor: "opensuse", version: "42.3", }, { model: "leap", scope: "eq", trust: 1.3, vendor: "opensuse", version: "42.2", }, { model: "enterprise linux server", scope: "eq", trust: 1, vendor: "redhat", version: "7.0", }, { model: "ubuntu linux", scope: "eq", trust: 1, vendor: "canonical", version: "16.04", }, { model: "linux", scope: "eq", trust: 1, vendor: "debian", version: "7.0", }, { model: "ubuntu linux", scope: "eq", trust: 1, vendor: "canonical", version: "17.04", }, { model: "linux", scope: "eq", trust: 1, vendor: "debian", version: "7.1", }, { model: "enterprise linux workstation", scope: "eq", trust: 1, vendor: "redhat", version: "7.0", }, { model: "linux", scope: "eq", trust: 1, vendor: "debian", version: "9.0", }, { model: "dnsmasq", scope: "lte", trust: 1, vendor: "thekelleys", version: "2.77", }, { model: "ubuntu linux", scope: "eq", trust: 1, vendor: "canonical", version: "14.04", }, { model: "enterprise linux desktop", scope: "eq", trust: 1, vendor: "redhat", version: "7.0", }, { model: "dnsmasq", scope: "eq", trust: 0.9, vendor: "thekelleys", version: "2.77", }, { model: null, scope: null, trust: 0.8, vendor: "ruckus", version: null, }, { model: null, scope: null, trust: 0.8, vendor: "technicolor", version: null, }, { model: null, scope: null, trust: 0.8, vendor: "zyxel", version: null, }, { model: null, scope: null, trust: 0.8, vendor: "dnsmasq", version: null, }, { model: "ubuntu", scope: null, trust: 0.8, vendor: "canonical", version: null, }, { model: "gnu/linux", scope: null, trust: 0.8, vendor: "debian", version: null, }, { model: "leap", scope: null, trust: 0.8, vendor: "opensuse", version: null, }, { model: "dnsmasq", scope: "lt", trust: 0.8, vendor: "thekelleys", version: "2.78", }, { model: "enterprise linux desktop", scope: null, trust: 0.8, vendor: "red hat", version: null, }, { model: "enterprise linux server", scope: null, trust: 0.8, vendor: "red hat", version: null, }, { model: "enterprise linux workstation", scope: null, trust: 0.8, vendor: "red hat", version: null, }, { model: "enterprise linux server year extended update support", scope: "eq", trust: 0.6, vendor: "redhat", version: "-47.4", }, { model: "linux", scope: "eq", trust: 0.3, vendor: "ubuntu", version: "17.04", }, { model: "linux lts", scope: "eq", trust: 0.3, vendor: "ubuntu", version: "16.04", }, { model: "linux lts", scope: "eq", trust: 0.3, vendor: "ubuntu", version: "14.04", }, { model: "dnsmasq", scope: "eq", trust: 0.3, vendor: "thekelleys", version: "1.2.2", }, { model: "dnsmasq", scope: "eq", trust: 0.3, vendor: "thekelleys", version: "2.75", }, { model: "dnsmasq", scope: "eq", trust: 0.3, vendor: "thekelleys", version: "2.72", }, { model: "dnsmasq", scope: "eq", trust: 0.3, vendor: "thekelleys", version: "2.71", }, { model: "dnsmasq", scope: "eq", trust: 0.3, vendor: "thekelleys", version: "2.70", }, { model: "dnsmasq", scope: "eq", trust: 0.3, vendor: "thekelleys", version: "2.7", }, { model: "dnsmasq", scope: "eq", trust: 0.3, vendor: "thekelleys", version: "2.65", }, { model: "dnsmasq", scope: "eq", trust: 0.3, vendor: "thekelleys", version: "2.64", }, { model: "dnsmasq", scope: "eq", trust: 0.3, vendor: "thekelleys", version: "2.63", }, { model: "dnsmasq", scope: "eq", trust: 0.3, vendor: "thekelleys", version: "2.62", }, { model: "dnsmasq", scope: "eq", trust: 0.3, vendor: "thekelleys", version: "2.61", }, { model: "dnsmasq", scope: "eq", trust: 0.3, vendor: "thekelleys", version: "2.60", }, { model: "dnsmasq", scope: "eq", trust: 0.3, vendor: "thekelleys", version: "2.6", }, { model: "dnsmasq", scope: "eq", trust: 0.3, vendor: "thekelleys", version: "2.59", }, { model: "dnsmasq", scope: "eq", trust: 0.3, vendor: "thekelleys", version: "2.58", }, { model: "dnsmasq", scope: "eq", trust: 0.3, vendor: "thekelleys", version: "2.57", }, { model: "dnsmasq", scope: "eq", trust: 0.3, vendor: "thekelleys", version: "2.56", }, { model: "dnsmasq", scope: "eq", trust: 0.3, vendor: "thekelleys", version: "2.55", }, { model: "dnsmasq", scope: "eq", trust: 0.3, vendor: "thekelleys", version: "2.54", }, { model: "dnsmasq", scope: "eq", trust: 0.3, vendor: "thekelleys", version: "2.53", }, { model: "dnsmasq", scope: "eq", trust: 0.3, vendor: "thekelleys", version: "2.52", }, { model: "dnsmasq", scope: "eq", trust: 0.3, vendor: "thekelleys", version: "2.51", }, { model: "dnsmasq", scope: "eq", trust: 0.3, vendor: "thekelleys", version: "2.50", }, { model: "dnsmasq", scope: "eq", trust: 0.3, vendor: "thekelleys", version: "2.49", }, { model: "dnsmasq", scope: "eq", trust: 0.3, vendor: "thekelleys", version: "2.48", }, { model: "dnsmasq", scope: "eq", trust: 0.3, vendor: "thekelleys", version: "2.47", }, { model: "dnsmasq", scope: "eq", trust: 0.3, vendor: "thekelleys", version: "2.46", }, { model: "dnsmasq", scope: "eq", trust: 0.3, vendor: "thekelleys", version: "2.45", }, { model: "dnsmasq", scope: "eq", trust: 0.3, vendor: "thekelleys", version: "2.44", }, { model: "dnsmasq", scope: "eq", trust: 0.3, vendor: "thekelleys", version: "2.43", }, { model: "dnsmasq", scope: "eq", trust: 0.3, vendor: "thekelleys", version: "2.42", }, { model: "dnsmasq", scope: "eq", trust: 0.3, vendor: "thekelleys", version: "2.41", }, { model: "dnsmasq", scope: "eq", trust: 0.3, vendor: "thekelleys", version: "2.40", }, { model: "dnsmasq", scope: "eq", trust: 0.3, vendor: "thekelleys", version: "2.4", }, { model: "dnsmasq", scope: "eq", trust: 0.3, vendor: "thekelleys", version: "2.38", }, { model: "dnsmasq", scope: "eq", trust: 0.3, vendor: "thekelleys", version: "2.37", }, { model: "dnsmasq", scope: "eq", trust: 0.3, vendor: "thekelleys", version: "2.36", }, { model: "dnsmasq", scope: "eq", trust: 0.3, vendor: "thekelleys", version: "2.35", }, { model: "dnsmasq", scope: "eq", trust: 0.3, vendor: "thekelleys", version: "2.34", }, { model: "dnsmasq", scope: "eq", trust: 0.3, vendor: "thekelleys", version: "2.33", }, { model: "dnsmasq", scope: "eq", trust: 0.3, vendor: "thekelleys", version: "2.30", }, { model: "dnsmasq", scope: "eq", trust: 0.3, vendor: "thekelleys", version: "2.29", }, { model: "dnsmasq", scope: "eq", trust: 0.3, vendor: "thekelleys", version: "2.28", }, { model: "dnsmasq", scope: "eq", trust: 0.3, vendor: "thekelleys", version: "2.27", }, { model: "dnsmasq", scope: "eq", trust: 0.3, vendor: "thekelleys", version: "2.26", }, { model: "dnsmasq", scope: "eq", trust: 0.3, vendor: "thekelleys", version: "2.25", }, { model: "dnsmasq", scope: "eq", trust: 0.3, vendor: "thekelleys", version: "2.24", }, { model: "dnsmasq", scope: "eq", trust: 0.3, vendor: "thekelleys", version: "2.23", }, { model: "dnsmasq", scope: "eq", trust: 0.3, vendor: "thekelleys", version: "2.22", }, { model: "dnsmasq", scope: "eq", trust: 0.3, vendor: "thekelleys", version: "2.21", }, { model: "dnsmasq", scope: "eq", trust: 0.3, vendor: "thekelleys", version: "2.20", }, { model: "dnsmasq", scope: "eq", trust: 0.3, vendor: "thekelleys", version: "2.2", }, { model: "dnsmasq", scope: "eq", trust: 0.3, vendor: "thekelleys", version: "2.19", }, { model: "dnsmasq", scope: "eq", trust: 0.3, vendor: "thekelleys", version: "2.18", }, { model: "dnsmasq", scope: "eq", trust: 0.3, vendor: "thekelleys", version: "2.17", }, { model: "dnsmasq", scope: "eq", trust: 0.3, vendor: "thekelleys", version: "2.16", }, { model: "dnsmasq", scope: "eq", trust: 0.3, vendor: "thekelleys", version: "2.15", }, { model: "dnsmasq", scope: "eq", trust: 0.3, vendor: "thekelleys", version: "2.14", }, { model: "dnsmasq", scope: "eq", trust: 0.3, vendor: "thekelleys", version: "2.13", }, { model: "dnsmasq", scope: "eq", trust: 0.3, vendor: "thekelleys", version: "2.12", }, { model: "dnsmasq", scope: "eq", trust: 0.3, vendor: "thekelleys", version: "2.11", }, { model: "dnsmasq", scope: "eq", trust: 0.3, vendor: "thekelleys", version: "2.10", }, { model: "dnsmasq", scope: "eq", trust: 0.3, vendor: "thekelleys", version: "1.9", }, { model: "dnsmasq", scope: "eq", trust: 0.3, vendor: "thekelleys", version: "1.8", }, { model: "dnsmasq", scope: "eq", trust: 0.3, vendor: "thekelleys", version: "1.6", }, { model: "dnsmasq", scope: "eq", trust: 0.3, vendor: "thekelleys", version: "1.5", }, { model: "dnsmasq", scope: "eq", trust: 0.3, vendor: "thekelleys", version: "1.4", }, { model: "dnsmasq", scope: "eq", trust: 0.3, vendor: "thekelleys", version: "1.3", }, { model: "dnsmasq", scope: "eq", trust: 0.3, vendor: "thekelleys", version: "1.18", }, { model: "dnsmasq", scope: "eq", trust: 0.3, vendor: "thekelleys", version: "1.17", }, { model: "dnsmasq", scope: "eq", trust: 0.3, vendor: "thekelleys", version: "1.16", }, { model: "dnsmasq", scope: "eq", trust: 0.3, vendor: "thekelleys", version: "1.15", }, { model: "dnsmasq", scope: "eq", trust: 0.3, vendor: "thekelleys", version: "1.14", }, { model: "dnsmasq", scope: "eq", trust: 0.3, vendor: "thekelleys", version: "1.13", }, { model: "dnsmasq", scope: "eq", trust: 0.3, vendor: "thekelleys", version: "1.12", }, { model: "dnsmasq", scope: "eq", trust: 0.3, vendor: "thekelleys", version: "1.11", }, { model: "dnsmasq", scope: "eq", trust: 0.3, vendor: "thekelleys", version: "1.10", }, { model: "dnsmasq", scope: "eq", trust: 0.3, vendor: "thekelleys", version: "1.0", }, { model: "dnsmasq", scope: "eq", trust: 0.3, vendor: "thekelleys", version: "0.996", }, { model: "dnsmasq", scope: "eq", trust: 0.3, vendor: "thekelleys", version: "0.992", }, { model: "dnsmasq", scope: "eq", trust: 0.3, vendor: "thekelleys", version: "0.98", }, { model: "dnsmasq", scope: "eq", trust: 0.3, vendor: "thekelleys", version: "0.96", }, { model: "dnsmasq", scope: "eq", trust: 0.3, vendor: "thekelleys", version: "0.95", }, { model: "dnsmasq", scope: "eq", trust: 0.3, vendor: "thekelleys", version: "0.7", }, { model: "dnsmasq", scope: "eq", trust: 0.3, vendor: "thekelleys", version: "0.6", }, { model: "dnsmasq", scope: "eq", trust: 0.3, vendor: "thekelleys", version: "0.5", }, { model: "dnsmasq", scope: "eq", trust: 0.3, vendor: "thekelleys", version: "0.4", }, { model: "linux", scope: "eq", trust: 0.3, vendor: "slackware", version: "14.2", }, { model: "linux", scope: "eq", trust: 0.3, vendor: "slackware", version: "14.1", }, { model: "linux", scope: "eq", trust: 0.3, vendor: "slackware", version: "14.0", }, { model: "linux", scope: "eq", trust: 0.3, vendor: "slackware", version: "13.37", }, { model: "linux", scope: "eq", trust: 0.3, vendor: "slackware", version: "13.1", }, { model: "linux", scope: "eq", trust: 0.3, vendor: "slackware", version: "13.0", }, { model: "enterprise linux workstation optional", scope: "eq", trust: 0.3, vendor: "redhat", version: "7", }, { model: "enterprise linux workstation optional", scope: "eq", trust: 0.3, vendor: "redhat", version: "6", }, { model: "enterprise linux workstation", scope: "eq", trust: 0.3, vendor: "redhat", version: "7", }, { model: "enterprise linux workstation", scope: "eq", trust: 0.3, vendor: "redhat", version: "6", }, { model: "enterprise linux server tus", scope: "eq", trust: 0.3, vendor: "redhat", version: "6.6", }, { model: "enterprise linux server tus", scope: "eq", trust: 0.3, vendor: "redhat", version: "6.5", }, { model: "enterprise linux server optional eus", scope: "eq", trust: 0.3, vendor: "redhat", version: "7.3", }, { model: "enterprise linux server optional eus", scope: "eq", trust: 0.3, vendor: "redhat", version: "7.2", }, { model: "enterprise linux server optional eus", scope: "eq", trust: 0.3, vendor: "redhat", version: "6.5", }, { model: "enterprise linux server optional aus", scope: "eq", trust: 0.3, vendor: "redhat", version: "6.6", }, { model: "enterprise linux server optional aus", scope: "eq", trust: 0.3, vendor: "redhat", version: "6.5", }, { model: "enterprise linux server optional aus", scope: "eq", trust: 0.3, vendor: "redhat", version: "6.4", }, { model: "enterprise linux server optional", scope: "eq", trust: 0.3, vendor: "redhat", version: "7", }, { model: "enterprise linux server optional", scope: "eq", trust: 0.3, vendor: "redhat", version: "6", }, { model: "enterprise linux server for arm", scope: "eq", trust: 0.3, vendor: "redhat", version: "7", }, { model: "enterprise linux server eus", scope: "eq", trust: 0.3, vendor: "redhat", version: "7.3", }, { model: "enterprise linux server eus", scope: "eq", trust: 0.3, vendor: "redhat", version: "7.2", }, { model: "enterprise linux server aus", scope: "eq", trust: 0.3, vendor: "redhat", version: "6.6", }, { model: "enterprise linux server aus", scope: "eq", trust: 0.3, vendor: "redhat", version: "6.5", }, { model: "enterprise linux server aus", scope: "eq", trust: 0.3, vendor: "redhat", version: "6.4", }, { model: "enterprise linux server aus", scope: "eq", trust: 0.3, vendor: "redhat", version: "6.2", }, { model: "enterprise linux server tus", scope: "eq", trust: 0.3, vendor: "redhat", version: "-7.4", }, { model: "enterprise linux server tus", scope: "eq", trust: 0.3, vendor: "redhat", version: "-7.3", }, { model: "enterprise linux server tus", scope: "eq", trust: 0.3, vendor: "redhat", version: "-7.2", }, { model: "enterprise linux server extended update support", scope: "eq", trust: 0.3, vendor: "redhat", version: "-7.4", }, { model: "enterprise linux server extended update support", scope: "eq", trust: 0.3, vendor: "redhat", version: "-7.2", }, { model: "enterprise linux server extended update suppor", scope: "eq", trust: 0.3, vendor: "redhat", version: "-7.3", }, { model: "enterprise linux server aus", scope: "eq", trust: 0.3, vendor: "redhat", version: "-7.4", }, { model: "enterprise linux server aus", scope: "eq", trust: 0.3, vendor: "redhat", version: "-7.3", }, { model: "enterprise linux server aus", scope: "eq", trust: 0.3, vendor: "redhat", version: "-7.2", }, { model: "enterprise linux server year extended update support", scope: "eq", trust: 0.3, vendor: "redhat", version: "-47.2", }, { model: "enterprise linux server year extended upd", scope: "eq", trust: 0.3, vendor: "redhat", version: "-47.3", }, { model: "enterprise linux server", scope: "eq", trust: 0.3, vendor: "redhat", version: "7", }, { model: "enterprise linux server", scope: "eq", trust: 0.3, vendor: "redhat", version: "6", }, { model: "enterprise linux server", scope: "eq", trust: 0.3, vendor: "redhat", version: "5", }, { model: "enterprise linux long life server", scope: "eq", trust: 0.3, vendor: "redhat", version: "5.9", }, { model: "enterprise linux hpc node optional", scope: "eq", trust: 0.3, vendor: "redhat", version: "6", }, { model: "enterprise linux hpc node", scope: "eq", trust: 0.3, vendor: "redhat", version: "6", }, { model: "enterprise linux for scientific computing", scope: "eq", trust: 0.3, vendor: "redhat", version: "7", }, { model: "enterprise linux for power little endian extended update supp", scope: "eq", trust: 0.3, vendor: "redhat", version: "-7.4", }, { model: "enterprise linux for power little endian", scope: "eq", trust: 0.3, vendor: "redhat", version: "7", }, { model: "enterprise linux for power big endian extended update support", scope: "eq", trust: 0.3, vendor: "redhat", version: "-7.4", }, { model: "enterprise linux for power big endian", scope: "eq", trust: 0.3, vendor: "redhat", version: "7", }, { model: "enterprise linux for power little endian extended update suppo", scope: "eq", trust: 0.3, vendor: "redhat", version: "-7.3", }, { model: "enterprise linux for power little endian extended update suppo", scope: "eq", trust: 0.3, vendor: "redhat", version: "-7.2", }, { model: "enterprise linux for power big endian extended update support", scope: "eq", trust: 0.3, vendor: "redhat", version: "-7.3", }, { model: "enterprise linux for power big endian extended update support", scope: "eq", trust: 0.3, vendor: "redhat", version: "-7.2", }, { model: "enterprise linux for ibm z systems extended update support", scope: "eq", trust: 0.3, vendor: "redhat", version: "-7.4", }, { model: "enterprise linux for ibm z systems extended update support", scope: "eq", trust: 0.3, vendor: "redhat", version: "-7.3", }, { model: "enterprise linux for ibm z systems extended update support", scope: "eq", trust: 0.3, vendor: "redhat", version: "-7.2", }, { model: "enterprise linux for ibm z systems", scope: "eq", trust: 0.3, vendor: "redhat", version: "7", }, { model: "enterprise linux eus compute node", scope: "eq", trust: 0.3, vendor: "redhat", version: "7.4", }, { model: "enterprise linux eus compute node", scope: "eq", trust: 0.3, vendor: "redhat", version: "7.3", }, { model: "enterprise linux eus compute node", scope: "eq", trust: 0.3, vendor: "redhat", version: "7.2", }, { model: "enterprise linux desktop optional", scope: "eq", trust: 0.3, vendor: "redhat", version: "6", }, { model: "enterprise linux desktop", scope: "eq", trust: 0.3, vendor: "redhat", version: "7", }, { model: "enterprise linux desktop", scope: "eq", trust: 0.3, vendor: "redhat", version: "6", }, { model: "enterprise linux computenode optional eus", scope: "eq", trust: 0.3, vendor: "redhat", version: "7.3", }, { model: "enterprise linux computenode optional eus", scope: "eq", trust: 0.3, vendor: "redhat", version: "7.2", }, { model: "enterprise linux computenode optional", scope: "eq", trust: 0.3, vendor: "redhat", version: "7", }, { model: "enterprise linux computenode eus", scope: "eq", trust: 0.3, vendor: "redhat", version: "7.3", }, { model: "enterprise linux computenode eus", scope: "eq", trust: 0.3, vendor: "redhat", version: "7.2", }, { model: "enterprise linux computenode", scope: "eq", trust: 0.3, vendor: "redhat", version: "7", }, { model: "linux", scope: "eq", trust: 0.3, vendor: "oracle", version: "7", }, { model: "linux", scope: "eq", trust: 0.3, vendor: "oracle", version: "6", }, { model: "kubernetes", scope: "eq", trust: 0.3, vendor: "kubernetes", version: "1.7.6", }, { model: "kubernetes", scope: "eq", trust: 0.3, vendor: "kubernetes", version: "1.7", }, { model: "kubernetes", scope: "eq", trust: 0.3, vendor: "kubernetes", version: "1.6.10", }, { model: "kubernetes", scope: "eq", trust: 0.3, vendor: "kubernetes", version: "1.6", }, { model: "kubernetes", scope: "eq", trust: 0.3, vendor: "kubernetes", version: "1.5.7", }, { model: "kubernetes", scope: "eq", trust: 0.3, vendor: "kubernetes", version: "1.5", }, { model: "kubernetes", scope: "eq", trust: 0.3, vendor: "kubernetes", version: "1.2", }, { model: "android", scope: "eq", trust: 0.3, vendor: "google", version: "7.1.1", }, { model: "android", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.1", }, { model: "android", scope: "eq", trust: 0.3, vendor: "google", version: "5.1.1", }, { model: "android", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.2", }, { model: "android", scope: "eq", trust: 0.3, vendor: "google", version: "4.4.4", }, { model: "android", scope: "eq", trust: 0.3, vendor: "google", version: "8.0", }, { model: "android", scope: "eq", trust: 0.3, vendor: "google", version: "7.1.2", }, { model: "android", scope: "eq", trust: 0.3, vendor: "google", version: "7.0", }, { model: "android", scope: "eq", trust: 0.3, vendor: "google", version: "6.0", }, { model: "fedora", scope: "eq", trust: 0.3, vendor: "fedoraproject", version: "27", }, { model: "linux sparc", scope: "eq", trust: 0.3, vendor: "debian", version: "6.0", }, { model: "linux s/390", scope: "eq", trust: 0.3, vendor: "debian", version: "6.0", }, { model: "linux powerpc", scope: "eq", trust: 0.3, vendor: "debian", version: "6.0", }, { model: "linux mips", scope: "eq", trust: 0.3, vendor: "debian", version: "6.0", }, { model: "linux ia-64", scope: "eq", trust: 0.3, vendor: "debian", version: "6.0", }, { model: "linux ia-32", scope: "eq", trust: 0.3, vendor: "debian", version: "6.0", }, { model: "linux ia-30", scope: "eq", trust: 0.3, vendor: "debian", version: "6.0", }, { model: "linux arm", scope: "eq", trust: 0.3, vendor: "debian", version: "6.0", }, { model: "linux amd64", scope: "eq", trust: 0.3, vendor: "debian", version: "6.0", }, { model: "centos", scope: "eq", trust: 0.3, vendor: "centos", version: "7", }, { model: "centos", scope: "eq", trust: 0.3, vendor: "centos", version: "6", }, { model: "dnsmasq", scope: "ne", trust: 0.3, vendor: "thekelleys", version: "2.78", }, { model: "kubernetes", scope: "ne", trust: 0.3, vendor: "kubernetes", version: "1.8", }, { model: "kubernetes", scope: "ne", trust: 0.3, vendor: "kubernetes", version: "1.7.7", }, { model: "kubernetes", scope: "ne", trust: 0.3, vendor: "kubernetes", version: "1.6.11", }, { model: "kubernetes", scope: "ne", trust: 0.3, vendor: "kubernetes", version: "1.5.8", }, ], sources: [ { db: "CERT/CC", id: "VU#973527", }, { db: "BID", id: "101085", }, { db: "JVNDB", id: "JVNDB-2017-008620", }, { db: "NVD", id: "CVE-2017-14493", }, { db: "CNNVD", id: "CNNVD-201709-745", }, ], }, configurations: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", children: { "@container": "@list", }, cpe_match: { "@container": "@list", }, data: { "@container": "@list", }, nodes: { "@container": "@list", }, }, data: [ { CVE_data_version: "4.0", nodes: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:debian:debian_linux:7.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:canonical:ubuntu_linux:17.04:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:opensuse:leap:42.2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:a:thekelleys:dnsmasq:*:*:*:*:*:*:*:*", cpe_name: [], versionEndIncluding: "2.77", vulnerable: true, }, ], operator: "OR", }, ], }, ], sources: [ { db: "NVD", id: "CVE-2017-14493", }, ], }, credits: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "Gabriel Campana, Kevin Hamacher and Ron Bowes of the Google Security Team,Felix Wilhelm, Fermin J. Serna", sources: [ { db: "CNNVD", id: "CNNVD-201709-745", }, ], trust: 0.6, }, cve: "CVE-2017-14493", cvss: { "@context": { cvssV2: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2", }, cvssV3: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/", }, severity: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#", }, "@id": "https://www.variotdbs.pl/ref/cvss/severity", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { cvssV2: [ { acInsufInfo: false, accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", author: "NVD", availabilityImpact: "PARTIAL", baseScore: 7.5, confidentialityImpact: "PARTIAL", exploitabilityScore: 10, impactScore: 6.4, integrityImpact: "PARTIAL", obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, severity: "HIGH", trust: 1, userInteractionRequired: false, vectorString: "AV:N/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, { acInsufInfo: null, accessComplexity: "Low", accessVector: "Network", authentication: "None", author: "NVD", availabilityImpact: "Partial", baseScore: 7.5, confidentialityImpact: "Partial", exploitabilityScore: null, id: "CVE-2017-14493", impactScore: null, integrityImpact: "Partial", obtainAllPrivilege: null, obtainOtherPrivilege: null, obtainUserPrivilege: null, severity: "High", trust: 0.9, userInteractionRequired: null, vectorString: "AV:N/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, ], cvssV3: [ { attackComplexity: "LOW", attackVector: "NETWORK", author: "NVD", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", exploitabilityScore: 3.9, impactScore: 5.9, integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", trust: 1, userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, { attackComplexity: "Low", attackVector: "Network", author: "NVD", availabilityImpact: "High", baseScore: 9.8, baseSeverity: "Critical", confidentialityImpact: "High", exploitabilityScore: null, id: "CVE-2017-14493", impactScore: null, integrityImpact: "High", privilegesRequired: "None", scope: "Unchanged", trust: 0.8, userInteraction: "None", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, ], severity: [ { author: "NVD", id: "CVE-2017-14493", trust: 1.8, value: "CRITICAL", }, { author: "CNNVD", id: "CNNVD-201709-745", trust: 0.6, value: "HIGH", }, { author: "VULMON", id: "CVE-2017-14493", trust: 0.1, value: "HIGH", }, ], }, ], sources: [ { db: "VULMON", id: "CVE-2017-14493", }, { db: "JVNDB", id: "JVNDB-2017-008620", }, { db: "NVD", id: "CVE-2017-14493", }, { db: "CNNVD", id: "CNNVD-201709-745", }, ], }, description: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "Stack-based buffer overflow in dnsmasq before 2.78 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted DHCPv6 request. Dnsmasq versions 2.77 and earlier contains multiple vulnerabilities. dnsmasq Contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n=====================================================================\n Red Hat Security Advisory\n\nSynopsis: Critical: dnsmasq security update\nAdvisory ID: RHSA-2017:2836-01\nProduct: Red Hat Enterprise Linux\nAdvisory URL: https://access.redhat.com/errata/RHSA-2017:2836\nIssue date: 2017-10-02\nCVE Names: CVE-2017-14491 CVE-2017-14492 CVE-2017-14493 \n CVE-2017-14494 CVE-2017-14495 CVE-2017-14496 \n=====================================================================\n\n1. Summary:\n\nAn update for dnsmasq is now available for Red Hat Enterprise Linux 7. \n\nRed Hat Product Security has rated this update as having a security impact\nof Critical. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available for each vulnerability from\nthe CVE link(s) in the References section. \n\n2. Relevant releases/architectures:\n\nRed Hat Enterprise Linux Client (v. 7) - x86_64\nRed Hat Enterprise Linux Client Optional (v. 7) - x86_64\nRed Hat Enterprise Linux ComputeNode (v. 7) - x86_64\nRed Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64\nRed Hat Enterprise Linux Server (v. 7) - aarch64, ppc64, ppc64le, s390x, x86_64\nRed Hat Enterprise Linux Server Optional (v. 7) - aarch64, ppc64, ppc64le, s390x, x86_64\nRed Hat Enterprise Linux Workstation (v. 7) - x86_64\nRed Hat Enterprise Linux Workstation Optional (v. 7) - x86_64\n\n3. Description:\n\nThe dnsmasq packages contain Dnsmasq, a lightweight DNS (Domain Name\nServer) forwarder and DHCP (Dynamic Host Configuration Protocol) server. \n\nSecurity Fix(es):\n\n* A heap buffer overflow was found in dnsmasq in the code responsible for\nbuilding DNS replies. \n(CVE-2017-14491)\n\n* A heap buffer overflow was discovered in dnsmasq in the IPv6 router\nadvertisement (RA) handling code. This issue only affected\nconfigurations using one of these options: enable-ra, ra-only, slaac,\nra-names, ra-advrouter, or ra-stateless. (CVE-2017-14492)\n\n* A stack buffer overflow was found in dnsmasq in the DHCPv6 code. (CVE-2017-14493)\n\n* An information leak was found in dnsmasq in the DHCPv6 relay code. An\nattacker on the local network could send crafted DHCPv6 packets to dnsmasq\ncausing it to forward the contents of process memory, potentially leaking\nsensitive data. (CVE-2017-14494)\n\n* A memory exhaustion flaw was found in dnsmasq in the EDNS0 code. An\nattacker could send crafted DNS packets which would trigger memory\nallocations which would never be freed, leading to unbounded memory\nconsumption and eventually a crash. This issue only affected configurations\nusing one of the options: add-mac, add-cpe-id, or add-subnet. \n(CVE-2017-14495)\n\n* An integer underflow flaw leading to a buffer over-read was found in\ndnsmasq in the EDNS0 code. An attacker could send crafted DNS packets to\ndnsmasq which would cause it to crash. This issue only affected\nconfigurations using one of the options: add-mac, add-cpe-id, or\nadd-subnet. (CVE-2017-14496)\n\nRed Hat would like to thank Felix Wilhelm (Google Security Team), Fermin J. \nSerna (Google Security Team), Gabriel Campana (Google Security Team), Kevin\nHamacher (Google Security Team), and Ron Bowes (Google Security Team) for\nreporting these issues. \n\n4. Solution:\n\nFor details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\n5. Bugs fixed (https://bugzilla.redhat.com/):\n\n1495409 - CVE-2017-14491 dnsmasq: heap overflow in the code responsible for building DNS replies\n1495410 - CVE-2017-14492 dnsmasq: heap overflow in the IPv6 router advertisement code\n1495411 - CVE-2017-14493 dnsmasq: stack buffer overflow in the DHCPv6 code\n1495412 - CVE-2017-14494 dnsmasq: information leak in the DHCPv6 relay code\n1495415 - CVE-2017-14495 dnsmasq: memory exhaustion vulnerability in the EDNS0 code\n1495416 - CVE-2017-14496 dnsmasq: integer underflow leading to buffer over-read in the EDNS0 code\n\n6. Package List:\n\nRed Hat Enterprise Linux Client (v. 7):\n\nSource:\ndnsmasq-2.76-2.el7_4.2.src.rpm\n\nx86_64:\ndnsmasq-2.76-2.el7_4.2.x86_64.rpm\ndnsmasq-debuginfo-2.76-2.el7_4.2.x86_64.rpm\n\nRed Hat Enterprise Linux Client Optional (v. 7):\n\nx86_64:\ndnsmasq-debuginfo-2.76-2.el7_4.2.x86_64.rpm\ndnsmasq-utils-2.76-2.el7_4.2.x86_64.rpm\n\nRed Hat Enterprise Linux ComputeNode (v. 7):\n\nSource:\ndnsmasq-2.76-2.el7_4.2.src.rpm\n\nx86_64:\ndnsmasq-2.76-2.el7_4.2.x86_64.rpm\ndnsmasq-debuginfo-2.76-2.el7_4.2.x86_64.rpm\n\nRed Hat Enterprise Linux ComputeNode Optional (v. 7):\n\nx86_64:\ndnsmasq-debuginfo-2.76-2.el7_4.2.x86_64.rpm\ndnsmasq-utils-2.76-2.el7_4.2.x86_64.rpm\n\nRed Hat Enterprise Linux Server (v. 7):\n\nSource:\ndnsmasq-2.76-2.el7_4.2.src.rpm\n\naarch64:\ndnsmasq-2.76-2.el7_4.2.aarch64.rpm\ndnsmasq-debuginfo-2.76-2.el7_4.2.aarch64.rpm\n\nppc64:\ndnsmasq-2.76-2.el7_4.2.ppc64.rpm\ndnsmasq-debuginfo-2.76-2.el7_4.2.ppc64.rpm\n\nppc64le:\ndnsmasq-2.76-2.el7_4.2.ppc64le.rpm\ndnsmasq-debuginfo-2.76-2.el7_4.2.ppc64le.rpm\n\ns390x:\ndnsmasq-2.76-2.el7_4.2.s390x.rpm\ndnsmasq-debuginfo-2.76-2.el7_4.2.s390x.rpm\n\nx86_64:\ndnsmasq-2.76-2.el7_4.2.x86_64.rpm\ndnsmasq-debuginfo-2.76-2.el7_4.2.x86_64.rpm\n\nRed Hat Enterprise Linux Server Optional (v. 7):\n\naarch64:\ndnsmasq-debuginfo-2.76-2.el7_4.2.aarch64.rpm\ndnsmasq-utils-2.76-2.el7_4.2.aarch64.rpm\n\nppc64:\ndnsmasq-debuginfo-2.76-2.el7_4.2.ppc64.rpm\ndnsmasq-utils-2.76-2.el7_4.2.ppc64.rpm\n\nppc64le:\ndnsmasq-debuginfo-2.76-2.el7_4.2.ppc64le.rpm\ndnsmasq-utils-2.76-2.el7_4.2.ppc64le.rpm\n\ns390x:\ndnsmasq-debuginfo-2.76-2.el7_4.2.s390x.rpm\ndnsmasq-utils-2.76-2.el7_4.2.s390x.rpm\n\nx86_64:\ndnsmasq-debuginfo-2.76-2.el7_4.2.x86_64.rpm\ndnsmasq-utils-2.76-2.el7_4.2.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation (v. 7):\n\nSource:\ndnsmasq-2.76-2.el7_4.2.src.rpm\n\nx86_64:\ndnsmasq-2.76-2.el7_4.2.x86_64.rpm\ndnsmasq-debuginfo-2.76-2.el7_4.2.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation Optional (v. 7):\n\nx86_64:\ndnsmasq-debuginfo-2.76-2.el7_4.2.x86_64.rpm\ndnsmasq-utils-2.76-2.el7_4.2.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security. Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/\n\n7. References:\n\nhttps://access.redhat.com/security/cve/CVE-2017-14491\nhttps://access.redhat.com/security/cve/CVE-2017-14492\nhttps://access.redhat.com/security/cve/CVE-2017-14493\nhttps://access.redhat.com/security/cve/CVE-2017-14494\nhttps://access.redhat.com/security/cve/CVE-2017-14495\nhttps://access.redhat.com/security/cve/CVE-2017-14496\nhttps://access.redhat.com/security/updates/classification/#critical\nhttps://access.redhat.com/security/vulnerabilities/3199382\n\n8. Contact:\n\nThe Red Hat security contact is <secalert@redhat.com>. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2017 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1\n\niD8DBQFZ0opYXlSAg2UNWIIRAr0dAJ9rIL1FgNTJUf2I9jjKFFlfkCd/kwCfV+bX\nSfoCV7+qG2nwqlHKLZOlhIU=\n=iWfU\n-----END PGP SIGNATURE-----\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://www.redhat.com/mailman/listinfo/rhsa-announce\n. \n===========================================================================\nUbuntu Security Notice USN-3430-3\nJanuary 04, 2018\n\ndnsmasq regression\n===========================================================================\n\nA security issue affects these releases of Ubuntu and its derivatives:\n\n- Ubuntu 12.04 ESM\n\nSummary:\n\nUSN-3430-2 introduced regression in Dnsmasq. \n\nSoftware Description:\n- dnsmasq: Small caching DNS proxy and DHCP/TFTP server\n\nDetails:\n\nUSN-3430-2 fixed several vulnerabilities. The update introduced a new\nregression that breaks DNS resolution. This update addresses the\nproblem. \n\nWe apologize for the inconvenience. \n\nOriginal advisory details:\n\nFelix Wilhelm, Fermin J. Serna, Gabriel Campana and Kevin Hamacher\ndiscovered that Dnsmasq incorrectly handled DNS requests. \n(CVE-2017-14491)\n\nFelix Wilhelm, Fermin J. (CVE-2017-14492)\n\nFelix Wilhelm, Fermin J. Serna, Gabriel Campana and Kevin Hamacher\ndiscovered that Dnsmasq incorrectly handled DHCPv6 requests. \n(CVE-2017-14493)\n\nFelix Wilhelm, Fermin J. Serna, Gabriel Campana and Kevin Hamacher\ndiscovered that Dnsmasq incorrectly handled DHCPv6 packets. (CVE-2017-14494)\n\nFelix Wilhelm, Fermin J. Serna, Gabriel Campana and Kevin Hamacher\ndiscovered that Dnsmasq incorrectly handled DNS requests. (CVE-2017-14495)\n\nFelix Wilhelm, Fermin J. Serna, Gabriel Campana and Kevin Hamacher\ndiscovered that Dnsmasq incorrectly handled DNS requests. (CVE-2017-14496)\n\nUpdate instructions:\n\nThe problem can be corrected by updating your system to the following\npackage versions:\n\nUbuntu 12.04 ESM:\n dnsmasq=C2=A02.59-4ubuntu0.4\n dnsmasq-base2.59-4ubuntu0.4\n dnsmasq-utils2.59-4ubuntu0.4\n\nAfter a standard system update you need to reboot your computer to make\nall the necessary changes. 7.3) - ppc64, ppc64le, s390x, x86_64\n\n3. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\nGentoo Linux Security Advisory GLSA 201710-27\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n https://security.gentoo.org/\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\n Severity: Normal\n Title: Dnsmasq: Multiple vulnerabilities\n Date: October 23, 2017\n Bugs: #632692\n ID: 201710-27\n\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\nSynopsis\n========\n\nMultiple vulnerabilities have been found in Dnsmasq, the worst of which\nmay allow remote attackers to execute arbitrary code. \n\nAffected packages\n=================\n\n -------------------------------------------------------------------\n Package / Vulnerable / Unaffected\n -------------------------------------------------------------------\n 1 net-dns/dnsmasq < 2.78 >= 2.78 \n\nDescription\n===========\n\nMultiple vulnerabilities have been discovered in Dnsmasq. \n\nWorkaround\n==========\n\nThere is no known workaround at this time. \n\nResolution\n==========\n\nAll Dnsmasq users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose \">=net-dns/dnsmasq-2.78\"\n\nReferences\n==========\n\n[ 1 ] CVE-2017-14491\n https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-14491\n[ 2 ] CVE-2017-14492\n https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-14492\n[ 3 ] CVE-2017-14493\n https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-14493\n[ 4 ] CVE-2017-14494\n https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-14494\n[ 5 ] CVE-2017-14495\n https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-14495\n[ 6 ] CVE-2017-14496\n https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-14496\n\nAvailability\n============\n\nThis GLSA and any updates to it are available for viewing at\nthe Gentoo Security Website:\n\n https://security.gentoo.org/glsa/201710-27\n\nConcerns?\n=========\n\nSecurity is a primary focus of Gentoo Linux and ensuring the\nconfidentiality and security of our users' machines is of utmost\nimportance to us. Any security concerns should be addressed to\nsecurity@gentoo.org or alternatively, you may file a bug at\nhttps://bugs.gentoo.org. \n\nLicense\n=======\n\nCopyright 2017 Gentoo Foundation, Inc; referenced text\nbelongs to its owner(s). \n\nThe contents of this document are licensed under the\nCreative Commons - Attribution / Share Alike license. \n\nhttp://creativecommons.org/licenses/by-sa/2.5\n", sources: [ { db: "NVD", id: "CVE-2017-14493", }, { db: "CERT/CC", id: "VU#973527", }, { db: "JVNDB", id: "JVNDB-2017-008620", }, { db: "BID", id: "101085", }, { db: "VULMON", id: "CVE-2017-14493", }, { db: "PACKETSTORM", id: "144490", }, { db: "PACKETSTORM", id: "144484", }, { db: "PACKETSTORM", id: "145652", }, { db: "PACKETSTORM", id: "144477", }, { db: "PACKETSTORM", id: "144469", }, { db: "PACKETSTORM", id: "144706", }, ], trust: 3.24, }, exploit_availability: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { reference: "https://vulmon.com/exploitdetails?qidtp=exploitdb&qid=42943", trust: 0.1, type: "exploit", }, ], sources: [ { db: "VULMON", id: "CVE-2017-14493", }, ], }, external_ids: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { db: "CERT/CC", id: "VU#973527", trust: 3.6, }, { db: "NVD", id: "CVE-2017-14493", trust: 3.4, }, { db: "BID", id: "101085", trust: 2, }, { db: "SECTRACK", id: "1039474", trust: 1.1, }, { db: "EXPLOIT-DB", id: "42943", trust: 1.1, }, { db: "ICS CERT", id: "ICSA-17-332-01", trust: 0.9, }, { db: "JVN", id: "JVNVU93453933", trust: 0.8, }, { db: "JVNDB", id: "JVNDB-2017-008620", trust: 0.8, }, { db: "CNNVD", id: "CNNVD-201709-745", trust: 0.6, }, { db: "VULMON", id: "CVE-2017-14493", trust: 0.1, }, { db: "PACKETSTORM", id: "144490", trust: 0.1, }, { db: "PACKETSTORM", id: "144484", trust: 0.1, }, { db: "PACKETSTORM", id: "145652", trust: 0.1, }, { db: "PACKETSTORM", id: "144477", trust: 0.1, }, { db: "PACKETSTORM", id: "144469", trust: 0.1, }, { db: "PACKETSTORM", id: "144706", trust: 0.1, }, ], sources: [ { db: "CERT/CC", id: "VU#973527", }, { db: "VULMON", id: "CVE-2017-14493", }, { db: "BID", id: "101085", }, { db: "JVNDB", id: "JVNDB-2017-008620", }, { db: "PACKETSTORM", id: "144490", }, { db: "PACKETSTORM", id: "144484", }, { db: "PACKETSTORM", id: "145652", }, { db: "PACKETSTORM", id: "144477", }, { db: "PACKETSTORM", id: "144469", }, { db: "PACKETSTORM", id: "144706", }, { db: "NVD", id: "CVE-2017-14493", }, { db: "CNNVD", id: "CNNVD-201709-745", }, ], }, id: "VAR-201710-0449", iot: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: true, sources: [ { db: "VARIoT devices database", id: null, }, ], trust: 0.24812031, }, last_update_date: "2023-12-26T00:11:30.475000Z", patch: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { title: "DSA-3989", trust: 0.8, url: "https://www.debian.org/security/2017/dsa-3989", }, { title: "Security Bulletin: NVIDIA Tegra Jetson L4T contains multiple vulnerabilities; updates for “BlueBorne” and “Dnsmasq”.", trust: 0.8, url: "http://nvidia.custhelp.com/app/answers/detail/a_id/4561", }, { title: "openSUSE-SU-2017:2633", trust: 0.8, url: "https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00006.html", }, { title: "RHSA-2017:2836", trust: 0.8, url: "https://access.redhat.com/errata/rhsa-2017:2836", }, { title: "RHSA-2017:2837", trust: 0.8, url: "https://access.redhat.com/errata/rhsa-2017:2837", }, { title: "Security fix, CVE-2017-14493, DHCPv6 - Stack buffer overflow.", trust: 0.8, url: "http://thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=commit;h=3d4ff1ba8419546490b464418223132529514033", }, { title: "CHANGELOG", trust: 0.8, url: "http://thekelleys.org.uk/dnsmasq/changelog", }, { title: "USN-3430-1", trust: 0.8, url: "https://usn.ubuntu.com/usn/usn-3430-1/", }, { title: "USN-3430-2", trust: 0.8, url: "https://usn.ubuntu.com/usn/usn-3430-2/", }, { title: "Dnsmasq Buffer error vulnerability fix", trust: 0.6, url: "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=92841", }, { title: "Red Hat: Critical: dnsmasq security update", trust: 0.1, url: "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=rhsa-20172837 - security advisory", }, { title: "Red Hat: Critical: dnsmasq security update", trust: 0.1, url: "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=rhsa-20172836 - security advisory", }, { title: "Arch Linux Issues: ", trust: 0.1, url: "https://vulmon.com/vendoradvisory?qidtp=arch_linux_issues&qid=cve-2017-14493", }, { title: "Ubuntu Security Notice: dnsmasq vulnerabilities", trust: 0.1, url: "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=usn-3430-2", }, { title: "Ubuntu Security Notice: dnsmasq regression", trust: 0.1, url: "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=usn-3430-3", }, { title: "Ubuntu Security Notice: dnsmasq vulnerabilities", trust: 0.1, url: "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=usn-3430-1", }, { title: "Debian Security Advisories: DSA-3989-1 dnsmasq -- security update", trust: 0.1, url: "https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories&qid=5c18698ecfe74c7de381531f8ed44dcf", }, { title: "Amazon Linux 2: ALAS2-2019-1251", trust: 0.1, url: "https://vulmon.com/vendoradvisory?qidtp=amazon_linux2&qid=alas2-2019-1251", }, { title: "Amazon Linux AMI: ALAS-2017-907", trust: 0.1, url: "https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami&qid=alas-2017-907", }, { title: "Arch Linux Advisories: [ASA-201710-1] dnsmasq: multiple issues", trust: 0.1, url: "https://vulmon.com/vendoradvisory?qidtp=arch_linux_advisories&qid=asa-201710-1", }, { title: "Oracle Solaris Third Party Bulletins: Oracle Solaris Third Party Bulletin - October 2017", trust: 0.1, url: "https://vulmon.com/vendoradvisory?qidtp=oracle_solaris_third_party_bulletins&qid=6283337cd31f81f24d445925f2138c0e", }, { title: "Oracle Linux Bulletins: Oracle Linux Bulletin - October 2017", trust: 0.1, url: "https://vulmon.com/vendoradvisory?qidtp=oracle_linux_bulletins&qid=7251d5e5f2b1771951980ad7cfde50ba", }, { title: "bof-dnsmasq-cve-2017-14493", trust: 0.1, url: "https://github.com/pupiles/bof-dnsmasq-cve-2017-14493 ", }, { title: "Safe libc", trust: 0.1, url: "https://github.com/introspection-libc/main ", }, { title: "What is this?\nHow does it work?\nHow to build the toolchain\nHow to build a program using the safe libc\nAnd in the real world?", trust: 0.1, url: "https://github.com/pekd/safe-libc ", }, { title: "What is this?\nHow does it work?\nHow to build the toolchain\nHow to build a program using the safe libc\nAnd in the real world?", trust: 0.1, url: "https://github.com/introspection-libc/safe-libc ", }, { title: "Awesome CVE PoC", trust: 0.1, url: "https://github.com/lnick2023/nicenice ", }, { title: "Awesome CVE PoC", trust: 0.1, url: "https://github.com/qazbnm456/awesome-cve-poc ", }, { title: "Awesome CVE PoC", trust: 0.1, url: "https://github.com/xbl3/awesome-cve-poc_qazbnm456 ", }, { title: "Threatpost", trust: 0.1, url: "https://threatpost.com/google-warns-of-dos-and-rce-bugs-in-dnsmasq/128238/", }, ], sources: [ { db: "VULMON", id: "CVE-2017-14493", }, { db: "JVNDB", id: "JVNDB-2017-008620", }, { db: "CNNVD", id: "CNNVD-201709-745", }, ], }, problemtype_data: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { problemtype: "CWE-119", trust: 1.8, }, { problemtype: "CWE-121", trust: 0.8, }, ], sources: [ { db: "JVNDB", id: "JVNDB-2017-008620", }, { db: "NVD", id: "CVE-2017-14493", }, ], }, references: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { trust: 2.9, url: "https://www.kb.cert.org/vuls/id/973527", }, { trust: 2.8, url: "https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html", }, { trust: 2.3, url: "http://www.securityfocus.com/bid/101085", }, { trust: 2.2, url: "https://access.redhat.com/errata/rhsa-2017:2837", }, { trust: 2.1, url: "https://access.redhat.com/errata/rhsa-2017:2836", }, { trust: 2, url: "http://www.debian.org/security/2017/dsa-3989", }, { trust: 1.7, url: "http://www.thekelleys.org.uk/dnsmasq/doc.html", }, { trust: 1.4, url: "http://www.ubuntu.com/usn/usn-3430-1", }, { trust: 1.4, url: "https://nvd.nist.gov/vuln/detail/cve-2017-14493", }, { trust: 1.3, url: "https://access.redhat.com/security/vulnerabilities/3199382", }, { trust: 1.2, url: "https://www.exploit-db.com/exploits/42943/", }, { trust: 1.2, url: "http://www.ubuntu.com/usn/usn-3430-2", }, { trust: 1.2, url: "https://security.gentoo.org/glsa/201710-27", }, { trust: 1.1, url: "http://thekelleys.org.uk/dnsmasq/changelog", }, { trust: 1.1, url: "http://www.securitytracker.com/id/1039474", }, { trust: 1.1, url: "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00006.html", }, { trust: 1.1, url: "http://nvidia.custhelp.com/app/answers/detail/a_id/4561", }, { trust: 1.1, url: "https://www.synology.com/support/security/synology_sa_17_59_dnsmasq", }, { trust: 1.1, url: "http://www.arubanetworks.com/assets/alert/aruba-psa-2017-005.txt", }, { trust: 1.1, url: "http://thekelleys.org.uk/gitweb/?p=dnsmasq.git%3ba=commit%3bh=3d4ff1ba8419546490b464418223132529514033", }, { trust: 1.1, url: "https://www.mail-archive.com/dnsmasq-discuss%40lists.thekelleys.org.uk/msg11665.html", }, { trust: 1.1, url: "https://www.mail-archive.com/dnsmasq-discuss%40lists.thekelleys.org.uk/msg11664.html", }, { trust: 1.1, url: "https://access.redhat.com/security/cve/cve-2017-14491", }, { trust: 1.1, url: "https://access.redhat.com/security/cve/cve-2017-14492", }, { trust: 1.1, url: "https://access.redhat.com/security/cve/cve-2017-14493", }, { trust: 1.1, url: "https://access.redhat.com/security/cve/cve-2017-14494", }, { trust: 1, url: "https://access.redhat.com/security/cve/cve-2017-14495", }, { trust: 1, url: "https://access.redhat.com/security/cve/cve-2017-14496", }, { trust: 0.9, url: "http://www.thekelleys.org.uk/dnsmasq/changelog", }, { trust: 0.9, url: "https://github.com/google/security-research-pocs/blob/master/vulnerabilities/dnsmasq/cve-2017-14491.py", }, { trust: 0.9, url: "https://github.com/google/security-research-pocs/blob/master/vulnerabilities/dnsmasq/cve-2017-14492.py", }, { trust: 0.9, url: "https://github.com/google/security-research-pocs/blob/master/vulnerabilities/dnsmasq/cve-2017-14493.py", }, { trust: 0.9, url: "https://github.com/google/security-research-pocs/blob/master/vulnerabilities/dnsmasq/cve-2017-14494.py", }, { trust: 0.9, url: "https://github.com/google/security-research-pocs/blob/master/vulnerabilities/dnsmasq/cve-2017-14495.py", }, { trust: 0.9, url: "https://github.com/kubernetes/kubernetes/blob/master/changelog.md", }, { trust: 0.9, url: "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2017&m=slackware-security.601472", }, { trust: 0.9, url: "https://source.android.com/security/bulletin/2017-10-01", }, { trust: 0.9, url: "https://bugzilla.redhat.com/show_bug.cgi?id=1495410", }, { trust: 0.9, url: "https://bugzilla.redhat.com/show_bug.cgi?id=1495411", }, { trust: 0.9, url: "https://bugzilla.redhat.com/show_bug.cgi?id=1495412", }, { trust: 0.9, url: "https://bugzilla.redhat.com/show_bug.cgi?id=1495415", }, { trust: 0.9, url: "https://bugzilla.redhat.com/show_bug.cgi?id=1495416", }, { trust: 0.9, url: "https://bugzilla.redhat.com/show_bug.cgi?id=1495510", }, { trust: 0.9, url: "https://access.redhat.com/security/cve/cve-2017-13704", }, { trust: 0.9, url: "https://github.com/google/security-research-pocs/blob/master/vulnerabilities/dnsmasq/cve-2017-14496.py", }, { trust: 0.9, url: "https://ics-cert.us-cert.gov/advisories/icsa-17-332-01", }, { trust: 0.8, url: "https://www.ruckuswireless.com/security", }, { trust: 0.8, url: "https://www.zyxel.com/support/announcement_dnsmasq_vulnerabilities.shtml", }, { trust: 0.8, url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-14493", }, { trust: 0.8, url: "http://jvn.jp/vu/jvnvu93453933/index.html", }, { trust: 0.6, url: "https://nvd.nist.gov/vuln/detail/cve-2017-14491", }, { trust: 0.6, url: "https://nvd.nist.gov/vuln/detail/cve-2017-14494", }, { trust: 0.6, url: "https://nvd.nist.gov/vuln/detail/cve-2017-14492", }, { trust: 0.6, url: "https://bugzilla.redhat.com/show_bug.cgi?id=1495409bug1495409", }, { trust: 0.5, url: "https://nvd.nist.gov/vuln/detail/cve-2017-14496", }, { trust: 0.5, url: "https://nvd.nist.gov/vuln/detail/cve-2017-14495", }, { trust: 0.3, url: "https://bugzilla.redhat.com/show_bug.cgi?id=1495409 bug 1495409", }, { trust: 0.2, url: "https://access.redhat.com/security/updates/classification/#critical", }, { trust: 0.2, url: "https://access.redhat.com/articles/11258", }, { trust: 0.2, url: "https://access.redhat.com/security/team/contact/", }, { trust: 0.2, url: "https://www.redhat.com/mailman/listinfo/rhsa-announce", }, { trust: 0.2, url: "https://bugzilla.redhat.com/):", }, { trust: 0.2, url: "https://access.redhat.com/security/team/key/", }, { trust: 0.1, url: "https://cwe.mitre.org/data/definitions/119.html", }, { trust: 0.1, url: "https://github.com/pupiles/bof-dnsmasq-cve-2017-14493", }, { trust: 0.1, url: "https://tools.cisco.com/security/center/viewalert.x?alertid=55496", }, { trust: 0.1, url: "https://nvd.nist.gov", }, { trust: 0.1, url: "https://launchpad.net/bugs/1741262", }, { trust: 0.1, url: "https://www.ubuntu.com/usn/usn-3430-3", }, { trust: 0.1, url: "https://launchpad.net/ubuntu/+source/dnsmasq/2.76-5ubuntu0.1", }, { trust: 0.1, url: "https://launchpad.net/ubuntu/+source/dnsmasq/2.75-1ubuntu0.16.04.3", }, { trust: 0.1, url: "https://launchpad.net/ubuntu/+source/dnsmasq/2.68-1ubuntu0.2", }, { trust: 0.1, url: "https://nvd.nist.gov/nvd.cfm?cvename=cve-2017-14495", }, { trust: 0.1, url: "http://creativecommons.org/licenses/by-sa/2.5", }, { trust: 0.1, url: "https://nvd.nist.gov/nvd.cfm?cvename=cve-2017-14493", }, { trust: 0.1, url: "https://nvd.nist.gov/nvd.cfm?cvename=cve-2017-14492", }, { trust: 0.1, url: "https://nvd.nist.gov/nvd.cfm?cvename=cve-2017-14491", }, { trust: 0.1, url: "https://security.gentoo.org/", }, { trust: 0.1, url: "https://nvd.nist.gov/nvd.cfm?cvename=cve-2017-14496", }, { trust: 0.1, url: "https://bugs.gentoo.org.", }, { trust: 0.1, url: "https://nvd.nist.gov/nvd.cfm?cvename=cve-2017-14494", }, ], sources: [ { db: "CERT/CC", id: "VU#973527", }, { db: "VULMON", id: "CVE-2017-14493", }, { db: "BID", id: "101085", }, { db: "JVNDB", id: "JVNDB-2017-008620", }, { db: "PACKETSTORM", id: "144490", }, { db: "PACKETSTORM", id: "144484", }, { db: "PACKETSTORM", id: "145652", }, { db: "PACKETSTORM", id: "144477", }, { db: "PACKETSTORM", id: "144469", }, { db: "PACKETSTORM", id: "144706", }, { db: "NVD", id: "CVE-2017-14493", }, { db: "CNNVD", id: "CNNVD-201709-745", }, ], }, sources: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", data: { "@container": "@list", }, }, data: [ { db: "CERT/CC", id: "VU#973527", }, { db: "VULMON", id: "CVE-2017-14493", }, { db: "BID", id: "101085", }, { db: "JVNDB", id: "JVNDB-2017-008620", }, { db: "PACKETSTORM", id: "144490", }, { db: "PACKETSTORM", id: "144484", }, { db: "PACKETSTORM", id: "145652", }, { db: "PACKETSTORM", id: "144477", }, { db: "PACKETSTORM", id: "144469", }, { db: "PACKETSTORM", id: "144706", }, { db: "NVD", id: "CVE-2017-14493", }, { db: "CNNVD", id: "CNNVD-201709-745", }, ], }, sources_release_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", data: { "@container": "@list", }, }, data: [ { date: "2017-10-02T00:00:00", db: "CERT/CC", id: "VU#973527", }, { date: "2017-10-03T00:00:00", db: "VULMON", id: "CVE-2017-14493", }, { date: "2017-10-02T00:00:00", db: "BID", id: "101085", }, { date: "2017-10-24T00:00:00", db: "JVNDB", id: "JVNDB-2017-008620", }, { date: "2017-10-03T20:21:00", db: "PACKETSTORM", id: "144490", }, { date: "2017-10-03T05:19:24", db: "PACKETSTORM", id: "144484", }, { date: "2018-01-04T17:50:40", db: "PACKETSTORM", id: "145652", }, { date: "2017-10-02T11:11:00", db: "PACKETSTORM", id: "144477", }, { date: "2017-10-02T13:13:00", db: "PACKETSTORM", id: "144469", }, { date: "2017-10-23T13:54:05", db: "PACKETSTORM", id: "144706", }, { date: "2017-10-03T01:29:02.077000", db: "NVD", id: "CVE-2017-14493", }, { date: "2017-09-18T00:00:00", db: "CNNVD", id: "CNNVD-201709-745", }, ], }, sources_update_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", data: { "@container": "@list", }, }, data: [ { date: "2018-02-02T00:00:00", db: "CERT/CC", id: "VU#973527", }, { date: "2023-11-07T00:00:00", db: "VULMON", id: "CVE-2017-14493", }, { date: "2017-10-02T00:00:00", db: "BID", id: "101085", }, { date: "2017-10-24T00:00:00", db: "JVNDB", id: "JVNDB-2017-008620", }, { date: "2023-11-07T02:39:01.497000", db: "NVD", id: "CVE-2017-14493", }, { date: "2019-05-24T00:00:00", db: "CNNVD", id: "CNNVD-201709-745", }, ], }, threat_type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "remote or local", sources: [ { db: "CNNVD", id: "CNNVD-201709-745", }, ], trust: 0.6, }, title: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "dnsmasq Buffer error vulnerability", sources: [ { db: "JVNDB", id: "JVNDB-2017-008620", }, { db: "CNNVD", id: "CNNVD-201709-745", }, ], trust: 1.4, }, type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "buffer error", sources: [ { db: "CNNVD", id: "CNNVD-201709-745", }, ], trust: 0.6, }, }
rhsa-2017_2837
Vulnerability from csaf_redhat
Notes
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Critical", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "An update for dnsmasq is now available for Red Hat Enterprise Linux 7.2 Extended Update Support and Red Hat Enterprise Linux 7.3 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", title: "Topic", }, { category: "general", text: "The dnsmasq packages contain Dnsmasq, a lightweight DNS (Domain Name Server) forwarder and DHCP (Dynamic Host Configuration Protocol) server.\n\nSecurity Fix(es):\n\n* A heap buffer overflow was found in dnsmasq in the code responsible for building DNS replies. An attacker could send crafted DNS packets to dnsmasq which would cause it to crash or, potentially, execute arbitrary code. (CVE-2017-14491)\n\n* A heap buffer overflow was discovered in dnsmasq in the IPv6 router advertisement (RA) handling code. An attacker on the local network segment could send crafted RAs to dnsmasq which would cause it to crash or, potentially, execute arbitrary code. This issue only affected configurations using one of these options: enable-ra, ra-only, slaac, ra-names, ra-advrouter, or ra-stateless. (CVE-2017-14492)\n\n* A stack buffer overflow was found in dnsmasq in the DHCPv6 code. An attacker on the local network could send a crafted DHCPv6 request to dnsmasq which would cause it to a crash or, potentially, execute arbitrary code. (CVE-2017-14493)\n\n* An information leak was found in dnsmasq in the DHCPv6 relay code. An attacker on the local network could send crafted DHCPv6 packets to dnsmasq causing it to forward the contents of process memory, potentially leaking sensitive data. (CVE-2017-14494)\n\nRed Hat would like to thank Felix Wilhelm (Google Security Team), Fermin J. Serna (Google Security Team), Gabriel Campana (Google Security Team), Kevin Hamacher (Google Security Team), and Ron Bowes (Google Security Team) for reporting these issues.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2017:2837", url: "https://access.redhat.com/errata/RHSA-2017:2837", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#critical", url: "https://access.redhat.com/security/updates/classification/#critical", }, { category: "external", summary: "https://access.redhat.com/security/vulnerabilities/3199382", url: "https://access.redhat.com/security/vulnerabilities/3199382", }, { category: "external", summary: "1495409", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1495409", }, { category: "external", summary: "1495410", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1495410", }, { category: "external", summary: "1495411", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1495411", }, { category: "external", summary: "1495412", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1495412", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2017/rhsa-2017_2837.json", }, ], title: "Red Hat Security Advisory: dnsmasq security update", tracking: { current_release_date: "2024-11-22T11:34:10+00:00", generator: { date: "2024-11-22T11:34:10+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.1", }, }, id: "RHSA-2017:2837", initial_release_date: "2017-10-02T16:19:55+00:00", revision_history: [ { date: "2017-10-02T16:19:55+00:00", number: "1", summary: "Initial version", }, { date: "2017-10-02T16:19:55+00:00", number: "2", summary: "Last updated version", }, { date: "2024-11-22T11:34:10+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux ComputeNode EUS (v. 7.2)", product: { name: "Red Hat Enterprise Linux ComputeNode EUS (v. 7.2)", product_id: "7ComputeNode-7.2.EUS", product_identification_helper: { cpe: "cpe:/o:redhat:rhel_eus:7.2::computenode", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)", product: { name: "Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)", product_id: "7ComputeNode-optional-7.2.EUS", product_identification_helper: { cpe: "cpe:/o:redhat:rhel_eus:7.2::computenode", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Server EUS (v. 7.2)", product: { name: "Red Hat Enterprise Linux Server EUS (v. 7.2)", product_id: "7Server-7.2.EUS", product_identification_helper: { cpe: "cpe:/o:redhat:rhel_eus:7.2::server", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Server Optional EUS (v. 7.2)", product: { name: "Red Hat Enterprise Linux Server Optional EUS (v. 7.2)", product_id: "7Server-optional-7.2.EUS", product_identification_helper: { cpe: "cpe:/o:redhat:rhel_eus:7.2::server", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", product: { name: "Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", product_id: "7ComputeNode-7.3.EUS", product_identification_helper: { cpe: "cpe:/o:redhat:rhel_eus:7.3::computenode", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", product: { name: "Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", product_id: "7ComputeNode-optional-7.3.EUS", product_identification_helper: { cpe: "cpe:/o:redhat:rhel_eus:7.3::computenode", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Server EUS (v. 7.3)", product: { name: "Red Hat Enterprise Linux Server EUS (v. 7.3)", product_id: "7Server-7.3.EUS", product_identification_helper: { cpe: "cpe:/o:redhat:rhel_eus:7.3::server", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", product: { name: "Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", product_id: "7Server-optional-7.3.EUS", product_identification_helper: { cpe: "cpe:/o:redhat:rhel_eus:7.3::server", }, }, }, ], category: "product_family", name: "Red Hat Enterprise Linux", }, { branches: [ { category: "product_version", name: "dnsmasq-0:2.66-14.el7_2.2.x86_64", product: { name: "dnsmasq-0:2.66-14.el7_2.2.x86_64", product_id: "dnsmasq-0:2.66-14.el7_2.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/dnsmasq@2.66-14.el7_2.2?arch=x86_64", }, }, }, { category: "product_version", name: "dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", product: { name: "dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", product_id: "dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/dnsmasq-debuginfo@2.66-14.el7_2.2?arch=x86_64", }, }, }, { category: "product_version", name: "dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", product: { name: "dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", product_id: "dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/dnsmasq-utils@2.66-14.el7_2.2?arch=x86_64", }, }, }, { category: "product_version", name: "dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", product: { name: "dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", product_id: "dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/dnsmasq-debuginfo@2.66-21.el7_3.2?arch=x86_64", }, }, }, { category: "product_version", name: "dnsmasq-0:2.66-21.el7_3.2.x86_64", product: { name: "dnsmasq-0:2.66-21.el7_3.2.x86_64", product_id: "dnsmasq-0:2.66-21.el7_3.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/dnsmasq@2.66-21.el7_3.2?arch=x86_64", }, }, }, { category: "product_version", name: "dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", product: { name: "dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", product_id: "dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/dnsmasq-utils@2.66-21.el7_3.2?arch=x86_64", }, }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_version", name: "dnsmasq-0:2.66-14.el7_2.2.src", product: { name: "dnsmasq-0:2.66-14.el7_2.2.src", product_id: "dnsmasq-0:2.66-14.el7_2.2.src", product_identification_helper: { purl: "pkg:rpm/redhat/dnsmasq@2.66-14.el7_2.2?arch=src", }, }, }, { category: "product_version", name: "dnsmasq-0:2.66-21.el7_3.2.src", product: { name: "dnsmasq-0:2.66-21.el7_3.2.src", product_id: "dnsmasq-0:2.66-21.el7_3.2.src", product_identification_helper: { purl: "pkg:rpm/redhat/dnsmasq@2.66-21.el7_3.2?arch=src", }, }, }, ], category: "architecture", name: "src", }, { branches: [ { category: "product_version", name: "dnsmasq-utils-0:2.66-14.el7_2.2.s390x", product: { name: "dnsmasq-utils-0:2.66-14.el7_2.2.s390x", product_id: "dnsmasq-utils-0:2.66-14.el7_2.2.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/dnsmasq-utils@2.66-14.el7_2.2?arch=s390x", }, }, }, { category: "product_version", name: "dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", product: { name: "dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", product_id: "dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/dnsmasq-debuginfo@2.66-14.el7_2.2?arch=s390x", }, }, }, { category: "product_version", name: "dnsmasq-0:2.66-14.el7_2.2.s390x", product: { name: "dnsmasq-0:2.66-14.el7_2.2.s390x", product_id: "dnsmasq-0:2.66-14.el7_2.2.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/dnsmasq@2.66-14.el7_2.2?arch=s390x", }, }, }, { category: "product_version", name: "dnsmasq-utils-0:2.66-21.el7_3.2.s390x", product: { name: "dnsmasq-utils-0:2.66-21.el7_3.2.s390x", product_id: "dnsmasq-utils-0:2.66-21.el7_3.2.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/dnsmasq-utils@2.66-21.el7_3.2?arch=s390x", }, }, }, { category: "product_version", name: "dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", product: { name: "dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", product_id: "dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/dnsmasq-debuginfo@2.66-21.el7_3.2?arch=s390x", }, }, }, { category: "product_version", name: "dnsmasq-0:2.66-21.el7_3.2.s390x", product: { name: "dnsmasq-0:2.66-21.el7_3.2.s390x", product_id: "dnsmasq-0:2.66-21.el7_3.2.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/dnsmasq@2.66-21.el7_3.2?arch=s390x", }, }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", product: { name: "dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", product_id: "dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", product_identification_helper: { purl: "pkg:rpm/redhat/dnsmasq-utils@2.66-14.el7_2.2?arch=ppc64", }, }, }, { category: "product_version", name: "dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", product: { name: "dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", product_id: "dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", product_identification_helper: { purl: "pkg:rpm/redhat/dnsmasq-debuginfo@2.66-14.el7_2.2?arch=ppc64", }, }, }, { category: "product_version", name: "dnsmasq-0:2.66-14.el7_2.2.ppc64", product: { name: "dnsmasq-0:2.66-14.el7_2.2.ppc64", product_id: "dnsmasq-0:2.66-14.el7_2.2.ppc64", product_identification_helper: { purl: "pkg:rpm/redhat/dnsmasq@2.66-14.el7_2.2?arch=ppc64", }, }, }, { category: "product_version", name: "dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", product: { name: "dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", product_id: "dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", product_identification_helper: { purl: "pkg:rpm/redhat/dnsmasq-utils@2.66-21.el7_3.2?arch=ppc64", }, }, }, { category: "product_version", name: "dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", product: { name: "dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", product_id: "dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", product_identification_helper: { purl: "pkg:rpm/redhat/dnsmasq-debuginfo@2.66-21.el7_3.2?arch=ppc64", }, }, }, { category: "product_version", name: "dnsmasq-0:2.66-21.el7_3.2.ppc64", product: { name: "dnsmasq-0:2.66-21.el7_3.2.ppc64", product_id: "dnsmasq-0:2.66-21.el7_3.2.ppc64", product_identification_helper: { purl: "pkg:rpm/redhat/dnsmasq@2.66-21.el7_3.2?arch=ppc64", }, }, }, ], category: "architecture", name: "ppc64", }, { branches: [ { category: "product_version", name: "dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", product: { name: "dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", product_id: "dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/dnsmasq-utils@2.66-14.el7_2.2?arch=ppc64le", }, }, }, { category: "product_version", name: "dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", product: { name: "dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", product_id: "dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/dnsmasq-debuginfo@2.66-14.el7_2.2?arch=ppc64le", }, }, }, { category: "product_version", name: "dnsmasq-0:2.66-14.el7_2.2.ppc64le", product: { name: "dnsmasq-0:2.66-14.el7_2.2.ppc64le", product_id: "dnsmasq-0:2.66-14.el7_2.2.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/dnsmasq@2.66-14.el7_2.2?arch=ppc64le", }, }, }, { category: "product_version", name: "dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", product: { name: "dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", product_id: "dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/dnsmasq-utils@2.66-21.el7_3.2?arch=ppc64le", }, }, }, { category: "product_version", name: "dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", product: { name: "dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", product_id: "dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/dnsmasq-debuginfo@2.66-21.el7_3.2?arch=ppc64le", }, }, }, { category: "product_version", name: "dnsmasq-0:2.66-21.el7_3.2.ppc64le", product: { name: "dnsmasq-0:2.66-21.el7_3.2.ppc64le", product_id: "dnsmasq-0:2.66-21.el7_3.2.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/dnsmasq@2.66-21.el7_3.2?arch=ppc64le", }, }, }, ], category: "architecture", name: "ppc64le", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.66-14.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.2)", product_id: "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", }, product_reference: "dnsmasq-0:2.66-14.el7_2.2.ppc64", relates_to_product_reference: "7ComputeNode-7.2.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.66-14.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.2)", product_id: "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", }, product_reference: "dnsmasq-0:2.66-14.el7_2.2.ppc64le", relates_to_product_reference: "7ComputeNode-7.2.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.66-14.el7_2.2.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.2)", product_id: "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", }, product_reference: "dnsmasq-0:2.66-14.el7_2.2.s390x", relates_to_product_reference: "7ComputeNode-7.2.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.66-14.el7_2.2.src as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.2)", product_id: "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", }, product_reference: "dnsmasq-0:2.66-14.el7_2.2.src", relates_to_product_reference: "7ComputeNode-7.2.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.66-14.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.2)", product_id: "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", }, product_reference: "dnsmasq-0:2.66-14.el7_2.2.x86_64", relates_to_product_reference: "7ComputeNode-7.2.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.2)", product_id: "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", }, product_reference: "dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", relates_to_product_reference: "7ComputeNode-7.2.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.2)", product_id: "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", }, product_reference: "dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", relates_to_product_reference: "7ComputeNode-7.2.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.2)", product_id: "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", }, product_reference: "dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", relates_to_product_reference: "7ComputeNode-7.2.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.2)", product_id: "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", }, product_reference: "dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", relates_to_product_reference: "7ComputeNode-7.2.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.66-14.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.2)", product_id: "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", }, product_reference: "dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", relates_to_product_reference: "7ComputeNode-7.2.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.2)", product_id: "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", }, product_reference: "dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", relates_to_product_reference: "7ComputeNode-7.2.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.66-14.el7_2.2.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.2)", product_id: "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", }, product_reference: "dnsmasq-utils-0:2.66-14.el7_2.2.s390x", relates_to_product_reference: "7ComputeNode-7.2.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.66-14.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.2)", product_id: "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", }, product_reference: "dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", relates_to_product_reference: "7ComputeNode-7.2.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.66-21.el7_3.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", product_id: "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", }, product_reference: "dnsmasq-0:2.66-21.el7_3.2.ppc64", relates_to_product_reference: "7ComputeNode-7.3.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.66-21.el7_3.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", product_id: "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", }, product_reference: "dnsmasq-0:2.66-21.el7_3.2.ppc64le", relates_to_product_reference: "7ComputeNode-7.3.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.66-21.el7_3.2.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", product_id: "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", }, product_reference: "dnsmasq-0:2.66-21.el7_3.2.s390x", relates_to_product_reference: "7ComputeNode-7.3.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.66-21.el7_3.2.src as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", product_id: "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", }, product_reference: "dnsmasq-0:2.66-21.el7_3.2.src", relates_to_product_reference: "7ComputeNode-7.3.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.66-21.el7_3.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", product_id: "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", }, product_reference: "dnsmasq-0:2.66-21.el7_3.2.x86_64", relates_to_product_reference: "7ComputeNode-7.3.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", product_id: "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", }, product_reference: "dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", relates_to_product_reference: "7ComputeNode-7.3.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", product_id: "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", }, product_reference: "dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", relates_to_product_reference: "7ComputeNode-7.3.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", product_id: "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", }, product_reference: "dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", relates_to_product_reference: "7ComputeNode-7.3.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", product_id: "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", }, product_reference: "dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", relates_to_product_reference: "7ComputeNode-7.3.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.66-21.el7_3.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", product_id: "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", }, product_reference: "dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", relates_to_product_reference: "7ComputeNode-7.3.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", product_id: "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", }, product_reference: "dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", relates_to_product_reference: "7ComputeNode-7.3.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.66-21.el7_3.2.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", product_id: "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", }, product_reference: "dnsmasq-utils-0:2.66-21.el7_3.2.s390x", relates_to_product_reference: "7ComputeNode-7.3.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.66-21.el7_3.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", product_id: "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", }, product_reference: "dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", relates_to_product_reference: "7ComputeNode-7.3.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.66-14.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)", product_id: "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", }, product_reference: "dnsmasq-0:2.66-14.el7_2.2.ppc64", relates_to_product_reference: "7ComputeNode-optional-7.2.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.66-14.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)", product_id: "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", }, product_reference: "dnsmasq-0:2.66-14.el7_2.2.ppc64le", relates_to_product_reference: "7ComputeNode-optional-7.2.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.66-14.el7_2.2.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)", product_id: "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", }, product_reference: "dnsmasq-0:2.66-14.el7_2.2.s390x", relates_to_product_reference: "7ComputeNode-optional-7.2.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.66-14.el7_2.2.src as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)", product_id: "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", }, product_reference: "dnsmasq-0:2.66-14.el7_2.2.src", relates_to_product_reference: "7ComputeNode-optional-7.2.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.66-14.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)", product_id: "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", }, product_reference: "dnsmasq-0:2.66-14.el7_2.2.x86_64", relates_to_product_reference: "7ComputeNode-optional-7.2.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)", product_id: "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", }, product_reference: "dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", relates_to_product_reference: "7ComputeNode-optional-7.2.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)", product_id: "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", }, product_reference: "dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", relates_to_product_reference: "7ComputeNode-optional-7.2.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)", product_id: "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", }, product_reference: "dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", relates_to_product_reference: "7ComputeNode-optional-7.2.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)", product_id: "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", }, product_reference: "dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", relates_to_product_reference: "7ComputeNode-optional-7.2.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.66-14.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)", product_id: "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", }, product_reference: "dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", relates_to_product_reference: "7ComputeNode-optional-7.2.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)", product_id: "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", }, product_reference: "dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", relates_to_product_reference: "7ComputeNode-optional-7.2.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.66-14.el7_2.2.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)", product_id: "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", }, product_reference: "dnsmasq-utils-0:2.66-14.el7_2.2.s390x", relates_to_product_reference: "7ComputeNode-optional-7.2.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.66-14.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)", product_id: "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", }, product_reference: "dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", relates_to_product_reference: "7ComputeNode-optional-7.2.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.66-21.el7_3.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", product_id: "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", }, product_reference: "dnsmasq-0:2.66-21.el7_3.2.ppc64", relates_to_product_reference: "7ComputeNode-optional-7.3.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.66-21.el7_3.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", product_id: "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", }, product_reference: "dnsmasq-0:2.66-21.el7_3.2.ppc64le", relates_to_product_reference: "7ComputeNode-optional-7.3.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.66-21.el7_3.2.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", product_id: "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", }, product_reference: "dnsmasq-0:2.66-21.el7_3.2.s390x", relates_to_product_reference: "7ComputeNode-optional-7.3.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.66-21.el7_3.2.src as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", product_id: "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", }, product_reference: "dnsmasq-0:2.66-21.el7_3.2.src", relates_to_product_reference: "7ComputeNode-optional-7.3.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.66-21.el7_3.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", product_id: "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", }, product_reference: "dnsmasq-0:2.66-21.el7_3.2.x86_64", relates_to_product_reference: "7ComputeNode-optional-7.3.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", product_id: "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", }, product_reference: "dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", relates_to_product_reference: "7ComputeNode-optional-7.3.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", product_id: "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", }, product_reference: "dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", relates_to_product_reference: "7ComputeNode-optional-7.3.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", product_id: "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", }, product_reference: "dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", relates_to_product_reference: "7ComputeNode-optional-7.3.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", product_id: "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", }, product_reference: "dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", relates_to_product_reference: "7ComputeNode-optional-7.3.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.66-21.el7_3.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", product_id: "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", }, product_reference: "dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", relates_to_product_reference: "7ComputeNode-optional-7.3.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", product_id: "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", }, product_reference: "dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", relates_to_product_reference: "7ComputeNode-optional-7.3.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.66-21.el7_3.2.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", product_id: "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", }, product_reference: "dnsmasq-utils-0:2.66-21.el7_3.2.s390x", relates_to_product_reference: "7ComputeNode-optional-7.3.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.66-21.el7_3.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", product_id: "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", }, product_reference: "dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", relates_to_product_reference: "7ComputeNode-optional-7.3.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.66-14.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)", product_id: "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", }, product_reference: "dnsmasq-0:2.66-14.el7_2.2.ppc64", relates_to_product_reference: "7Server-7.2.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.66-14.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)", product_id: "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", }, product_reference: "dnsmasq-0:2.66-14.el7_2.2.ppc64le", relates_to_product_reference: "7Server-7.2.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.66-14.el7_2.2.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)", product_id: "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", }, product_reference: "dnsmasq-0:2.66-14.el7_2.2.s390x", relates_to_product_reference: "7Server-7.2.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.66-14.el7_2.2.src as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)", product_id: "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", }, product_reference: "dnsmasq-0:2.66-14.el7_2.2.src", relates_to_product_reference: "7Server-7.2.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.66-14.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)", product_id: "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", }, product_reference: "dnsmasq-0:2.66-14.el7_2.2.x86_64", relates_to_product_reference: "7Server-7.2.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)", product_id: "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", }, product_reference: "dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", relates_to_product_reference: "7Server-7.2.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)", product_id: "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", }, product_reference: "dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", relates_to_product_reference: "7Server-7.2.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)", product_id: "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", }, product_reference: "dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", relates_to_product_reference: "7Server-7.2.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)", product_id: "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", }, product_reference: "dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", relates_to_product_reference: "7Server-7.2.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.66-14.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)", product_id: "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", }, product_reference: "dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", relates_to_product_reference: "7Server-7.2.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)", product_id: "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", }, product_reference: "dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", relates_to_product_reference: "7Server-7.2.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.66-14.el7_2.2.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)", product_id: "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", }, product_reference: "dnsmasq-utils-0:2.66-14.el7_2.2.s390x", relates_to_product_reference: "7Server-7.2.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.66-14.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)", product_id: "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", }, product_reference: "dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", relates_to_product_reference: "7Server-7.2.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.66-21.el7_3.2.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", product_id: "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", }, product_reference: "dnsmasq-0:2.66-21.el7_3.2.ppc64", relates_to_product_reference: "7Server-7.3.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.66-21.el7_3.2.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", product_id: "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", }, product_reference: "dnsmasq-0:2.66-21.el7_3.2.ppc64le", relates_to_product_reference: "7Server-7.3.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.66-21.el7_3.2.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", product_id: "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", }, product_reference: "dnsmasq-0:2.66-21.el7_3.2.s390x", relates_to_product_reference: "7Server-7.3.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.66-21.el7_3.2.src as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", product_id: "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", }, product_reference: "dnsmasq-0:2.66-21.el7_3.2.src", relates_to_product_reference: "7Server-7.3.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.66-21.el7_3.2.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", product_id: "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", }, product_reference: "dnsmasq-0:2.66-21.el7_3.2.x86_64", relates_to_product_reference: "7Server-7.3.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", product_id: "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", }, product_reference: "dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", relates_to_product_reference: "7Server-7.3.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", product_id: "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", }, product_reference: "dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", relates_to_product_reference: "7Server-7.3.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", product_id: "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", }, product_reference: "dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", relates_to_product_reference: "7Server-7.3.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", product_id: "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", }, product_reference: "dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", relates_to_product_reference: "7Server-7.3.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.66-21.el7_3.2.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", product_id: "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", }, product_reference: "dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", relates_to_product_reference: "7Server-7.3.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", product_id: "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", }, product_reference: "dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", relates_to_product_reference: "7Server-7.3.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.66-21.el7_3.2.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", product_id: "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", }, product_reference: "dnsmasq-utils-0:2.66-21.el7_3.2.s390x", relates_to_product_reference: "7Server-7.3.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.66-21.el7_3.2.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", product_id: "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", }, product_reference: "dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", relates_to_product_reference: "7Server-7.3.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.66-14.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)", product_id: "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", }, product_reference: "dnsmasq-0:2.66-14.el7_2.2.ppc64", relates_to_product_reference: "7Server-optional-7.2.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.66-14.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)", product_id: "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", }, product_reference: "dnsmasq-0:2.66-14.el7_2.2.ppc64le", relates_to_product_reference: "7Server-optional-7.2.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.66-14.el7_2.2.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)", product_id: "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", }, product_reference: "dnsmasq-0:2.66-14.el7_2.2.s390x", relates_to_product_reference: "7Server-optional-7.2.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.66-14.el7_2.2.src as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)", product_id: "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", }, product_reference: "dnsmasq-0:2.66-14.el7_2.2.src", relates_to_product_reference: "7Server-optional-7.2.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.66-14.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)", product_id: "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", }, product_reference: "dnsmasq-0:2.66-14.el7_2.2.x86_64", relates_to_product_reference: "7Server-optional-7.2.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)", product_id: "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", }, product_reference: "dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", relates_to_product_reference: "7Server-optional-7.2.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)", product_id: "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", }, product_reference: "dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", relates_to_product_reference: "7Server-optional-7.2.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)", product_id: "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", }, product_reference: "dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", relates_to_product_reference: "7Server-optional-7.2.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)", product_id: "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", }, product_reference: "dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", relates_to_product_reference: "7Server-optional-7.2.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.66-14.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)", product_id: "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", }, product_reference: "dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", relates_to_product_reference: "7Server-optional-7.2.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)", product_id: "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", }, product_reference: "dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", relates_to_product_reference: "7Server-optional-7.2.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.66-14.el7_2.2.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)", product_id: "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", }, product_reference: "dnsmasq-utils-0:2.66-14.el7_2.2.s390x", relates_to_product_reference: "7Server-optional-7.2.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.66-14.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)", product_id: "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", }, product_reference: "dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", relates_to_product_reference: "7Server-optional-7.2.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.66-21.el7_3.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", product_id: "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", }, product_reference: "dnsmasq-0:2.66-21.el7_3.2.ppc64", relates_to_product_reference: "7Server-optional-7.3.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.66-21.el7_3.2.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", product_id: "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", }, product_reference: "dnsmasq-0:2.66-21.el7_3.2.ppc64le", relates_to_product_reference: "7Server-optional-7.3.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.66-21.el7_3.2.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", product_id: "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", }, product_reference: "dnsmasq-0:2.66-21.el7_3.2.s390x", relates_to_product_reference: "7Server-optional-7.3.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.66-21.el7_3.2.src as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", product_id: "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", }, product_reference: "dnsmasq-0:2.66-21.el7_3.2.src", relates_to_product_reference: "7Server-optional-7.3.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.66-21.el7_3.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", product_id: "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", }, product_reference: "dnsmasq-0:2.66-21.el7_3.2.x86_64", relates_to_product_reference: "7Server-optional-7.3.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", product_id: "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", }, product_reference: "dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", relates_to_product_reference: "7Server-optional-7.3.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", product_id: "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", }, product_reference: "dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", relates_to_product_reference: "7Server-optional-7.3.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", product_id: "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", }, product_reference: "dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", relates_to_product_reference: "7Server-optional-7.3.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", product_id: "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", }, product_reference: "dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", relates_to_product_reference: "7Server-optional-7.3.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.66-21.el7_3.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", product_id: "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", }, product_reference: "dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", relates_to_product_reference: "7Server-optional-7.3.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", product_id: "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", }, product_reference: "dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", relates_to_product_reference: "7Server-optional-7.3.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.66-21.el7_3.2.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", product_id: "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", }, product_reference: "dnsmasq-utils-0:2.66-21.el7_3.2.s390x", relates_to_product_reference: "7Server-optional-7.3.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.66-21.el7_3.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", product_id: "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", }, product_reference: "dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", relates_to_product_reference: "7Server-optional-7.3.EUS", }, ], }, vulnerabilities: [ { acknowledgments: [ { names: [ "Felix Wilhelm", "Fermin J. Serna", "Gabriel Campana", "Kevin Hamacher", "Ron Bowes", ], organization: "Google Security Team", }, ], cve: "CVE-2017-14491", cwe: { id: "CWE-122", name: "Heap-based Buffer Overflow", }, discovery_date: "2017-09-25T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1495409", }, ], notes: [ { category: "description", text: "A heap buffer overflow was found in dnsmasq in the code responsible for building DNS replies. An attacker could send crafted DNS packets to dnsmasq which would cause it to crash or, potentially, execute arbitrary code.", title: "Vulnerability description", }, { category: "summary", text: "dnsmasq: heap overflow in the code responsible for building DNS replies", title: "Vulnerability summary", }, { category: "other", text: "Red Hat OpenStack Platform includes the dnsmasq-utils RPM which does not contain this flaw's affected code-paths; Red Hat OpenStack Platform is therefore listed as not affected.\n\nHowever, because all versions of Red Hat OpenStack Platform are based on Red Hat Enterprise Linux, all Red Hat OpenStack Platform users should absolutely upgrade the dnsmasq RPM from Red Hat Enterprise Linux as a matter of urgency using standard update mechanisms (such as 'yum update' or 'openstack overcloud update').", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2017-14491", }, { category: "external", summary: "RHBZ#1495409", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1495409", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2017-14491", url: "https://www.cve.org/CVERecord?id=CVE-2017-14491", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2017-14491", url: "https://nvd.nist.gov/vuln/detail/CVE-2017-14491", }, { category: "external", summary: "https://access.redhat.com/security/vulnerabilities/3199382", url: "https://access.redhat.com/security/vulnerabilities/3199382", }, { category: "external", summary: "https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html", url: "https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html", }, ], release_date: "2017-10-02T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2017-10-02T16:19:55+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2017:2837", }, ], scores: [ { cvss_v2: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 10, confidentialityImpact: "COMPLETE", integrityImpact: "COMPLETE", vectorString: "AV:N/AC:L/Au:N/C:C/I:C/A:C", version: "2.0", }, cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", ], }, ], threats: [ { category: "impact", details: "Critical", }, ], title: "dnsmasq: heap overflow in the code responsible for building DNS replies", }, { acknowledgments: [ { names: [ "Felix Wilhelm", "Fermin J. Serna", "Gabriel Campana", "Kevin Hamacher", "Ron Bowes", ], organization: "Google Security Team", }, ], cve: "CVE-2017-14492", cwe: { id: "CWE-122", name: "Heap-based Buffer Overflow", }, discovery_date: "2017-09-25T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1495410", }, ], notes: [ { category: "description", text: "A heap buffer overflow was discovered in dnsmasq in the IPv6 router advertisement (RA) handling code. An attacker on the local network segment could send crafted RAs to dnsmasq which would cause it to crash or, potentially, execute arbitrary code. This issue only affected configurations using one of these options: enable-ra, ra-only, slaac, ra-names, ra-advrouter, or ra-stateless.", title: "Vulnerability description", }, { category: "summary", text: "dnsmasq: heap overflow in the IPv6 router advertisement code", title: "Vulnerability summary", }, { category: "other", text: "Red Hat OpenStack Platform includes the dnsmasq-utils RPM which does not contain this flaw's affected code-paths; Red Hat OpenStack Platform is therefore listed as not affected.\n\nHowever, because all versions of Red Hat OpenStack Platform are based on Red Hat Enterprise Linux, all Red Hat OpenStack Platform users should absolutely upgrade the dnsmasq RPM from Red Hat Enterprise Linux as a matter of urgency using standard update mechanisms (such as 'yum update' or 'openstack overcloud update').", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2017-14492", }, { category: "external", summary: "RHBZ#1495410", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1495410", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2017-14492", url: "https://www.cve.org/CVERecord?id=CVE-2017-14492", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2017-14492", url: "https://nvd.nist.gov/vuln/detail/CVE-2017-14492", }, { category: "external", summary: "https://access.redhat.com/security/vulnerabilities/3199382", url: "https://access.redhat.com/security/vulnerabilities/3199382", }, { category: "external", summary: "https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html", url: "https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html", }, ], release_date: "2017-10-02T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2017-10-02T16:19:55+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2017:2837", }, ], scores: [ { cvss_v2: { accessComplexity: "LOW", accessVector: "ADJACENT_NETWORK", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 8.3, confidentialityImpact: "COMPLETE", integrityImpact: "COMPLETE", vectorString: "AV:A/AC:L/Au:N/C:C/I:C/A:C", version: "2.0", }, cvss_v3: { attackComplexity: "LOW", attackVector: "ADJACENT_NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", ], }, ], threats: [ { category: "impact", details: "Critical", }, ], title: "dnsmasq: heap overflow in the IPv6 router advertisement code", }, { acknowledgments: [ { names: [ "Felix Wilhelm", "Fermin J. Serna", "Gabriel Campana", "Kevin Hamacher", "Ron Bowes", ], organization: "Google Security Team", }, ], cve: "CVE-2017-14493", cwe: { id: "CWE-121", name: "Stack-based Buffer Overflow", }, discovery_date: "2017-09-25T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1495411", }, ], notes: [ { category: "description", text: "A stack buffer overflow was found in dnsmasq in the DHCPv6 code. An attacker on the local network could send a crafted DHCPv6 request to dnsmasq which would cause it to a crash or, potentially, execute arbitrary code.", title: "Vulnerability description", }, { category: "summary", text: "dnsmasq: stack buffer overflow in the DHCPv6 code", title: "Vulnerability summary", }, { category: "other", text: "Red Hat OpenStack Platform includes the dnsmasq-utils RPM which does not contain this flaw's affected code-paths; Red Hat OpenStack Platform is therefore listed as not affected.\n\nHowever, because all versions of Red Hat OpenStack Platform are based on Red Hat Enterprise Linux, all Red Hat OpenStack Platform users should absolutely upgrade the dnsmasq RPM from Red Hat Enterprise Linux as a matter of urgency using standard update mechanisms (such as 'yum update' or 'openstack overcloud update').", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2017-14493", }, { category: "external", summary: "RHBZ#1495411", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1495411", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2017-14493", url: "https://www.cve.org/CVERecord?id=CVE-2017-14493", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2017-14493", url: "https://nvd.nist.gov/vuln/detail/CVE-2017-14493", }, { category: "external", summary: "https://access.redhat.com/security/vulnerabilities/3199382", url: "https://access.redhat.com/security/vulnerabilities/3199382", }, { category: "external", summary: "https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html", url: "https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html", }, ], release_date: "2017-10-02T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2017-10-02T16:19:55+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2017:2837", }, ], scores: [ { cvss_v2: { accessComplexity: "LOW", accessVector: "ADJACENT_NETWORK", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 8.3, confidentialityImpact: "COMPLETE", integrityImpact: "COMPLETE", vectorString: "AV:A/AC:L/Au:N/C:C/I:C/A:C", version: "2.0", }, cvss_v3: { attackComplexity: "LOW", attackVector: "ADJACENT_NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", ], }, ], threats: [ { category: "impact", details: "Critical", }, ], title: "dnsmasq: stack buffer overflow in the DHCPv6 code", }, { acknowledgments: [ { names: [ "Felix Wilhelm", "Fermin J. Serna", "Gabriel Campana", "Kevin Hamacher", "Ron Bowes", ], organization: "Google Security Team", }, ], cve: "CVE-2017-14494", cwe: { id: "CWE-125", name: "Out-of-bounds Read", }, discovery_date: "2017-09-25T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1495412", }, ], notes: [ { category: "description", text: "An information leak was found in dnsmasq in the DHCPv6 relay code. An attacker on the local network could send crafted DHCPv6 packets to dnsmasq causing it to forward the contents of process memory, potentially leaking sensitive data.", title: "Vulnerability description", }, { category: "summary", text: "dnsmasq: information leak in the DHCPv6 relay code", title: "Vulnerability summary", }, { category: "other", text: "Red Hat OpenStack Platform includes the dnsmasq-utils RPM which does not contain this flaw's affected code-paths; Red Hat OpenStack Platform is therefore listed as not affected.\n\nHowever, because all versions of Red Hat OpenStack Platform are based on Red Hat Enterprise Linux, all Red Hat OpenStack Platform users should absolutely upgrade the dnsmasq RPM from Red Hat Enterprise Linux as a matter of urgency using standard update mechanisms (such as 'yum update' or 'openstack overcloud update').", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2017-14494", }, { category: "external", summary: "RHBZ#1495412", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1495412", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2017-14494", url: "https://www.cve.org/CVERecord?id=CVE-2017-14494", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2017-14494", url: "https://nvd.nist.gov/vuln/detail/CVE-2017-14494", }, { category: "external", summary: "https://access.redhat.com/security/vulnerabilities/3199382", url: "https://access.redhat.com/security/vulnerabilities/3199382", }, { category: "external", summary: "https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html", url: "https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html", }, ], release_date: "2017-10-02T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2017-10-02T16:19:55+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2017:2837", }, ], scores: [ { cvss_v2: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 7.8, confidentialityImpact: "COMPLETE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:C/I:N/A:N", version: "2.0", }, cvss_v3: { attackComplexity: "LOW", attackVector: "ADJACENT_NETWORK", availabilityImpact: "NONE", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.0", }, products: [ "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", ], }, ], threats: [ { category: "impact", details: "Important", }, ], title: "dnsmasq: information leak in the DHCPv6 relay code", }, ], }
RHSA-2017:2836
Vulnerability from csaf_redhat
Notes
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Critical", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "An update for dnsmasq is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", title: "Topic", }, { category: "general", text: "The dnsmasq packages contain Dnsmasq, a lightweight DNS (Domain Name Server) forwarder and DHCP (Dynamic Host Configuration Protocol) server.\n\nSecurity Fix(es):\n\n* A heap buffer overflow was found in dnsmasq in the code responsible for building DNS replies. An attacker could send crafted DNS packets to dnsmasq which would cause it to crash or, potentially, execute arbitrary code. (CVE-2017-14491)\n\n* A heap buffer overflow was discovered in dnsmasq in the IPv6 router advertisement (RA) handling code. An attacker on the local network segment could send crafted RAs to dnsmasq which would cause it to crash or, potentially, execute arbitrary code. This issue only affected configurations using one of these options: enable-ra, ra-only, slaac, ra-names, ra-advrouter, or ra-stateless. (CVE-2017-14492)\n\n* A stack buffer overflow was found in dnsmasq in the DHCPv6 code. An attacker on the local network could send a crafted DHCPv6 request to dnsmasq which would cause it to a crash or, potentially, execute arbitrary code. (CVE-2017-14493)\n\n* An information leak was found in dnsmasq in the DHCPv6 relay code. An attacker on the local network could send crafted DHCPv6 packets to dnsmasq causing it to forward the contents of process memory, potentially leaking sensitive data. (CVE-2017-14494)\n\n* A memory exhaustion flaw was found in dnsmasq in the EDNS0 code. An attacker could send crafted DNS packets which would trigger memory allocations which would never be freed, leading to unbounded memory consumption and eventually a crash. This issue only affected configurations using one of the options: add-mac, add-cpe-id, or add-subnet. (CVE-2017-14495)\n\n* An integer underflow flaw leading to a buffer over-read was found in dnsmasq in the EDNS0 code. An attacker could send crafted DNS packets to dnsmasq which would cause it to crash. This issue only affected configurations using one of the options: add-mac, add-cpe-id, or add-subnet. (CVE-2017-14496)\n\nRed Hat would like to thank Felix Wilhelm (Google Security Team), Fermin J. Serna (Google Security Team), Gabriel Campana (Google Security Team), Kevin Hamacher (Google Security Team), and Ron Bowes (Google Security Team) for reporting these issues.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2017:2836", url: "https://access.redhat.com/errata/RHSA-2017:2836", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#critical", url: "https://access.redhat.com/security/updates/classification/#critical", }, { category: "external", summary: "https://access.redhat.com/security/vulnerabilities/3199382", url: "https://access.redhat.com/security/vulnerabilities/3199382", }, { category: "external", summary: "1495409", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1495409", }, { category: "external", summary: "1495410", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1495410", }, { category: "external", summary: "1495411", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1495411", }, { category: "external", summary: "1495412", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1495412", }, { category: "external", summary: "1495415", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1495415", }, { category: "external", summary: "1495416", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1495416", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2017/rhsa-2017_2836.json", }, ], title: "Red Hat Security Advisory: dnsmasq security update", tracking: { current_release_date: "2024-11-22T11:34:05+00:00", generator: { date: "2024-11-22T11:34:05+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.1", }, }, id: "RHSA-2017:2836", initial_release_date: "2017-10-02T17:18:46+00:00", revision_history: [ { date: "2017-10-02T17:18:46+00:00", number: "1", summary: "Initial version", }, { date: "2017-10-02T17:18:46+00:00", number: "2", summary: "Last updated version", }, { date: "2024-11-22T11:34:05+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux Client (v. 7)", product: { name: "Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.4.Z", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:7::client", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Client Optional (v. 7)", product: { name: "Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.4.Z", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:7::client", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux ComputeNode (v. 7)", product: { name: "Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.4.Z", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:7::computenode", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product: { name: "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.4.Z", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:7::computenode", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Server (v. 7)", product: { name: "Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.4.Z", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:7::server", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Server Optional (v. 7)", product: { name: "Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.4.Z", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:7::server", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Workstation (v. 7)", product: { name: "Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.4.Z", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:7::workstation", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Workstation Optional (v. 7)", product: { name: "Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.4.Z", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:7::workstation", }, }, }, ], category: "product_family", name: "Red Hat Enterprise Linux", }, { branches: [ { category: "product_version", name: "dnsmasq-0:2.76-2.el7_4.2.x86_64", product: { name: "dnsmasq-0:2.76-2.el7_4.2.x86_64", product_id: "dnsmasq-0:2.76-2.el7_4.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/dnsmasq@2.76-2.el7_4.2?arch=x86_64", }, }, }, { category: "product_version", name: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", product: { name: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", product_id: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/dnsmasq-debuginfo@2.76-2.el7_4.2?arch=x86_64", }, }, }, { category: "product_version", name: "dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", product: { name: "dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", product_id: "dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/dnsmasq-utils@2.76-2.el7_4.2?arch=x86_64", }, }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_version", name: "dnsmasq-0:2.76-2.el7_4.2.src", product: { name: "dnsmasq-0:2.76-2.el7_4.2.src", product_id: "dnsmasq-0:2.76-2.el7_4.2.src", product_identification_helper: { purl: "pkg:rpm/redhat/dnsmasq@2.76-2.el7_4.2?arch=src", }, }, }, ], category: "architecture", name: "src", }, { branches: [ { category: "product_version", name: "dnsmasq-0:2.76-2.el7_4.2.ppc64le", product: { name: "dnsmasq-0:2.76-2.el7_4.2.ppc64le", product_id: "dnsmasq-0:2.76-2.el7_4.2.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/dnsmasq@2.76-2.el7_4.2?arch=ppc64le", }, }, }, { category: "product_version", name: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", product: { name: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", product_id: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/dnsmasq-debuginfo@2.76-2.el7_4.2?arch=ppc64le", }, }, }, { category: "product_version", name: "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", product: { name: "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", product_id: "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/dnsmasq-utils@2.76-2.el7_4.2?arch=ppc64le", }, }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "dnsmasq-0:2.76-2.el7_4.2.ppc64", product: { name: "dnsmasq-0:2.76-2.el7_4.2.ppc64", product_id: "dnsmasq-0:2.76-2.el7_4.2.ppc64", product_identification_helper: { purl: "pkg:rpm/redhat/dnsmasq@2.76-2.el7_4.2?arch=ppc64", }, }, }, { category: "product_version", name: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", product: { name: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", product_id: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", product_identification_helper: { purl: "pkg:rpm/redhat/dnsmasq-debuginfo@2.76-2.el7_4.2?arch=ppc64", }, }, }, { category: "product_version", name: "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", product: { name: "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", product_id: "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", product_identification_helper: { purl: "pkg:rpm/redhat/dnsmasq-utils@2.76-2.el7_4.2?arch=ppc64", }, }, }, ], category: "architecture", name: "ppc64", }, { branches: [ { category: "product_version", name: "dnsmasq-0:2.76-2.el7_4.2.s390x", product: { name: "dnsmasq-0:2.76-2.el7_4.2.s390x", product_id: "dnsmasq-0:2.76-2.el7_4.2.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/dnsmasq@2.76-2.el7_4.2?arch=s390x", }, }, }, { category: "product_version", name: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", product: { name: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", product_id: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/dnsmasq-debuginfo@2.76-2.el7_4.2?arch=s390x", }, }, }, { category: "product_version", name: "dnsmasq-utils-0:2.76-2.el7_4.2.s390x", product: { name: "dnsmasq-utils-0:2.76-2.el7_4.2.s390x", product_id: "dnsmasq-utils-0:2.76-2.el7_4.2.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/dnsmasq-utils@2.76-2.el7_4.2?arch=s390x", }, }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", product: { name: "dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", product_id: "dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/dnsmasq-utils@2.76-2.el7_4.2?arch=aarch64", }, }, }, { category: "product_version", name: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", product: { name: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", product_id: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/dnsmasq-debuginfo@2.76-2.el7_4.2?arch=aarch64", }, }, }, ], category: "architecture", name: "aarch64", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.76-2.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", }, product_reference: "dnsmasq-0:2.76-2.el7_4.2.ppc64", relates_to_product_reference: "7Client-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.76-2.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", }, product_reference: "dnsmasq-0:2.76-2.el7_4.2.ppc64le", relates_to_product_reference: "7Client-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.76-2.el7_4.2.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", }, product_reference: "dnsmasq-0:2.76-2.el7_4.2.s390x", relates_to_product_reference: "7Client-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.76-2.el7_4.2.src as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", }, product_reference: "dnsmasq-0:2.76-2.el7_4.2.src", relates_to_product_reference: "7Client-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.76-2.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", }, product_reference: "dnsmasq-0:2.76-2.el7_4.2.x86_64", relates_to_product_reference: "7Client-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", }, product_reference: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", relates_to_product_reference: "7Client-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", }, product_reference: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", relates_to_product_reference: "7Client-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", }, product_reference: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", relates_to_product_reference: "7Client-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", }, product_reference: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", relates_to_product_reference: "7Client-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", }, product_reference: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", relates_to_product_reference: "7Client-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.76-2.el7_4.2.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", }, product_reference: "dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", relates_to_product_reference: "7Client-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", }, product_reference: "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", relates_to_product_reference: "7Client-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", }, product_reference: "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", relates_to_product_reference: "7Client-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.76-2.el7_4.2.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", }, product_reference: "dnsmasq-utils-0:2.76-2.el7_4.2.s390x", relates_to_product_reference: "7Client-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.76-2.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", }, product_reference: "dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", relates_to_product_reference: "7Client-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.76-2.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", }, product_reference: "dnsmasq-0:2.76-2.el7_4.2.ppc64", relates_to_product_reference: "7Client-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.76-2.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", }, product_reference: "dnsmasq-0:2.76-2.el7_4.2.ppc64le", relates_to_product_reference: "7Client-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.76-2.el7_4.2.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", }, product_reference: "dnsmasq-0:2.76-2.el7_4.2.s390x", relates_to_product_reference: "7Client-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.76-2.el7_4.2.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", }, product_reference: "dnsmasq-0:2.76-2.el7_4.2.src", relates_to_product_reference: "7Client-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.76-2.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", }, product_reference: "dnsmasq-0:2.76-2.el7_4.2.x86_64", relates_to_product_reference: "7Client-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", }, product_reference: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", relates_to_product_reference: "7Client-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", }, product_reference: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", relates_to_product_reference: "7Client-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", }, product_reference: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", relates_to_product_reference: "7Client-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", }, product_reference: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", relates_to_product_reference: "7Client-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", }, product_reference: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", relates_to_product_reference: "7Client-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.76-2.el7_4.2.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", }, product_reference: "dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", relates_to_product_reference: "7Client-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", }, product_reference: "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", relates_to_product_reference: "7Client-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", }, product_reference: "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", relates_to_product_reference: "7Client-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.76-2.el7_4.2.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", }, product_reference: "dnsmasq-utils-0:2.76-2.el7_4.2.s390x", relates_to_product_reference: "7Client-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.76-2.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", }, product_reference: "dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", relates_to_product_reference: "7Client-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.76-2.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", }, product_reference: "dnsmasq-0:2.76-2.el7_4.2.ppc64", relates_to_product_reference: "7ComputeNode-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.76-2.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", }, product_reference: "dnsmasq-0:2.76-2.el7_4.2.ppc64le", relates_to_product_reference: "7ComputeNode-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.76-2.el7_4.2.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", }, product_reference: "dnsmasq-0:2.76-2.el7_4.2.s390x", relates_to_product_reference: "7ComputeNode-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.76-2.el7_4.2.src as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", }, product_reference: "dnsmasq-0:2.76-2.el7_4.2.src", relates_to_product_reference: "7ComputeNode-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.76-2.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", }, product_reference: "dnsmasq-0:2.76-2.el7_4.2.x86_64", relates_to_product_reference: "7ComputeNode-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", }, product_reference: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", relates_to_product_reference: "7ComputeNode-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", }, product_reference: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", relates_to_product_reference: "7ComputeNode-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", }, product_reference: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", relates_to_product_reference: "7ComputeNode-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", }, product_reference: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", relates_to_product_reference: "7ComputeNode-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", }, product_reference: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", relates_to_product_reference: "7ComputeNode-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.76-2.el7_4.2.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", }, product_reference: "dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", relates_to_product_reference: "7ComputeNode-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", }, product_reference: "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", relates_to_product_reference: "7ComputeNode-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", }, product_reference: "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", relates_to_product_reference: "7ComputeNode-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.76-2.el7_4.2.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", }, product_reference: "dnsmasq-utils-0:2.76-2.el7_4.2.s390x", relates_to_product_reference: "7ComputeNode-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.76-2.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", }, product_reference: "dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", relates_to_product_reference: "7ComputeNode-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.76-2.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", }, product_reference: "dnsmasq-0:2.76-2.el7_4.2.ppc64", relates_to_product_reference: "7ComputeNode-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.76-2.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", }, product_reference: "dnsmasq-0:2.76-2.el7_4.2.ppc64le", relates_to_product_reference: "7ComputeNode-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.76-2.el7_4.2.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", }, product_reference: "dnsmasq-0:2.76-2.el7_4.2.s390x", relates_to_product_reference: "7ComputeNode-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.76-2.el7_4.2.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", }, product_reference: "dnsmasq-0:2.76-2.el7_4.2.src", relates_to_product_reference: "7ComputeNode-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.76-2.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", }, product_reference: "dnsmasq-0:2.76-2.el7_4.2.x86_64", relates_to_product_reference: "7ComputeNode-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", }, product_reference: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", relates_to_product_reference: "7ComputeNode-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", }, product_reference: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", relates_to_product_reference: "7ComputeNode-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", }, product_reference: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", relates_to_product_reference: "7ComputeNode-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", }, product_reference: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", relates_to_product_reference: "7ComputeNode-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", }, product_reference: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", relates_to_product_reference: "7ComputeNode-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.76-2.el7_4.2.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", }, product_reference: "dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", relates_to_product_reference: "7ComputeNode-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", }, product_reference: "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", relates_to_product_reference: "7ComputeNode-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", }, product_reference: "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", relates_to_product_reference: "7ComputeNode-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.76-2.el7_4.2.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", }, product_reference: "dnsmasq-utils-0:2.76-2.el7_4.2.s390x", relates_to_product_reference: "7ComputeNode-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.76-2.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", }, product_reference: "dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", relates_to_product_reference: "7ComputeNode-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.76-2.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", }, product_reference: "dnsmasq-0:2.76-2.el7_4.2.ppc64", relates_to_product_reference: "7Server-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.76-2.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", }, product_reference: "dnsmasq-0:2.76-2.el7_4.2.ppc64le", relates_to_product_reference: "7Server-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.76-2.el7_4.2.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", }, product_reference: "dnsmasq-0:2.76-2.el7_4.2.s390x", relates_to_product_reference: "7Server-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.76-2.el7_4.2.src as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", }, product_reference: "dnsmasq-0:2.76-2.el7_4.2.src", relates_to_product_reference: "7Server-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.76-2.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", }, product_reference: "dnsmasq-0:2.76-2.el7_4.2.x86_64", relates_to_product_reference: "7Server-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", }, product_reference: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", relates_to_product_reference: "7Server-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", }, product_reference: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", relates_to_product_reference: "7Server-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", }, product_reference: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", relates_to_product_reference: "7Server-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", }, product_reference: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", relates_to_product_reference: "7Server-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", }, product_reference: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", relates_to_product_reference: "7Server-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.76-2.el7_4.2.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", }, product_reference: "dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", relates_to_product_reference: "7Server-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", }, product_reference: "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", relates_to_product_reference: "7Server-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", }, product_reference: "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", relates_to_product_reference: "7Server-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.76-2.el7_4.2.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", }, product_reference: "dnsmasq-utils-0:2.76-2.el7_4.2.s390x", relates_to_product_reference: "7Server-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.76-2.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", }, product_reference: "dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", relates_to_product_reference: "7Server-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.76-2.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", }, product_reference: "dnsmasq-0:2.76-2.el7_4.2.ppc64", relates_to_product_reference: "7Server-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.76-2.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", }, product_reference: "dnsmasq-0:2.76-2.el7_4.2.ppc64le", relates_to_product_reference: "7Server-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.76-2.el7_4.2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", }, product_reference: "dnsmasq-0:2.76-2.el7_4.2.s390x", relates_to_product_reference: "7Server-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.76-2.el7_4.2.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", }, product_reference: "dnsmasq-0:2.76-2.el7_4.2.src", relates_to_product_reference: "7Server-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.76-2.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", }, product_reference: "dnsmasq-0:2.76-2.el7_4.2.x86_64", relates_to_product_reference: "7Server-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", }, product_reference: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", relates_to_product_reference: "7Server-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", }, product_reference: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", relates_to_product_reference: "7Server-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", }, product_reference: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", relates_to_product_reference: "7Server-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", }, product_reference: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", relates_to_product_reference: "7Server-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", }, product_reference: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", relates_to_product_reference: "7Server-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.76-2.el7_4.2.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", }, product_reference: "dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", relates_to_product_reference: "7Server-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", }, product_reference: "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", relates_to_product_reference: "7Server-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", }, product_reference: "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", relates_to_product_reference: "7Server-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.76-2.el7_4.2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", }, product_reference: "dnsmasq-utils-0:2.76-2.el7_4.2.s390x", relates_to_product_reference: "7Server-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.76-2.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", }, product_reference: "dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", relates_to_product_reference: "7Server-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.76-2.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", }, product_reference: "dnsmasq-0:2.76-2.el7_4.2.ppc64", relates_to_product_reference: "7Workstation-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.76-2.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", }, product_reference: "dnsmasq-0:2.76-2.el7_4.2.ppc64le", relates_to_product_reference: "7Workstation-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.76-2.el7_4.2.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", }, product_reference: "dnsmasq-0:2.76-2.el7_4.2.s390x", relates_to_product_reference: "7Workstation-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.76-2.el7_4.2.src as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", }, product_reference: "dnsmasq-0:2.76-2.el7_4.2.src", relates_to_product_reference: "7Workstation-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.76-2.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", }, product_reference: "dnsmasq-0:2.76-2.el7_4.2.x86_64", relates_to_product_reference: "7Workstation-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", }, product_reference: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", relates_to_product_reference: "7Workstation-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", }, product_reference: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", relates_to_product_reference: "7Workstation-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", }, product_reference: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", relates_to_product_reference: "7Workstation-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", }, product_reference: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", relates_to_product_reference: "7Workstation-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", }, product_reference: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", relates_to_product_reference: "7Workstation-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.76-2.el7_4.2.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", }, product_reference: "dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", relates_to_product_reference: "7Workstation-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", }, product_reference: "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", relates_to_product_reference: "7Workstation-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", }, product_reference: "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", relates_to_product_reference: "7Workstation-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.76-2.el7_4.2.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", }, product_reference: "dnsmasq-utils-0:2.76-2.el7_4.2.s390x", relates_to_product_reference: "7Workstation-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.76-2.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", }, product_reference: "dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", relates_to_product_reference: "7Workstation-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.76-2.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", }, product_reference: "dnsmasq-0:2.76-2.el7_4.2.ppc64", relates_to_product_reference: "7Workstation-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.76-2.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", }, product_reference: "dnsmasq-0:2.76-2.el7_4.2.ppc64le", relates_to_product_reference: "7Workstation-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.76-2.el7_4.2.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", }, product_reference: "dnsmasq-0:2.76-2.el7_4.2.s390x", relates_to_product_reference: "7Workstation-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.76-2.el7_4.2.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", }, product_reference: "dnsmasq-0:2.76-2.el7_4.2.src", relates_to_product_reference: "7Workstation-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.76-2.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", }, product_reference: "dnsmasq-0:2.76-2.el7_4.2.x86_64", relates_to_product_reference: "7Workstation-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", }, product_reference: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", relates_to_product_reference: "7Workstation-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", }, product_reference: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", relates_to_product_reference: "7Workstation-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", }, product_reference: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", relates_to_product_reference: "7Workstation-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", }, product_reference: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", relates_to_product_reference: "7Workstation-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", }, product_reference: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", relates_to_product_reference: "7Workstation-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.76-2.el7_4.2.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", }, product_reference: "dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", relates_to_product_reference: "7Workstation-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", }, product_reference: "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", relates_to_product_reference: "7Workstation-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", }, product_reference: "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", relates_to_product_reference: "7Workstation-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.76-2.el7_4.2.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", }, product_reference: "dnsmasq-utils-0:2.76-2.el7_4.2.s390x", relates_to_product_reference: "7Workstation-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.76-2.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", }, product_reference: "dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", relates_to_product_reference: "7Workstation-optional-7.4.Z", }, ], }, vulnerabilities: [ { acknowledgments: [ { names: [ "Felix Wilhelm", "Fermin J. Serna", "Gabriel Campana", "Kevin Hamacher", "Ron Bowes", ], organization: "Google Security Team", }, ], cve: "CVE-2017-14491", cwe: { id: "CWE-122", name: "Heap-based Buffer Overflow", }, discovery_date: "2017-09-25T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1495409", }, ], notes: [ { category: "description", text: "A heap buffer overflow was found in dnsmasq in the code responsible for building DNS replies. An attacker could send crafted DNS packets to dnsmasq which would cause it to crash or, potentially, execute arbitrary code.", title: "Vulnerability description", }, { category: "summary", text: "dnsmasq: heap overflow in the code responsible for building DNS replies", title: "Vulnerability summary", }, { category: "other", text: "Red Hat OpenStack Platform includes the dnsmasq-utils RPM which does not contain this flaw's affected code-paths; Red Hat OpenStack Platform is therefore listed as not affected.\n\nHowever, because all versions of Red Hat OpenStack Platform are based on Red Hat Enterprise Linux, all Red Hat OpenStack Platform users should absolutely upgrade the dnsmasq RPM from Red Hat Enterprise Linux as a matter of urgency using standard update mechanisms (such as 'yum update' or 'openstack overcloud update').", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2017-14491", }, { category: "external", summary: "RHBZ#1495409", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1495409", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2017-14491", url: "https://www.cve.org/CVERecord?id=CVE-2017-14491", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2017-14491", url: "https://nvd.nist.gov/vuln/detail/CVE-2017-14491", }, { category: "external", summary: "https://access.redhat.com/security/vulnerabilities/3199382", url: "https://access.redhat.com/security/vulnerabilities/3199382", }, { category: "external", summary: "https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html", url: "https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html", }, ], release_date: "2017-10-02T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2017-10-02T17:18:46+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2017:2836", }, ], scores: [ { cvss_v2: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 10, confidentialityImpact: "COMPLETE", integrityImpact: "COMPLETE", vectorString: "AV:N/AC:L/Au:N/C:C/I:C/A:C", version: "2.0", }, cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", ], }, ], threats: [ { category: "impact", details: "Critical", }, ], title: "dnsmasq: heap overflow in the code responsible for building DNS replies", }, { acknowledgments: [ { names: [ "Felix Wilhelm", "Fermin J. Serna", "Gabriel Campana", "Kevin Hamacher", "Ron Bowes", ], organization: "Google Security Team", }, ], cve: "CVE-2017-14492", cwe: { id: "CWE-122", name: "Heap-based Buffer Overflow", }, discovery_date: "2017-09-25T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1495410", }, ], notes: [ { category: "description", text: "A heap buffer overflow was discovered in dnsmasq in the IPv6 router advertisement (RA) handling code. An attacker on the local network segment could send crafted RAs to dnsmasq which would cause it to crash or, potentially, execute arbitrary code. This issue only affected configurations using one of these options: enable-ra, ra-only, slaac, ra-names, ra-advrouter, or ra-stateless.", title: "Vulnerability description", }, { category: "summary", text: "dnsmasq: heap overflow in the IPv6 router advertisement code", title: "Vulnerability summary", }, { category: "other", text: "Red Hat OpenStack Platform includes the dnsmasq-utils RPM which does not contain this flaw's affected code-paths; Red Hat OpenStack Platform is therefore listed as not affected.\n\nHowever, because all versions of Red Hat OpenStack Platform are based on Red Hat Enterprise Linux, all Red Hat OpenStack Platform users should absolutely upgrade the dnsmasq RPM from Red Hat Enterprise Linux as a matter of urgency using standard update mechanisms (such as 'yum update' or 'openstack overcloud update').", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2017-14492", }, { category: "external", summary: "RHBZ#1495410", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1495410", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2017-14492", url: "https://www.cve.org/CVERecord?id=CVE-2017-14492", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2017-14492", url: "https://nvd.nist.gov/vuln/detail/CVE-2017-14492", }, { category: "external", summary: "https://access.redhat.com/security/vulnerabilities/3199382", url: "https://access.redhat.com/security/vulnerabilities/3199382", }, { category: "external", summary: "https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html", url: "https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html", }, ], release_date: "2017-10-02T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2017-10-02T17:18:46+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2017:2836", }, ], scores: [ { cvss_v2: { accessComplexity: "LOW", accessVector: "ADJACENT_NETWORK", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 8.3, confidentialityImpact: "COMPLETE", integrityImpact: "COMPLETE", vectorString: "AV:A/AC:L/Au:N/C:C/I:C/A:C", version: "2.0", }, cvss_v3: { attackComplexity: "LOW", attackVector: "ADJACENT_NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", ], }, ], threats: [ { category: "impact", details: "Critical", }, ], title: "dnsmasq: heap overflow in the IPv6 router advertisement code", }, { acknowledgments: [ { names: [ "Felix Wilhelm", "Fermin J. Serna", "Gabriel Campana", "Kevin Hamacher", "Ron Bowes", ], organization: "Google Security Team", }, ], cve: "CVE-2017-14493", cwe: { id: "CWE-121", name: "Stack-based Buffer Overflow", }, discovery_date: "2017-09-25T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1495411", }, ], notes: [ { category: "description", text: "A stack buffer overflow was found in dnsmasq in the DHCPv6 code. An attacker on the local network could send a crafted DHCPv6 request to dnsmasq which would cause it to a crash or, potentially, execute arbitrary code.", title: "Vulnerability description", }, { category: "summary", text: "dnsmasq: stack buffer overflow in the DHCPv6 code", title: "Vulnerability summary", }, { category: "other", text: "Red Hat OpenStack Platform includes the dnsmasq-utils RPM which does not contain this flaw's affected code-paths; Red Hat OpenStack Platform is therefore listed as not affected.\n\nHowever, because all versions of Red Hat OpenStack Platform are based on Red Hat Enterprise Linux, all Red Hat OpenStack Platform users should absolutely upgrade the dnsmasq RPM from Red Hat Enterprise Linux as a matter of urgency using standard update mechanisms (such as 'yum update' or 'openstack overcloud update').", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2017-14493", }, { category: "external", summary: "RHBZ#1495411", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1495411", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2017-14493", url: "https://www.cve.org/CVERecord?id=CVE-2017-14493", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2017-14493", url: "https://nvd.nist.gov/vuln/detail/CVE-2017-14493", }, { category: "external", summary: "https://access.redhat.com/security/vulnerabilities/3199382", url: "https://access.redhat.com/security/vulnerabilities/3199382", }, { category: "external", summary: "https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html", url: "https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html", }, ], release_date: "2017-10-02T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2017-10-02T17:18:46+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2017:2836", }, ], scores: [ { cvss_v2: { accessComplexity: "LOW", accessVector: "ADJACENT_NETWORK", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 8.3, confidentialityImpact: "COMPLETE", integrityImpact: "COMPLETE", vectorString: "AV:A/AC:L/Au:N/C:C/I:C/A:C", version: "2.0", }, cvss_v3: { attackComplexity: "LOW", attackVector: "ADJACENT_NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", ], }, ], threats: [ { category: "impact", details: "Critical", }, ], title: "dnsmasq: stack buffer overflow in the DHCPv6 code", }, { acknowledgments: [ { names: [ "Felix Wilhelm", "Fermin J. Serna", "Gabriel Campana", "Kevin Hamacher", "Ron Bowes", ], organization: "Google Security Team", }, ], cve: "CVE-2017-14494", cwe: { id: "CWE-125", name: "Out-of-bounds Read", }, discovery_date: "2017-09-25T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1495412", }, ], notes: [ { category: "description", text: "An information leak was found in dnsmasq in the DHCPv6 relay code. An attacker on the local network could send crafted DHCPv6 packets to dnsmasq causing it to forward the contents of process memory, potentially leaking sensitive data.", title: "Vulnerability description", }, { category: "summary", text: "dnsmasq: information leak in the DHCPv6 relay code", title: "Vulnerability summary", }, { category: "other", text: "Red Hat OpenStack Platform includes the dnsmasq-utils RPM which does not contain this flaw's affected code-paths; Red Hat OpenStack Platform is therefore listed as not affected.\n\nHowever, because all versions of Red Hat OpenStack Platform are based on Red Hat Enterprise Linux, all Red Hat OpenStack Platform users should absolutely upgrade the dnsmasq RPM from Red Hat Enterprise Linux as a matter of urgency using standard update mechanisms (such as 'yum update' or 'openstack overcloud update').", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2017-14494", }, { category: "external", summary: "RHBZ#1495412", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1495412", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2017-14494", url: "https://www.cve.org/CVERecord?id=CVE-2017-14494", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2017-14494", url: "https://nvd.nist.gov/vuln/detail/CVE-2017-14494", }, { category: "external", summary: "https://access.redhat.com/security/vulnerabilities/3199382", url: "https://access.redhat.com/security/vulnerabilities/3199382", }, { category: "external", summary: "https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html", url: "https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html", }, ], release_date: "2017-10-02T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2017-10-02T17:18:46+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2017:2836", }, ], scores: [ { cvss_v2: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 7.8, confidentialityImpact: "COMPLETE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:C/I:N/A:N", version: "2.0", }, cvss_v3: { attackComplexity: "LOW", attackVector: "ADJACENT_NETWORK", availabilityImpact: "NONE", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.0", }, products: [ "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", ], }, ], threats: [ { category: "impact", details: "Important", }, ], title: "dnsmasq: information leak in the DHCPv6 relay code", }, { acknowledgments: [ { names: [ "Felix Wilhelm", "Fermin J. Serna", "Gabriel Campana", "Kevin Hamacher", "Ron Bowes", ], organization: "Google Security Team", }, ], cve: "CVE-2017-14495", cwe: { id: "CWE-400", name: "Uncontrolled Resource Consumption", }, discovery_date: "2017-09-25T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1495415", }, ], notes: [ { category: "description", text: "A memory exhaustion flaw was found in dnsmasq in the EDNS0 code. An attacker could send crafted DNS packets which would trigger memory allocations which would never be freed, leading to unbounded memory consumption and eventually a crash. This issue only affected configurations using one of the options: add-mac, add-cpe-id, or add-subnet.", title: "Vulnerability description", }, { category: "summary", text: "dnsmasq: memory exhaustion vulnerability in the EDNS0 code", title: "Vulnerability summary", }, { category: "other", text: "Red Hat OpenStack Platform includes the dnsmasq-utils RPM which does not contain this flaw's affected code-paths; Red Hat OpenStack Platform is therefore listed as not affected.\n\nHowever, because all versions of Red Hat OpenStack Platform are based on Red Hat Enterprise Linux, all Red Hat OpenStack Platform users should absolutely upgrade the dnsmasq RPM from Red Hat Enterprise Linux as a matter of urgency using standard update mechanisms (such as 'yum update' or 'openstack overcloud update').", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2017-14495", }, { category: "external", summary: "RHBZ#1495415", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1495415", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2017-14495", url: "https://www.cve.org/CVERecord?id=CVE-2017-14495", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2017-14495", url: "https://nvd.nist.gov/vuln/detail/CVE-2017-14495", }, { category: "external", summary: "https://access.redhat.com/security/vulnerabilities/3199382", url: "https://access.redhat.com/security/vulnerabilities/3199382", }, { category: "external", summary: "https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html", url: "https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html", }, ], release_date: "2017-10-02T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2017-10-02T17:18:46+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2017:2836", }, ], scores: [ { cvss_v2: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 7.8, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:C", version: "2.0", }, cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", ], }, ], threats: [ { category: "impact", details: "Important", }, ], title: "dnsmasq: memory exhaustion vulnerability in the EDNS0 code", }, { acknowledgments: [ { names: [ "Felix Wilhelm", "Fermin J. Serna", "Gabriel Campana", "Kevin Hamacher", "Ron Bowes", ], organization: "Google Security Team", }, ], cve: "CVE-2017-14496", cwe: { id: "CWE-125", name: "Out-of-bounds Read", }, discovery_date: "2017-09-25T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1495416", }, ], notes: [ { category: "description", text: "An integer underflow flaw leading to a buffer over-read was found in dnsmasq in the EDNS0 code. An attacker could send crafted DNS packets to dnsmasq which would cause it to crash. This issue only affected configurations using one of the options: add-mac, add-cpe-id, or add-subnet.", title: "Vulnerability description", }, { category: "summary", text: "dnsmasq: integer underflow leading to buffer over-read in the EDNS0 code", title: "Vulnerability summary", }, { category: "other", text: "Red Hat OpenStack Platform includes the dnsmasq-utils RPM which does not contain this flaw's affected code-paths; Red Hat OpenStack Platform is therefore listed as not affected.\n\nHowever, because all versions of Red Hat OpenStack Platform are based on Red Hat Enterprise Linux, all Red Hat OpenStack Platform users should absolutely upgrade the dnsmasq RPM from Red Hat Enterprise Linux as a matter of urgency using standard update mechanisms (such as 'yum update' or 'openstack overcloud update').", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2017-14496", }, { category: "external", summary: "RHBZ#1495416", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1495416", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2017-14496", url: "https://www.cve.org/CVERecord?id=CVE-2017-14496", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2017-14496", url: "https://nvd.nist.gov/vuln/detail/CVE-2017-14496", }, { category: "external", summary: "https://access.redhat.com/security/vulnerabilities/3199382", url: "https://access.redhat.com/security/vulnerabilities/3199382", }, { category: "external", summary: "https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html", url: "https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html", }, ], release_date: "2017-10-02T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2017-10-02T17:18:46+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2017:2836", }, ], scores: [ { cvss_v2: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 7.8, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:C", version: "2.0", }, cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", ], }, ], threats: [ { category: "impact", details: "Important", }, ], title: "dnsmasq: integer underflow leading to buffer over-read in the EDNS0 code", }, ], }
rhsa-2017:2836
Vulnerability from csaf_redhat
Notes
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Critical", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "An update for dnsmasq is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", title: "Topic", }, { category: "general", text: "The dnsmasq packages contain Dnsmasq, a lightweight DNS (Domain Name Server) forwarder and DHCP (Dynamic Host Configuration Protocol) server.\n\nSecurity Fix(es):\n\n* A heap buffer overflow was found in dnsmasq in the code responsible for building DNS replies. An attacker could send crafted DNS packets to dnsmasq which would cause it to crash or, potentially, execute arbitrary code. (CVE-2017-14491)\n\n* A heap buffer overflow was discovered in dnsmasq in the IPv6 router advertisement (RA) handling code. An attacker on the local network segment could send crafted RAs to dnsmasq which would cause it to crash or, potentially, execute arbitrary code. This issue only affected configurations using one of these options: enable-ra, ra-only, slaac, ra-names, ra-advrouter, or ra-stateless. (CVE-2017-14492)\n\n* A stack buffer overflow was found in dnsmasq in the DHCPv6 code. An attacker on the local network could send a crafted DHCPv6 request to dnsmasq which would cause it to a crash or, potentially, execute arbitrary code. (CVE-2017-14493)\n\n* An information leak was found in dnsmasq in the DHCPv6 relay code. An attacker on the local network could send crafted DHCPv6 packets to dnsmasq causing it to forward the contents of process memory, potentially leaking sensitive data. (CVE-2017-14494)\n\n* A memory exhaustion flaw was found in dnsmasq in the EDNS0 code. An attacker could send crafted DNS packets which would trigger memory allocations which would never be freed, leading to unbounded memory consumption and eventually a crash. This issue only affected configurations using one of the options: add-mac, add-cpe-id, or add-subnet. (CVE-2017-14495)\n\n* An integer underflow flaw leading to a buffer over-read was found in dnsmasq in the EDNS0 code. An attacker could send crafted DNS packets to dnsmasq which would cause it to crash. This issue only affected configurations using one of the options: add-mac, add-cpe-id, or add-subnet. (CVE-2017-14496)\n\nRed Hat would like to thank Felix Wilhelm (Google Security Team), Fermin J. Serna (Google Security Team), Gabriel Campana (Google Security Team), Kevin Hamacher (Google Security Team), and Ron Bowes (Google Security Team) for reporting these issues.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2017:2836", url: "https://access.redhat.com/errata/RHSA-2017:2836", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#critical", url: "https://access.redhat.com/security/updates/classification/#critical", }, { category: "external", summary: "https://access.redhat.com/security/vulnerabilities/3199382", url: "https://access.redhat.com/security/vulnerabilities/3199382", }, { category: "external", summary: "1495409", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1495409", }, { category: "external", summary: "1495410", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1495410", }, { category: "external", summary: "1495411", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1495411", }, { category: "external", summary: "1495412", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1495412", }, { category: "external", summary: "1495415", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1495415", }, { category: "external", summary: "1495416", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1495416", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2017/rhsa-2017_2836.json", }, ], title: "Red Hat Security Advisory: dnsmasq security update", tracking: { current_release_date: "2024-11-22T11:34:05+00:00", generator: { date: "2024-11-22T11:34:05+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.1", }, }, id: "RHSA-2017:2836", initial_release_date: "2017-10-02T17:18:46+00:00", revision_history: [ { date: "2017-10-02T17:18:46+00:00", number: "1", summary: "Initial version", }, { date: "2017-10-02T17:18:46+00:00", number: "2", summary: "Last updated version", }, { date: "2024-11-22T11:34:05+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux Client (v. 7)", product: { name: "Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.4.Z", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:7::client", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Client Optional (v. 7)", product: { name: "Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.4.Z", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:7::client", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux ComputeNode (v. 7)", product: { name: "Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.4.Z", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:7::computenode", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product: { name: "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.4.Z", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:7::computenode", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Server (v. 7)", product: { name: "Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.4.Z", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:7::server", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Server Optional (v. 7)", product: { name: "Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.4.Z", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:7::server", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Workstation (v. 7)", product: { name: "Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.4.Z", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:7::workstation", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Workstation Optional (v. 7)", product: { name: "Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.4.Z", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:7::workstation", }, }, }, ], category: "product_family", name: "Red Hat Enterprise Linux", }, { branches: [ { category: "product_version", name: "dnsmasq-0:2.76-2.el7_4.2.x86_64", product: { name: "dnsmasq-0:2.76-2.el7_4.2.x86_64", product_id: "dnsmasq-0:2.76-2.el7_4.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/dnsmasq@2.76-2.el7_4.2?arch=x86_64", }, }, }, { category: "product_version", name: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", product: { name: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", product_id: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/dnsmasq-debuginfo@2.76-2.el7_4.2?arch=x86_64", }, }, }, { category: "product_version", name: "dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", product: { name: "dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", product_id: "dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/dnsmasq-utils@2.76-2.el7_4.2?arch=x86_64", }, }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_version", name: "dnsmasq-0:2.76-2.el7_4.2.src", product: { name: "dnsmasq-0:2.76-2.el7_4.2.src", product_id: "dnsmasq-0:2.76-2.el7_4.2.src", product_identification_helper: { purl: "pkg:rpm/redhat/dnsmasq@2.76-2.el7_4.2?arch=src", }, }, }, ], category: "architecture", name: "src", }, { branches: [ { category: "product_version", name: "dnsmasq-0:2.76-2.el7_4.2.ppc64le", product: { name: "dnsmasq-0:2.76-2.el7_4.2.ppc64le", product_id: "dnsmasq-0:2.76-2.el7_4.2.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/dnsmasq@2.76-2.el7_4.2?arch=ppc64le", }, }, }, { category: "product_version", name: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", product: { name: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", product_id: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/dnsmasq-debuginfo@2.76-2.el7_4.2?arch=ppc64le", }, }, }, { category: "product_version", name: "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", product: { name: "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", product_id: "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/dnsmasq-utils@2.76-2.el7_4.2?arch=ppc64le", }, }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "dnsmasq-0:2.76-2.el7_4.2.ppc64", product: { name: "dnsmasq-0:2.76-2.el7_4.2.ppc64", product_id: "dnsmasq-0:2.76-2.el7_4.2.ppc64", product_identification_helper: { purl: "pkg:rpm/redhat/dnsmasq@2.76-2.el7_4.2?arch=ppc64", }, }, }, { category: "product_version", name: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", product: { name: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", product_id: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", product_identification_helper: { purl: "pkg:rpm/redhat/dnsmasq-debuginfo@2.76-2.el7_4.2?arch=ppc64", }, }, }, { category: "product_version", name: "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", product: { name: "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", product_id: "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", product_identification_helper: { purl: "pkg:rpm/redhat/dnsmasq-utils@2.76-2.el7_4.2?arch=ppc64", }, }, }, ], category: "architecture", name: "ppc64", }, { branches: [ { category: "product_version", name: "dnsmasq-0:2.76-2.el7_4.2.s390x", product: { name: "dnsmasq-0:2.76-2.el7_4.2.s390x", product_id: "dnsmasq-0:2.76-2.el7_4.2.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/dnsmasq@2.76-2.el7_4.2?arch=s390x", }, }, }, { category: "product_version", name: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", product: { name: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", product_id: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/dnsmasq-debuginfo@2.76-2.el7_4.2?arch=s390x", }, }, }, { category: "product_version", name: "dnsmasq-utils-0:2.76-2.el7_4.2.s390x", product: { name: "dnsmasq-utils-0:2.76-2.el7_4.2.s390x", product_id: "dnsmasq-utils-0:2.76-2.el7_4.2.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/dnsmasq-utils@2.76-2.el7_4.2?arch=s390x", }, }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", product: { name: "dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", product_id: "dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/dnsmasq-utils@2.76-2.el7_4.2?arch=aarch64", }, }, }, { category: "product_version", name: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", product: { name: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", product_id: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/dnsmasq-debuginfo@2.76-2.el7_4.2?arch=aarch64", }, }, }, ], category: "architecture", name: "aarch64", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.76-2.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", }, product_reference: "dnsmasq-0:2.76-2.el7_4.2.ppc64", relates_to_product_reference: "7Client-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.76-2.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", }, product_reference: "dnsmasq-0:2.76-2.el7_4.2.ppc64le", relates_to_product_reference: "7Client-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.76-2.el7_4.2.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", }, product_reference: "dnsmasq-0:2.76-2.el7_4.2.s390x", relates_to_product_reference: "7Client-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.76-2.el7_4.2.src as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", }, product_reference: "dnsmasq-0:2.76-2.el7_4.2.src", relates_to_product_reference: "7Client-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.76-2.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", }, product_reference: "dnsmasq-0:2.76-2.el7_4.2.x86_64", relates_to_product_reference: "7Client-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", }, product_reference: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", relates_to_product_reference: "7Client-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", }, product_reference: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", relates_to_product_reference: "7Client-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", }, product_reference: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", relates_to_product_reference: "7Client-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", }, product_reference: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", relates_to_product_reference: "7Client-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", }, product_reference: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", relates_to_product_reference: "7Client-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.76-2.el7_4.2.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", }, product_reference: "dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", relates_to_product_reference: "7Client-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", }, product_reference: "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", relates_to_product_reference: "7Client-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", }, product_reference: "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", relates_to_product_reference: "7Client-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.76-2.el7_4.2.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", }, product_reference: "dnsmasq-utils-0:2.76-2.el7_4.2.s390x", relates_to_product_reference: "7Client-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.76-2.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", }, product_reference: "dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", relates_to_product_reference: "7Client-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.76-2.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", }, product_reference: "dnsmasq-0:2.76-2.el7_4.2.ppc64", relates_to_product_reference: "7Client-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.76-2.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", }, product_reference: "dnsmasq-0:2.76-2.el7_4.2.ppc64le", relates_to_product_reference: "7Client-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.76-2.el7_4.2.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", }, product_reference: "dnsmasq-0:2.76-2.el7_4.2.s390x", relates_to_product_reference: "7Client-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.76-2.el7_4.2.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", }, product_reference: "dnsmasq-0:2.76-2.el7_4.2.src", relates_to_product_reference: "7Client-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.76-2.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", }, product_reference: "dnsmasq-0:2.76-2.el7_4.2.x86_64", relates_to_product_reference: "7Client-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", }, product_reference: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", relates_to_product_reference: "7Client-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", }, product_reference: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", relates_to_product_reference: "7Client-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", }, product_reference: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", relates_to_product_reference: "7Client-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", }, product_reference: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", relates_to_product_reference: "7Client-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", }, product_reference: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", relates_to_product_reference: "7Client-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.76-2.el7_4.2.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", }, product_reference: "dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", relates_to_product_reference: "7Client-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", }, product_reference: "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", relates_to_product_reference: "7Client-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", }, product_reference: "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", relates_to_product_reference: "7Client-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.76-2.el7_4.2.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", }, product_reference: "dnsmasq-utils-0:2.76-2.el7_4.2.s390x", relates_to_product_reference: "7Client-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.76-2.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", }, product_reference: "dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", relates_to_product_reference: "7Client-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.76-2.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", }, product_reference: "dnsmasq-0:2.76-2.el7_4.2.ppc64", relates_to_product_reference: "7ComputeNode-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.76-2.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", }, product_reference: "dnsmasq-0:2.76-2.el7_4.2.ppc64le", relates_to_product_reference: "7ComputeNode-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.76-2.el7_4.2.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", }, product_reference: "dnsmasq-0:2.76-2.el7_4.2.s390x", relates_to_product_reference: "7ComputeNode-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.76-2.el7_4.2.src as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", }, product_reference: "dnsmasq-0:2.76-2.el7_4.2.src", relates_to_product_reference: "7ComputeNode-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.76-2.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", }, product_reference: "dnsmasq-0:2.76-2.el7_4.2.x86_64", relates_to_product_reference: "7ComputeNode-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", }, product_reference: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", relates_to_product_reference: "7ComputeNode-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", }, product_reference: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", relates_to_product_reference: "7ComputeNode-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", }, product_reference: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", relates_to_product_reference: "7ComputeNode-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", }, product_reference: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", relates_to_product_reference: "7ComputeNode-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", }, product_reference: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", relates_to_product_reference: "7ComputeNode-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.76-2.el7_4.2.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", }, product_reference: "dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", relates_to_product_reference: "7ComputeNode-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", }, product_reference: "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", relates_to_product_reference: "7ComputeNode-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", }, product_reference: "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", relates_to_product_reference: "7ComputeNode-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.76-2.el7_4.2.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", }, product_reference: "dnsmasq-utils-0:2.76-2.el7_4.2.s390x", relates_to_product_reference: "7ComputeNode-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.76-2.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", }, product_reference: "dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", relates_to_product_reference: "7ComputeNode-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.76-2.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", }, product_reference: "dnsmasq-0:2.76-2.el7_4.2.ppc64", relates_to_product_reference: "7ComputeNode-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.76-2.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", }, product_reference: "dnsmasq-0:2.76-2.el7_4.2.ppc64le", relates_to_product_reference: "7ComputeNode-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.76-2.el7_4.2.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", }, product_reference: "dnsmasq-0:2.76-2.el7_4.2.s390x", relates_to_product_reference: "7ComputeNode-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.76-2.el7_4.2.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", }, product_reference: "dnsmasq-0:2.76-2.el7_4.2.src", relates_to_product_reference: "7ComputeNode-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.76-2.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", }, product_reference: "dnsmasq-0:2.76-2.el7_4.2.x86_64", relates_to_product_reference: "7ComputeNode-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", }, product_reference: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", relates_to_product_reference: "7ComputeNode-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", }, product_reference: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", relates_to_product_reference: "7ComputeNode-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", }, product_reference: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", relates_to_product_reference: "7ComputeNode-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", }, product_reference: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", relates_to_product_reference: "7ComputeNode-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", }, product_reference: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", relates_to_product_reference: "7ComputeNode-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.76-2.el7_4.2.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", }, product_reference: "dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", relates_to_product_reference: "7ComputeNode-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", }, product_reference: "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", relates_to_product_reference: "7ComputeNode-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", }, product_reference: "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", relates_to_product_reference: "7ComputeNode-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.76-2.el7_4.2.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", }, product_reference: "dnsmasq-utils-0:2.76-2.el7_4.2.s390x", relates_to_product_reference: "7ComputeNode-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.76-2.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", }, product_reference: "dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", relates_to_product_reference: "7ComputeNode-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.76-2.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", }, product_reference: "dnsmasq-0:2.76-2.el7_4.2.ppc64", relates_to_product_reference: "7Server-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.76-2.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", }, product_reference: "dnsmasq-0:2.76-2.el7_4.2.ppc64le", relates_to_product_reference: "7Server-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.76-2.el7_4.2.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", }, product_reference: "dnsmasq-0:2.76-2.el7_4.2.s390x", relates_to_product_reference: "7Server-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.76-2.el7_4.2.src as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", }, product_reference: "dnsmasq-0:2.76-2.el7_4.2.src", relates_to_product_reference: "7Server-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.76-2.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", }, product_reference: "dnsmasq-0:2.76-2.el7_4.2.x86_64", relates_to_product_reference: "7Server-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", }, product_reference: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", relates_to_product_reference: "7Server-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", }, product_reference: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", relates_to_product_reference: "7Server-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", }, product_reference: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", relates_to_product_reference: "7Server-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", }, product_reference: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", relates_to_product_reference: "7Server-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", }, product_reference: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", relates_to_product_reference: "7Server-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.76-2.el7_4.2.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", }, product_reference: "dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", relates_to_product_reference: "7Server-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", }, product_reference: "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", relates_to_product_reference: "7Server-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", }, product_reference: "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", relates_to_product_reference: "7Server-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.76-2.el7_4.2.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", }, product_reference: "dnsmasq-utils-0:2.76-2.el7_4.2.s390x", relates_to_product_reference: "7Server-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.76-2.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", }, product_reference: "dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", relates_to_product_reference: "7Server-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.76-2.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", }, product_reference: "dnsmasq-0:2.76-2.el7_4.2.ppc64", relates_to_product_reference: "7Server-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.76-2.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", }, product_reference: "dnsmasq-0:2.76-2.el7_4.2.ppc64le", relates_to_product_reference: "7Server-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.76-2.el7_4.2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", }, product_reference: "dnsmasq-0:2.76-2.el7_4.2.s390x", relates_to_product_reference: "7Server-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.76-2.el7_4.2.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", }, product_reference: "dnsmasq-0:2.76-2.el7_4.2.src", relates_to_product_reference: "7Server-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.76-2.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", }, product_reference: "dnsmasq-0:2.76-2.el7_4.2.x86_64", relates_to_product_reference: "7Server-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", }, product_reference: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", relates_to_product_reference: "7Server-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", }, product_reference: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", relates_to_product_reference: "7Server-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", }, product_reference: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", relates_to_product_reference: "7Server-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", }, product_reference: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", relates_to_product_reference: "7Server-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", }, product_reference: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", relates_to_product_reference: "7Server-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.76-2.el7_4.2.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", }, product_reference: "dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", relates_to_product_reference: "7Server-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", }, product_reference: "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", relates_to_product_reference: "7Server-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", }, product_reference: "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", relates_to_product_reference: "7Server-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.76-2.el7_4.2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", }, product_reference: "dnsmasq-utils-0:2.76-2.el7_4.2.s390x", relates_to_product_reference: "7Server-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.76-2.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", }, product_reference: "dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", relates_to_product_reference: "7Server-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.76-2.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", }, product_reference: "dnsmasq-0:2.76-2.el7_4.2.ppc64", relates_to_product_reference: "7Workstation-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.76-2.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", }, product_reference: "dnsmasq-0:2.76-2.el7_4.2.ppc64le", relates_to_product_reference: "7Workstation-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.76-2.el7_4.2.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", }, product_reference: "dnsmasq-0:2.76-2.el7_4.2.s390x", relates_to_product_reference: "7Workstation-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.76-2.el7_4.2.src as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", }, product_reference: "dnsmasq-0:2.76-2.el7_4.2.src", relates_to_product_reference: "7Workstation-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.76-2.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", }, product_reference: "dnsmasq-0:2.76-2.el7_4.2.x86_64", relates_to_product_reference: "7Workstation-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", }, product_reference: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", relates_to_product_reference: "7Workstation-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", }, product_reference: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", relates_to_product_reference: "7Workstation-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", }, product_reference: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", relates_to_product_reference: "7Workstation-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", }, product_reference: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", relates_to_product_reference: "7Workstation-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", }, product_reference: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", relates_to_product_reference: "7Workstation-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.76-2.el7_4.2.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", }, product_reference: "dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", relates_to_product_reference: "7Workstation-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", }, product_reference: "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", relates_to_product_reference: "7Workstation-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", }, product_reference: "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", relates_to_product_reference: "7Workstation-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.76-2.el7_4.2.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", }, product_reference: "dnsmasq-utils-0:2.76-2.el7_4.2.s390x", relates_to_product_reference: "7Workstation-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.76-2.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", }, product_reference: "dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", relates_to_product_reference: "7Workstation-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.76-2.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", }, product_reference: "dnsmasq-0:2.76-2.el7_4.2.ppc64", relates_to_product_reference: "7Workstation-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.76-2.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", }, product_reference: "dnsmasq-0:2.76-2.el7_4.2.ppc64le", relates_to_product_reference: "7Workstation-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.76-2.el7_4.2.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", }, product_reference: "dnsmasq-0:2.76-2.el7_4.2.s390x", relates_to_product_reference: "7Workstation-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.76-2.el7_4.2.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", }, product_reference: "dnsmasq-0:2.76-2.el7_4.2.src", relates_to_product_reference: "7Workstation-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.76-2.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", }, product_reference: "dnsmasq-0:2.76-2.el7_4.2.x86_64", relates_to_product_reference: "7Workstation-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", }, product_reference: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", relates_to_product_reference: "7Workstation-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", }, product_reference: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", relates_to_product_reference: "7Workstation-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", }, product_reference: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", relates_to_product_reference: "7Workstation-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", }, product_reference: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", relates_to_product_reference: "7Workstation-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", }, product_reference: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", relates_to_product_reference: "7Workstation-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.76-2.el7_4.2.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", }, product_reference: "dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", relates_to_product_reference: "7Workstation-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", }, product_reference: "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", relates_to_product_reference: "7Workstation-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", }, product_reference: "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", relates_to_product_reference: "7Workstation-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.76-2.el7_4.2.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", }, product_reference: "dnsmasq-utils-0:2.76-2.el7_4.2.s390x", relates_to_product_reference: "7Workstation-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.76-2.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", }, product_reference: "dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", relates_to_product_reference: "7Workstation-optional-7.4.Z", }, ], }, vulnerabilities: [ { acknowledgments: [ { names: [ "Felix Wilhelm", "Fermin J. Serna", "Gabriel Campana", "Kevin Hamacher", "Ron Bowes", ], organization: "Google Security Team", }, ], cve: "CVE-2017-14491", cwe: { id: "CWE-122", name: "Heap-based Buffer Overflow", }, discovery_date: "2017-09-25T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1495409", }, ], notes: [ { category: "description", text: "A heap buffer overflow was found in dnsmasq in the code responsible for building DNS replies. An attacker could send crafted DNS packets to dnsmasq which would cause it to crash or, potentially, execute arbitrary code.", title: "Vulnerability description", }, { category: "summary", text: "dnsmasq: heap overflow in the code responsible for building DNS replies", title: "Vulnerability summary", }, { category: "other", text: "Red Hat OpenStack Platform includes the dnsmasq-utils RPM which does not contain this flaw's affected code-paths; Red Hat OpenStack Platform is therefore listed as not affected.\n\nHowever, because all versions of Red Hat OpenStack Platform are based on Red Hat Enterprise Linux, all Red Hat OpenStack Platform users should absolutely upgrade the dnsmasq RPM from Red Hat Enterprise Linux as a matter of urgency using standard update mechanisms (such as 'yum update' or 'openstack overcloud update').", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2017-14491", }, { category: "external", summary: "RHBZ#1495409", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1495409", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2017-14491", url: "https://www.cve.org/CVERecord?id=CVE-2017-14491", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2017-14491", url: "https://nvd.nist.gov/vuln/detail/CVE-2017-14491", }, { category: "external", summary: "https://access.redhat.com/security/vulnerabilities/3199382", url: "https://access.redhat.com/security/vulnerabilities/3199382", }, { category: "external", summary: "https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html", url: "https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html", }, ], release_date: "2017-10-02T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2017-10-02T17:18:46+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2017:2836", }, ], scores: [ { cvss_v2: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 10, confidentialityImpact: "COMPLETE", integrityImpact: "COMPLETE", vectorString: "AV:N/AC:L/Au:N/C:C/I:C/A:C", version: "2.0", }, cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", ], }, ], threats: [ { category: "impact", details: "Critical", }, ], title: "dnsmasq: heap overflow in the code responsible for building DNS replies", }, { acknowledgments: [ { names: [ "Felix Wilhelm", "Fermin J. Serna", "Gabriel Campana", "Kevin Hamacher", "Ron Bowes", ], organization: "Google Security Team", }, ], cve: "CVE-2017-14492", cwe: { id: "CWE-122", name: "Heap-based Buffer Overflow", }, discovery_date: "2017-09-25T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1495410", }, ], notes: [ { category: "description", text: "A heap buffer overflow was discovered in dnsmasq in the IPv6 router advertisement (RA) handling code. An attacker on the local network segment could send crafted RAs to dnsmasq which would cause it to crash or, potentially, execute arbitrary code. This issue only affected configurations using one of these options: enable-ra, ra-only, slaac, ra-names, ra-advrouter, or ra-stateless.", title: "Vulnerability description", }, { category: "summary", text: "dnsmasq: heap overflow in the IPv6 router advertisement code", title: "Vulnerability summary", }, { category: "other", text: "Red Hat OpenStack Platform includes the dnsmasq-utils RPM which does not contain this flaw's affected code-paths; Red Hat OpenStack Platform is therefore listed as not affected.\n\nHowever, because all versions of Red Hat OpenStack Platform are based on Red Hat Enterprise Linux, all Red Hat OpenStack Platform users should absolutely upgrade the dnsmasq RPM from Red Hat Enterprise Linux as a matter of urgency using standard update mechanisms (such as 'yum update' or 'openstack overcloud update').", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2017-14492", }, { category: "external", summary: "RHBZ#1495410", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1495410", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2017-14492", url: "https://www.cve.org/CVERecord?id=CVE-2017-14492", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2017-14492", url: "https://nvd.nist.gov/vuln/detail/CVE-2017-14492", }, { category: "external", summary: "https://access.redhat.com/security/vulnerabilities/3199382", url: "https://access.redhat.com/security/vulnerabilities/3199382", }, { category: "external", summary: "https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html", url: "https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html", }, ], release_date: "2017-10-02T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2017-10-02T17:18:46+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2017:2836", }, ], scores: [ { cvss_v2: { accessComplexity: "LOW", accessVector: "ADJACENT_NETWORK", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 8.3, confidentialityImpact: "COMPLETE", integrityImpact: "COMPLETE", vectorString: "AV:A/AC:L/Au:N/C:C/I:C/A:C", version: "2.0", }, cvss_v3: { attackComplexity: "LOW", attackVector: "ADJACENT_NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", ], }, ], threats: [ { category: "impact", details: "Critical", }, ], title: "dnsmasq: heap overflow in the IPv6 router advertisement code", }, { acknowledgments: [ { names: [ "Felix Wilhelm", "Fermin J. Serna", "Gabriel Campana", "Kevin Hamacher", "Ron Bowes", ], organization: "Google Security Team", }, ], cve: "CVE-2017-14493", cwe: { id: "CWE-121", name: "Stack-based Buffer Overflow", }, discovery_date: "2017-09-25T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1495411", }, ], notes: [ { category: "description", text: "A stack buffer overflow was found in dnsmasq in the DHCPv6 code. An attacker on the local network could send a crafted DHCPv6 request to dnsmasq which would cause it to a crash or, potentially, execute arbitrary code.", title: "Vulnerability description", }, { category: "summary", text: "dnsmasq: stack buffer overflow in the DHCPv6 code", title: "Vulnerability summary", }, { category: "other", text: "Red Hat OpenStack Platform includes the dnsmasq-utils RPM which does not contain this flaw's affected code-paths; Red Hat OpenStack Platform is therefore listed as not affected.\n\nHowever, because all versions of Red Hat OpenStack Platform are based on Red Hat Enterprise Linux, all Red Hat OpenStack Platform users should absolutely upgrade the dnsmasq RPM from Red Hat Enterprise Linux as a matter of urgency using standard update mechanisms (such as 'yum update' or 'openstack overcloud update').", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2017-14493", }, { category: "external", summary: "RHBZ#1495411", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1495411", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2017-14493", url: "https://www.cve.org/CVERecord?id=CVE-2017-14493", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2017-14493", url: "https://nvd.nist.gov/vuln/detail/CVE-2017-14493", }, { category: "external", summary: "https://access.redhat.com/security/vulnerabilities/3199382", url: "https://access.redhat.com/security/vulnerabilities/3199382", }, { category: "external", summary: "https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html", url: "https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html", }, ], release_date: "2017-10-02T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2017-10-02T17:18:46+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2017:2836", }, ], scores: [ { cvss_v2: { accessComplexity: "LOW", accessVector: "ADJACENT_NETWORK", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 8.3, confidentialityImpact: "COMPLETE", integrityImpact: "COMPLETE", vectorString: "AV:A/AC:L/Au:N/C:C/I:C/A:C", version: "2.0", }, cvss_v3: { attackComplexity: "LOW", attackVector: "ADJACENT_NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", ], }, ], threats: [ { category: "impact", details: "Critical", }, ], title: "dnsmasq: stack buffer overflow in the DHCPv6 code", }, { acknowledgments: [ { names: [ "Felix Wilhelm", "Fermin J. Serna", "Gabriel Campana", "Kevin Hamacher", "Ron Bowes", ], organization: "Google Security Team", }, ], cve: "CVE-2017-14494", cwe: { id: "CWE-125", name: "Out-of-bounds Read", }, discovery_date: "2017-09-25T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1495412", }, ], notes: [ { category: "description", text: "An information leak was found in dnsmasq in the DHCPv6 relay code. An attacker on the local network could send crafted DHCPv6 packets to dnsmasq causing it to forward the contents of process memory, potentially leaking sensitive data.", title: "Vulnerability description", }, { category: "summary", text: "dnsmasq: information leak in the DHCPv6 relay code", title: "Vulnerability summary", }, { category: "other", text: "Red Hat OpenStack Platform includes the dnsmasq-utils RPM which does not contain this flaw's affected code-paths; Red Hat OpenStack Platform is therefore listed as not affected.\n\nHowever, because all versions of Red Hat OpenStack Platform are based on Red Hat Enterprise Linux, all Red Hat OpenStack Platform users should absolutely upgrade the dnsmasq RPM from Red Hat Enterprise Linux as a matter of urgency using standard update mechanisms (such as 'yum update' or 'openstack overcloud update').", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2017-14494", }, { category: "external", summary: "RHBZ#1495412", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1495412", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2017-14494", url: "https://www.cve.org/CVERecord?id=CVE-2017-14494", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2017-14494", url: "https://nvd.nist.gov/vuln/detail/CVE-2017-14494", }, { category: "external", summary: "https://access.redhat.com/security/vulnerabilities/3199382", url: "https://access.redhat.com/security/vulnerabilities/3199382", }, { category: "external", summary: "https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html", url: "https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html", }, ], release_date: "2017-10-02T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2017-10-02T17:18:46+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2017:2836", }, ], scores: [ { cvss_v2: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 7.8, confidentialityImpact: "COMPLETE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:C/I:N/A:N", version: "2.0", }, cvss_v3: { attackComplexity: "LOW", attackVector: "ADJACENT_NETWORK", availabilityImpact: "NONE", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.0", }, products: [ "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", ], }, ], threats: [ { category: "impact", details: "Important", }, ], title: "dnsmasq: information leak in the DHCPv6 relay code", }, { acknowledgments: [ { names: [ "Felix Wilhelm", "Fermin J. Serna", "Gabriel Campana", "Kevin Hamacher", "Ron Bowes", ], organization: "Google Security Team", }, ], cve: "CVE-2017-14495", cwe: { id: "CWE-400", name: "Uncontrolled Resource Consumption", }, discovery_date: "2017-09-25T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1495415", }, ], notes: [ { category: "description", text: "A memory exhaustion flaw was found in dnsmasq in the EDNS0 code. An attacker could send crafted DNS packets which would trigger memory allocations which would never be freed, leading to unbounded memory consumption and eventually a crash. This issue only affected configurations using one of the options: add-mac, add-cpe-id, or add-subnet.", title: "Vulnerability description", }, { category: "summary", text: "dnsmasq: memory exhaustion vulnerability in the EDNS0 code", title: "Vulnerability summary", }, { category: "other", text: "Red Hat OpenStack Platform includes the dnsmasq-utils RPM which does not contain this flaw's affected code-paths; Red Hat OpenStack Platform is therefore listed as not affected.\n\nHowever, because all versions of Red Hat OpenStack Platform are based on Red Hat Enterprise Linux, all Red Hat OpenStack Platform users should absolutely upgrade the dnsmasq RPM from Red Hat Enterprise Linux as a matter of urgency using standard update mechanisms (such as 'yum update' or 'openstack overcloud update').", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2017-14495", }, { category: "external", summary: "RHBZ#1495415", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1495415", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2017-14495", url: "https://www.cve.org/CVERecord?id=CVE-2017-14495", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2017-14495", url: "https://nvd.nist.gov/vuln/detail/CVE-2017-14495", }, { category: "external", summary: "https://access.redhat.com/security/vulnerabilities/3199382", url: "https://access.redhat.com/security/vulnerabilities/3199382", }, { category: "external", summary: "https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html", url: "https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html", }, ], release_date: "2017-10-02T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2017-10-02T17:18:46+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2017:2836", }, ], scores: [ { cvss_v2: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 7.8, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:C", version: "2.0", }, cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", ], }, ], threats: [ { category: "impact", details: "Important", }, ], title: "dnsmasq: memory exhaustion vulnerability in the EDNS0 code", }, { acknowledgments: [ { names: [ "Felix Wilhelm", "Fermin J. Serna", "Gabriel Campana", "Kevin Hamacher", "Ron Bowes", ], organization: "Google Security Team", }, ], cve: "CVE-2017-14496", cwe: { id: "CWE-125", name: "Out-of-bounds Read", }, discovery_date: "2017-09-25T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1495416", }, ], notes: [ { category: "description", text: "An integer underflow flaw leading to a buffer over-read was found in dnsmasq in the EDNS0 code. An attacker could send crafted DNS packets to dnsmasq which would cause it to crash. This issue only affected configurations using one of the options: add-mac, add-cpe-id, or add-subnet.", title: "Vulnerability description", }, { category: "summary", text: "dnsmasq: integer underflow leading to buffer over-read in the EDNS0 code", title: "Vulnerability summary", }, { category: "other", text: "Red Hat OpenStack Platform includes the dnsmasq-utils RPM which does not contain this flaw's affected code-paths; Red Hat OpenStack Platform is therefore listed as not affected.\n\nHowever, because all versions of Red Hat OpenStack Platform are based on Red Hat Enterprise Linux, all Red Hat OpenStack Platform users should absolutely upgrade the dnsmasq RPM from Red Hat Enterprise Linux as a matter of urgency using standard update mechanisms (such as 'yum update' or 'openstack overcloud update').", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2017-14496", }, { category: "external", summary: "RHBZ#1495416", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1495416", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2017-14496", url: "https://www.cve.org/CVERecord?id=CVE-2017-14496", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2017-14496", url: "https://nvd.nist.gov/vuln/detail/CVE-2017-14496", }, { category: "external", summary: "https://access.redhat.com/security/vulnerabilities/3199382", url: "https://access.redhat.com/security/vulnerabilities/3199382", }, { category: "external", summary: "https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html", url: "https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html", }, ], release_date: "2017-10-02T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2017-10-02T17:18:46+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2017:2836", }, ], scores: [ { cvss_v2: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 7.8, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:C", version: "2.0", }, cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", ], }, ], threats: [ { category: "impact", details: "Important", }, ], title: "dnsmasq: integer underflow leading to buffer over-read in the EDNS0 code", }, ], }
RHSA-2017:2837
Vulnerability from csaf_redhat
Notes
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Critical", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "An update for dnsmasq is now available for Red Hat Enterprise Linux 7.2 Extended Update Support and Red Hat Enterprise Linux 7.3 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", title: "Topic", }, { category: "general", text: "The dnsmasq packages contain Dnsmasq, a lightweight DNS (Domain Name Server) forwarder and DHCP (Dynamic Host Configuration Protocol) server.\n\nSecurity Fix(es):\n\n* A heap buffer overflow was found in dnsmasq in the code responsible for building DNS replies. An attacker could send crafted DNS packets to dnsmasq which would cause it to crash or, potentially, execute arbitrary code. (CVE-2017-14491)\n\n* A heap buffer overflow was discovered in dnsmasq in the IPv6 router advertisement (RA) handling code. An attacker on the local network segment could send crafted RAs to dnsmasq which would cause it to crash or, potentially, execute arbitrary code. This issue only affected configurations using one of these options: enable-ra, ra-only, slaac, ra-names, ra-advrouter, or ra-stateless. (CVE-2017-14492)\n\n* A stack buffer overflow was found in dnsmasq in the DHCPv6 code. An attacker on the local network could send a crafted DHCPv6 request to dnsmasq which would cause it to a crash or, potentially, execute arbitrary code. (CVE-2017-14493)\n\n* An information leak was found in dnsmasq in the DHCPv6 relay code. An attacker on the local network could send crafted DHCPv6 packets to dnsmasq causing it to forward the contents of process memory, potentially leaking sensitive data. (CVE-2017-14494)\n\nRed Hat would like to thank Felix Wilhelm (Google Security Team), Fermin J. Serna (Google Security Team), Gabriel Campana (Google Security Team), Kevin Hamacher (Google Security Team), and Ron Bowes (Google Security Team) for reporting these issues.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2017:2837", url: "https://access.redhat.com/errata/RHSA-2017:2837", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#critical", url: "https://access.redhat.com/security/updates/classification/#critical", }, { category: "external", summary: "https://access.redhat.com/security/vulnerabilities/3199382", url: "https://access.redhat.com/security/vulnerabilities/3199382", }, { category: "external", summary: "1495409", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1495409", }, { category: "external", summary: "1495410", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1495410", }, { category: "external", summary: "1495411", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1495411", }, { category: "external", summary: "1495412", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1495412", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2017/rhsa-2017_2837.json", }, ], title: "Red Hat Security Advisory: dnsmasq security update", tracking: { current_release_date: "2024-11-22T11:34:10+00:00", generator: { date: "2024-11-22T11:34:10+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.1", }, }, id: "RHSA-2017:2837", initial_release_date: "2017-10-02T16:19:55+00:00", revision_history: [ { date: "2017-10-02T16:19:55+00:00", number: "1", summary: "Initial version", }, { date: "2017-10-02T16:19:55+00:00", number: "2", summary: "Last updated version", }, { date: "2024-11-22T11:34:10+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux ComputeNode EUS (v. 7.2)", product: { name: "Red Hat Enterprise Linux ComputeNode EUS (v. 7.2)", product_id: "7ComputeNode-7.2.EUS", product_identification_helper: { cpe: "cpe:/o:redhat:rhel_eus:7.2::computenode", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)", product: { name: "Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)", product_id: "7ComputeNode-optional-7.2.EUS", product_identification_helper: { cpe: "cpe:/o:redhat:rhel_eus:7.2::computenode", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Server EUS (v. 7.2)", product: { name: "Red Hat Enterprise Linux Server EUS (v. 7.2)", product_id: "7Server-7.2.EUS", product_identification_helper: { cpe: "cpe:/o:redhat:rhel_eus:7.2::server", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Server Optional EUS (v. 7.2)", product: { name: "Red Hat Enterprise Linux Server Optional EUS (v. 7.2)", product_id: "7Server-optional-7.2.EUS", product_identification_helper: { cpe: "cpe:/o:redhat:rhel_eus:7.2::server", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", product: { name: "Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", product_id: "7ComputeNode-7.3.EUS", product_identification_helper: { cpe: "cpe:/o:redhat:rhel_eus:7.3::computenode", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", product: { name: "Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", product_id: "7ComputeNode-optional-7.3.EUS", product_identification_helper: { cpe: "cpe:/o:redhat:rhel_eus:7.3::computenode", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Server EUS (v. 7.3)", product: { name: "Red Hat Enterprise Linux Server EUS (v. 7.3)", product_id: "7Server-7.3.EUS", product_identification_helper: { cpe: "cpe:/o:redhat:rhel_eus:7.3::server", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", product: { name: "Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", product_id: "7Server-optional-7.3.EUS", product_identification_helper: { cpe: "cpe:/o:redhat:rhel_eus:7.3::server", }, }, }, ], category: "product_family", name: "Red Hat Enterprise Linux", }, { branches: [ { category: "product_version", name: "dnsmasq-0:2.66-14.el7_2.2.x86_64", product: { name: "dnsmasq-0:2.66-14.el7_2.2.x86_64", product_id: "dnsmasq-0:2.66-14.el7_2.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/dnsmasq@2.66-14.el7_2.2?arch=x86_64", }, }, }, { category: "product_version", name: "dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", product: { name: "dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", product_id: "dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/dnsmasq-debuginfo@2.66-14.el7_2.2?arch=x86_64", }, }, }, { category: "product_version", name: "dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", product: { name: "dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", product_id: "dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/dnsmasq-utils@2.66-14.el7_2.2?arch=x86_64", }, }, }, { category: "product_version", name: "dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", product: { name: "dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", product_id: "dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/dnsmasq-debuginfo@2.66-21.el7_3.2?arch=x86_64", }, }, }, { category: "product_version", name: "dnsmasq-0:2.66-21.el7_3.2.x86_64", product: { name: "dnsmasq-0:2.66-21.el7_3.2.x86_64", product_id: "dnsmasq-0:2.66-21.el7_3.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/dnsmasq@2.66-21.el7_3.2?arch=x86_64", }, }, }, { category: "product_version", name: "dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", product: { name: "dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", product_id: "dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/dnsmasq-utils@2.66-21.el7_3.2?arch=x86_64", }, }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_version", name: "dnsmasq-0:2.66-14.el7_2.2.src", product: { name: "dnsmasq-0:2.66-14.el7_2.2.src", product_id: "dnsmasq-0:2.66-14.el7_2.2.src", product_identification_helper: { purl: "pkg:rpm/redhat/dnsmasq@2.66-14.el7_2.2?arch=src", }, }, }, { category: "product_version", name: "dnsmasq-0:2.66-21.el7_3.2.src", product: { name: "dnsmasq-0:2.66-21.el7_3.2.src", product_id: "dnsmasq-0:2.66-21.el7_3.2.src", product_identification_helper: { purl: "pkg:rpm/redhat/dnsmasq@2.66-21.el7_3.2?arch=src", }, }, }, ], category: "architecture", name: "src", }, { branches: [ { category: "product_version", name: "dnsmasq-utils-0:2.66-14.el7_2.2.s390x", product: { name: "dnsmasq-utils-0:2.66-14.el7_2.2.s390x", product_id: "dnsmasq-utils-0:2.66-14.el7_2.2.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/dnsmasq-utils@2.66-14.el7_2.2?arch=s390x", }, }, }, { category: "product_version", name: "dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", product: { name: "dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", product_id: "dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/dnsmasq-debuginfo@2.66-14.el7_2.2?arch=s390x", }, }, }, { category: "product_version", name: "dnsmasq-0:2.66-14.el7_2.2.s390x", product: { name: "dnsmasq-0:2.66-14.el7_2.2.s390x", product_id: "dnsmasq-0:2.66-14.el7_2.2.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/dnsmasq@2.66-14.el7_2.2?arch=s390x", }, }, }, { category: "product_version", name: "dnsmasq-utils-0:2.66-21.el7_3.2.s390x", product: { name: "dnsmasq-utils-0:2.66-21.el7_3.2.s390x", product_id: "dnsmasq-utils-0:2.66-21.el7_3.2.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/dnsmasq-utils@2.66-21.el7_3.2?arch=s390x", }, }, }, { category: "product_version", name: "dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", product: { name: "dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", product_id: "dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/dnsmasq-debuginfo@2.66-21.el7_3.2?arch=s390x", }, }, }, { category: "product_version", name: "dnsmasq-0:2.66-21.el7_3.2.s390x", product: { name: "dnsmasq-0:2.66-21.el7_3.2.s390x", product_id: "dnsmasq-0:2.66-21.el7_3.2.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/dnsmasq@2.66-21.el7_3.2?arch=s390x", }, }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", product: { name: "dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", product_id: "dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", product_identification_helper: { purl: "pkg:rpm/redhat/dnsmasq-utils@2.66-14.el7_2.2?arch=ppc64", }, }, }, { category: "product_version", name: "dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", product: { name: "dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", product_id: "dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", product_identification_helper: { purl: "pkg:rpm/redhat/dnsmasq-debuginfo@2.66-14.el7_2.2?arch=ppc64", }, }, }, { category: "product_version", name: "dnsmasq-0:2.66-14.el7_2.2.ppc64", product: { name: "dnsmasq-0:2.66-14.el7_2.2.ppc64", product_id: "dnsmasq-0:2.66-14.el7_2.2.ppc64", product_identification_helper: { purl: "pkg:rpm/redhat/dnsmasq@2.66-14.el7_2.2?arch=ppc64", }, }, }, { category: "product_version", name: "dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", product: { name: "dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", product_id: "dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", product_identification_helper: { purl: "pkg:rpm/redhat/dnsmasq-utils@2.66-21.el7_3.2?arch=ppc64", }, }, }, { category: "product_version", name: "dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", product: { name: "dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", product_id: "dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", product_identification_helper: { purl: "pkg:rpm/redhat/dnsmasq-debuginfo@2.66-21.el7_3.2?arch=ppc64", }, }, }, { category: "product_version", name: "dnsmasq-0:2.66-21.el7_3.2.ppc64", product: { name: "dnsmasq-0:2.66-21.el7_3.2.ppc64", product_id: "dnsmasq-0:2.66-21.el7_3.2.ppc64", product_identification_helper: { purl: "pkg:rpm/redhat/dnsmasq@2.66-21.el7_3.2?arch=ppc64", }, }, }, ], category: "architecture", name: "ppc64", }, { branches: [ { category: "product_version", name: "dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", product: { name: "dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", product_id: "dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/dnsmasq-utils@2.66-14.el7_2.2?arch=ppc64le", }, }, }, { category: "product_version", name: "dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", product: { name: "dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", product_id: "dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/dnsmasq-debuginfo@2.66-14.el7_2.2?arch=ppc64le", }, }, }, { category: "product_version", name: "dnsmasq-0:2.66-14.el7_2.2.ppc64le", product: { name: "dnsmasq-0:2.66-14.el7_2.2.ppc64le", product_id: "dnsmasq-0:2.66-14.el7_2.2.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/dnsmasq@2.66-14.el7_2.2?arch=ppc64le", }, }, }, { category: "product_version", name: "dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", product: { name: "dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", product_id: "dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/dnsmasq-utils@2.66-21.el7_3.2?arch=ppc64le", }, }, }, { category: "product_version", name: "dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", product: { name: "dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", product_id: "dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/dnsmasq-debuginfo@2.66-21.el7_3.2?arch=ppc64le", }, }, }, { category: "product_version", name: "dnsmasq-0:2.66-21.el7_3.2.ppc64le", product: { name: "dnsmasq-0:2.66-21.el7_3.2.ppc64le", product_id: "dnsmasq-0:2.66-21.el7_3.2.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/dnsmasq@2.66-21.el7_3.2?arch=ppc64le", }, }, }, ], category: "architecture", name: "ppc64le", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.66-14.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.2)", product_id: "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", }, product_reference: "dnsmasq-0:2.66-14.el7_2.2.ppc64", relates_to_product_reference: "7ComputeNode-7.2.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.66-14.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.2)", product_id: "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", }, product_reference: "dnsmasq-0:2.66-14.el7_2.2.ppc64le", relates_to_product_reference: "7ComputeNode-7.2.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.66-14.el7_2.2.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.2)", product_id: "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", }, product_reference: "dnsmasq-0:2.66-14.el7_2.2.s390x", relates_to_product_reference: "7ComputeNode-7.2.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.66-14.el7_2.2.src as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.2)", product_id: "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", }, product_reference: "dnsmasq-0:2.66-14.el7_2.2.src", relates_to_product_reference: "7ComputeNode-7.2.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.66-14.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.2)", product_id: "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", }, product_reference: "dnsmasq-0:2.66-14.el7_2.2.x86_64", relates_to_product_reference: "7ComputeNode-7.2.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.2)", product_id: "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", }, product_reference: "dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", relates_to_product_reference: "7ComputeNode-7.2.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.2)", product_id: "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", }, product_reference: "dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", relates_to_product_reference: "7ComputeNode-7.2.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.2)", product_id: "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", }, product_reference: "dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", relates_to_product_reference: "7ComputeNode-7.2.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.2)", product_id: "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", }, product_reference: "dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", relates_to_product_reference: "7ComputeNode-7.2.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.66-14.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.2)", product_id: "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", }, product_reference: "dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", relates_to_product_reference: "7ComputeNode-7.2.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.2)", product_id: "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", }, product_reference: "dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", relates_to_product_reference: "7ComputeNode-7.2.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.66-14.el7_2.2.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.2)", product_id: "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", }, product_reference: "dnsmasq-utils-0:2.66-14.el7_2.2.s390x", relates_to_product_reference: "7ComputeNode-7.2.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.66-14.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.2)", product_id: "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", }, product_reference: "dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", relates_to_product_reference: "7ComputeNode-7.2.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.66-21.el7_3.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", product_id: "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", }, product_reference: "dnsmasq-0:2.66-21.el7_3.2.ppc64", relates_to_product_reference: "7ComputeNode-7.3.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.66-21.el7_3.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", product_id: "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", }, product_reference: "dnsmasq-0:2.66-21.el7_3.2.ppc64le", relates_to_product_reference: "7ComputeNode-7.3.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.66-21.el7_3.2.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", product_id: "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", }, product_reference: "dnsmasq-0:2.66-21.el7_3.2.s390x", relates_to_product_reference: "7ComputeNode-7.3.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.66-21.el7_3.2.src as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", product_id: "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", }, product_reference: "dnsmasq-0:2.66-21.el7_3.2.src", relates_to_product_reference: "7ComputeNode-7.3.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.66-21.el7_3.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", product_id: "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", }, product_reference: "dnsmasq-0:2.66-21.el7_3.2.x86_64", relates_to_product_reference: "7ComputeNode-7.3.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", product_id: "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", }, product_reference: "dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", relates_to_product_reference: "7ComputeNode-7.3.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", product_id: "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", }, product_reference: "dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", relates_to_product_reference: "7ComputeNode-7.3.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", product_id: "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", }, product_reference: "dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", relates_to_product_reference: "7ComputeNode-7.3.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", product_id: "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", }, product_reference: "dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", relates_to_product_reference: "7ComputeNode-7.3.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.66-21.el7_3.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", product_id: "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", }, product_reference: "dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", relates_to_product_reference: "7ComputeNode-7.3.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", product_id: "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", }, product_reference: "dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", relates_to_product_reference: "7ComputeNode-7.3.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.66-21.el7_3.2.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", product_id: "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", }, product_reference: "dnsmasq-utils-0:2.66-21.el7_3.2.s390x", relates_to_product_reference: "7ComputeNode-7.3.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.66-21.el7_3.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", product_id: "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", }, product_reference: "dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", relates_to_product_reference: "7ComputeNode-7.3.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.66-14.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)", product_id: "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", }, product_reference: "dnsmasq-0:2.66-14.el7_2.2.ppc64", relates_to_product_reference: "7ComputeNode-optional-7.2.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.66-14.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)", product_id: "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", }, product_reference: "dnsmasq-0:2.66-14.el7_2.2.ppc64le", relates_to_product_reference: "7ComputeNode-optional-7.2.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.66-14.el7_2.2.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)", product_id: "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", }, product_reference: "dnsmasq-0:2.66-14.el7_2.2.s390x", relates_to_product_reference: "7ComputeNode-optional-7.2.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.66-14.el7_2.2.src as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)", product_id: "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", }, product_reference: "dnsmasq-0:2.66-14.el7_2.2.src", relates_to_product_reference: "7ComputeNode-optional-7.2.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.66-14.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)", product_id: "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", }, product_reference: "dnsmasq-0:2.66-14.el7_2.2.x86_64", relates_to_product_reference: "7ComputeNode-optional-7.2.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)", product_id: "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", }, product_reference: "dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", relates_to_product_reference: "7ComputeNode-optional-7.2.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)", product_id: "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", }, product_reference: "dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", relates_to_product_reference: "7ComputeNode-optional-7.2.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)", product_id: "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", }, product_reference: "dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", relates_to_product_reference: "7ComputeNode-optional-7.2.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)", product_id: "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", }, product_reference: "dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", relates_to_product_reference: "7ComputeNode-optional-7.2.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.66-14.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)", product_id: "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", }, product_reference: "dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", relates_to_product_reference: "7ComputeNode-optional-7.2.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)", product_id: "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", }, product_reference: "dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", relates_to_product_reference: "7ComputeNode-optional-7.2.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.66-14.el7_2.2.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)", product_id: "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", }, product_reference: "dnsmasq-utils-0:2.66-14.el7_2.2.s390x", relates_to_product_reference: "7ComputeNode-optional-7.2.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.66-14.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)", product_id: "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", }, product_reference: "dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", relates_to_product_reference: "7ComputeNode-optional-7.2.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.66-21.el7_3.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", product_id: "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", }, product_reference: "dnsmasq-0:2.66-21.el7_3.2.ppc64", relates_to_product_reference: "7ComputeNode-optional-7.3.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.66-21.el7_3.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", product_id: "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", }, product_reference: "dnsmasq-0:2.66-21.el7_3.2.ppc64le", relates_to_product_reference: "7ComputeNode-optional-7.3.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.66-21.el7_3.2.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", product_id: "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", }, product_reference: "dnsmasq-0:2.66-21.el7_3.2.s390x", relates_to_product_reference: "7ComputeNode-optional-7.3.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.66-21.el7_3.2.src as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", product_id: "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", }, product_reference: "dnsmasq-0:2.66-21.el7_3.2.src", relates_to_product_reference: "7ComputeNode-optional-7.3.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.66-21.el7_3.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", product_id: "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", }, product_reference: "dnsmasq-0:2.66-21.el7_3.2.x86_64", relates_to_product_reference: "7ComputeNode-optional-7.3.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", product_id: "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", }, product_reference: "dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", relates_to_product_reference: "7ComputeNode-optional-7.3.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", product_id: "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", }, product_reference: "dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", relates_to_product_reference: "7ComputeNode-optional-7.3.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", product_id: "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", }, product_reference: "dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", relates_to_product_reference: "7ComputeNode-optional-7.3.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", product_id: "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", }, product_reference: "dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", relates_to_product_reference: "7ComputeNode-optional-7.3.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.66-21.el7_3.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", product_id: "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", }, product_reference: "dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", relates_to_product_reference: "7ComputeNode-optional-7.3.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", product_id: "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", }, product_reference: "dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", relates_to_product_reference: "7ComputeNode-optional-7.3.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.66-21.el7_3.2.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", product_id: "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", }, product_reference: "dnsmasq-utils-0:2.66-21.el7_3.2.s390x", relates_to_product_reference: "7ComputeNode-optional-7.3.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.66-21.el7_3.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", product_id: "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", }, product_reference: "dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", relates_to_product_reference: "7ComputeNode-optional-7.3.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.66-14.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)", product_id: "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", }, product_reference: "dnsmasq-0:2.66-14.el7_2.2.ppc64", relates_to_product_reference: "7Server-7.2.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.66-14.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)", product_id: "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", }, product_reference: "dnsmasq-0:2.66-14.el7_2.2.ppc64le", relates_to_product_reference: "7Server-7.2.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.66-14.el7_2.2.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)", product_id: "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", }, product_reference: "dnsmasq-0:2.66-14.el7_2.2.s390x", relates_to_product_reference: "7Server-7.2.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.66-14.el7_2.2.src as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)", product_id: "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", }, product_reference: "dnsmasq-0:2.66-14.el7_2.2.src", relates_to_product_reference: "7Server-7.2.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.66-14.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)", product_id: "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", }, product_reference: "dnsmasq-0:2.66-14.el7_2.2.x86_64", relates_to_product_reference: "7Server-7.2.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)", product_id: "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", }, product_reference: "dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", relates_to_product_reference: "7Server-7.2.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)", product_id: "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", }, product_reference: "dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", relates_to_product_reference: "7Server-7.2.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)", product_id: "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", }, product_reference: "dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", relates_to_product_reference: "7Server-7.2.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)", product_id: "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", }, product_reference: "dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", relates_to_product_reference: "7Server-7.2.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.66-14.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)", product_id: "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", }, product_reference: "dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", relates_to_product_reference: "7Server-7.2.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)", product_id: "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", }, product_reference: "dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", relates_to_product_reference: "7Server-7.2.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.66-14.el7_2.2.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)", product_id: "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", }, product_reference: "dnsmasq-utils-0:2.66-14.el7_2.2.s390x", relates_to_product_reference: "7Server-7.2.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.66-14.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)", product_id: "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", }, product_reference: "dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", relates_to_product_reference: "7Server-7.2.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.66-21.el7_3.2.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", product_id: "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", }, product_reference: "dnsmasq-0:2.66-21.el7_3.2.ppc64", relates_to_product_reference: "7Server-7.3.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.66-21.el7_3.2.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", product_id: "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", }, product_reference: "dnsmasq-0:2.66-21.el7_3.2.ppc64le", relates_to_product_reference: "7Server-7.3.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.66-21.el7_3.2.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", product_id: "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", }, product_reference: "dnsmasq-0:2.66-21.el7_3.2.s390x", relates_to_product_reference: "7Server-7.3.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.66-21.el7_3.2.src as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", product_id: "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", }, product_reference: "dnsmasq-0:2.66-21.el7_3.2.src", relates_to_product_reference: "7Server-7.3.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.66-21.el7_3.2.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", product_id: "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", }, product_reference: "dnsmasq-0:2.66-21.el7_3.2.x86_64", relates_to_product_reference: "7Server-7.3.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", product_id: "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", }, product_reference: "dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", relates_to_product_reference: "7Server-7.3.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", product_id: "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", }, product_reference: "dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", relates_to_product_reference: "7Server-7.3.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", product_id: "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", }, product_reference: "dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", relates_to_product_reference: "7Server-7.3.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", product_id: "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", }, product_reference: "dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", relates_to_product_reference: "7Server-7.3.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.66-21.el7_3.2.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", product_id: "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", }, product_reference: "dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", relates_to_product_reference: "7Server-7.3.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", product_id: "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", }, product_reference: "dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", relates_to_product_reference: "7Server-7.3.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.66-21.el7_3.2.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", product_id: "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", }, product_reference: "dnsmasq-utils-0:2.66-21.el7_3.2.s390x", relates_to_product_reference: "7Server-7.3.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.66-21.el7_3.2.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", product_id: "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", }, product_reference: "dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", relates_to_product_reference: "7Server-7.3.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.66-14.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)", product_id: "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", }, product_reference: "dnsmasq-0:2.66-14.el7_2.2.ppc64", relates_to_product_reference: "7Server-optional-7.2.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.66-14.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)", product_id: "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", }, product_reference: "dnsmasq-0:2.66-14.el7_2.2.ppc64le", relates_to_product_reference: "7Server-optional-7.2.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.66-14.el7_2.2.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)", product_id: "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", }, product_reference: "dnsmasq-0:2.66-14.el7_2.2.s390x", relates_to_product_reference: "7Server-optional-7.2.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.66-14.el7_2.2.src as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)", product_id: "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", }, product_reference: "dnsmasq-0:2.66-14.el7_2.2.src", relates_to_product_reference: "7Server-optional-7.2.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.66-14.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)", product_id: "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", }, product_reference: "dnsmasq-0:2.66-14.el7_2.2.x86_64", relates_to_product_reference: "7Server-optional-7.2.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)", product_id: "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", }, product_reference: "dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", relates_to_product_reference: "7Server-optional-7.2.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)", product_id: "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", }, product_reference: "dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", relates_to_product_reference: "7Server-optional-7.2.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)", product_id: "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", }, product_reference: "dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", relates_to_product_reference: "7Server-optional-7.2.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)", product_id: "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", }, product_reference: "dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", relates_to_product_reference: "7Server-optional-7.2.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.66-14.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)", product_id: "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", }, product_reference: "dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", relates_to_product_reference: "7Server-optional-7.2.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)", product_id: "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", }, product_reference: "dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", relates_to_product_reference: "7Server-optional-7.2.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.66-14.el7_2.2.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)", product_id: "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", }, product_reference: "dnsmasq-utils-0:2.66-14.el7_2.2.s390x", relates_to_product_reference: "7Server-optional-7.2.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.66-14.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)", product_id: "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", }, product_reference: "dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", relates_to_product_reference: "7Server-optional-7.2.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.66-21.el7_3.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", product_id: "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", }, product_reference: "dnsmasq-0:2.66-21.el7_3.2.ppc64", relates_to_product_reference: "7Server-optional-7.3.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.66-21.el7_3.2.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", product_id: "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", }, product_reference: "dnsmasq-0:2.66-21.el7_3.2.ppc64le", relates_to_product_reference: "7Server-optional-7.3.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.66-21.el7_3.2.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", product_id: "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", }, product_reference: "dnsmasq-0:2.66-21.el7_3.2.s390x", relates_to_product_reference: "7Server-optional-7.3.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.66-21.el7_3.2.src as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", product_id: "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", }, product_reference: "dnsmasq-0:2.66-21.el7_3.2.src", relates_to_product_reference: "7Server-optional-7.3.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.66-21.el7_3.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", product_id: "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", }, product_reference: "dnsmasq-0:2.66-21.el7_3.2.x86_64", relates_to_product_reference: "7Server-optional-7.3.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", product_id: "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", }, product_reference: "dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", relates_to_product_reference: "7Server-optional-7.3.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", product_id: "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", }, product_reference: "dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", relates_to_product_reference: "7Server-optional-7.3.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", product_id: "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", }, product_reference: "dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", relates_to_product_reference: "7Server-optional-7.3.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", product_id: "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", }, product_reference: "dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", relates_to_product_reference: "7Server-optional-7.3.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.66-21.el7_3.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", product_id: "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", }, product_reference: "dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", relates_to_product_reference: "7Server-optional-7.3.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", product_id: "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", }, product_reference: "dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", relates_to_product_reference: "7Server-optional-7.3.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.66-21.el7_3.2.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", product_id: "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", }, product_reference: "dnsmasq-utils-0:2.66-21.el7_3.2.s390x", relates_to_product_reference: "7Server-optional-7.3.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.66-21.el7_3.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", product_id: "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", }, product_reference: "dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", relates_to_product_reference: "7Server-optional-7.3.EUS", }, ], }, vulnerabilities: [ { acknowledgments: [ { names: [ "Felix Wilhelm", "Fermin J. Serna", "Gabriel Campana", "Kevin Hamacher", "Ron Bowes", ], organization: "Google Security Team", }, ], cve: "CVE-2017-14491", cwe: { id: "CWE-122", name: "Heap-based Buffer Overflow", }, discovery_date: "2017-09-25T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1495409", }, ], notes: [ { category: "description", text: "A heap buffer overflow was found in dnsmasq in the code responsible for building DNS replies. An attacker could send crafted DNS packets to dnsmasq which would cause it to crash or, potentially, execute arbitrary code.", title: "Vulnerability description", }, { category: "summary", text: "dnsmasq: heap overflow in the code responsible for building DNS replies", title: "Vulnerability summary", }, { category: "other", text: "Red Hat OpenStack Platform includes the dnsmasq-utils RPM which does not contain this flaw's affected code-paths; Red Hat OpenStack Platform is therefore listed as not affected.\n\nHowever, because all versions of Red Hat OpenStack Platform are based on Red Hat Enterprise Linux, all Red Hat OpenStack Platform users should absolutely upgrade the dnsmasq RPM from Red Hat Enterprise Linux as a matter of urgency using standard update mechanisms (such as 'yum update' or 'openstack overcloud update').", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2017-14491", }, { category: "external", summary: "RHBZ#1495409", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1495409", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2017-14491", url: "https://www.cve.org/CVERecord?id=CVE-2017-14491", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2017-14491", url: "https://nvd.nist.gov/vuln/detail/CVE-2017-14491", }, { category: "external", summary: "https://access.redhat.com/security/vulnerabilities/3199382", url: "https://access.redhat.com/security/vulnerabilities/3199382", }, { category: "external", summary: "https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html", url: "https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html", }, ], release_date: "2017-10-02T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2017-10-02T16:19:55+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2017:2837", }, ], scores: [ { cvss_v2: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 10, confidentialityImpact: "COMPLETE", integrityImpact: "COMPLETE", vectorString: "AV:N/AC:L/Au:N/C:C/I:C/A:C", version: "2.0", }, cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", ], }, ], threats: [ { category: "impact", details: "Critical", }, ], title: "dnsmasq: heap overflow in the code responsible for building DNS replies", }, { acknowledgments: [ { names: [ "Felix Wilhelm", "Fermin J. Serna", "Gabriel Campana", "Kevin Hamacher", "Ron Bowes", ], organization: "Google Security Team", }, ], cve: "CVE-2017-14492", cwe: { id: "CWE-122", name: "Heap-based Buffer Overflow", }, discovery_date: "2017-09-25T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1495410", }, ], notes: [ { category: "description", text: "A heap buffer overflow was discovered in dnsmasq in the IPv6 router advertisement (RA) handling code. An attacker on the local network segment could send crafted RAs to dnsmasq which would cause it to crash or, potentially, execute arbitrary code. This issue only affected configurations using one of these options: enable-ra, ra-only, slaac, ra-names, ra-advrouter, or ra-stateless.", title: "Vulnerability description", }, { category: "summary", text: "dnsmasq: heap overflow in the IPv6 router advertisement code", title: "Vulnerability summary", }, { category: "other", text: "Red Hat OpenStack Platform includes the dnsmasq-utils RPM which does not contain this flaw's affected code-paths; Red Hat OpenStack Platform is therefore listed as not affected.\n\nHowever, because all versions of Red Hat OpenStack Platform are based on Red Hat Enterprise Linux, all Red Hat OpenStack Platform users should absolutely upgrade the dnsmasq RPM from Red Hat Enterprise Linux as a matter of urgency using standard update mechanisms (such as 'yum update' or 'openstack overcloud update').", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2017-14492", }, { category: "external", summary: "RHBZ#1495410", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1495410", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2017-14492", url: "https://www.cve.org/CVERecord?id=CVE-2017-14492", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2017-14492", url: "https://nvd.nist.gov/vuln/detail/CVE-2017-14492", }, { category: "external", summary: "https://access.redhat.com/security/vulnerabilities/3199382", url: "https://access.redhat.com/security/vulnerabilities/3199382", }, { category: "external", summary: "https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html", url: "https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html", }, ], release_date: "2017-10-02T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2017-10-02T16:19:55+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2017:2837", }, ], scores: [ { cvss_v2: { accessComplexity: "LOW", accessVector: "ADJACENT_NETWORK", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 8.3, confidentialityImpact: "COMPLETE", integrityImpact: "COMPLETE", vectorString: "AV:A/AC:L/Au:N/C:C/I:C/A:C", version: "2.0", }, cvss_v3: { attackComplexity: "LOW", attackVector: "ADJACENT_NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", ], }, ], threats: [ { category: "impact", details: "Critical", }, ], title: "dnsmasq: heap overflow in the IPv6 router advertisement code", }, { acknowledgments: [ { names: [ "Felix Wilhelm", "Fermin J. Serna", "Gabriel Campana", "Kevin Hamacher", "Ron Bowes", ], organization: "Google Security Team", }, ], cve: "CVE-2017-14493", cwe: { id: "CWE-121", name: "Stack-based Buffer Overflow", }, discovery_date: "2017-09-25T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1495411", }, ], notes: [ { category: "description", text: "A stack buffer overflow was found in dnsmasq in the DHCPv6 code. An attacker on the local network could send a crafted DHCPv6 request to dnsmasq which would cause it to a crash or, potentially, execute arbitrary code.", title: "Vulnerability description", }, { category: "summary", text: "dnsmasq: stack buffer overflow in the DHCPv6 code", title: "Vulnerability summary", }, { category: "other", text: "Red Hat OpenStack Platform includes the dnsmasq-utils RPM which does not contain this flaw's affected code-paths; Red Hat OpenStack Platform is therefore listed as not affected.\n\nHowever, because all versions of Red Hat OpenStack Platform are based on Red Hat Enterprise Linux, all Red Hat OpenStack Platform users should absolutely upgrade the dnsmasq RPM from Red Hat Enterprise Linux as a matter of urgency using standard update mechanisms (such as 'yum update' or 'openstack overcloud update').", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2017-14493", }, { category: "external", summary: "RHBZ#1495411", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1495411", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2017-14493", url: "https://www.cve.org/CVERecord?id=CVE-2017-14493", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2017-14493", url: "https://nvd.nist.gov/vuln/detail/CVE-2017-14493", }, { category: "external", summary: "https://access.redhat.com/security/vulnerabilities/3199382", url: "https://access.redhat.com/security/vulnerabilities/3199382", }, { category: "external", summary: "https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html", url: "https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html", }, ], release_date: "2017-10-02T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2017-10-02T16:19:55+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2017:2837", }, ], scores: [ { cvss_v2: { accessComplexity: "LOW", accessVector: "ADJACENT_NETWORK", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 8.3, confidentialityImpact: "COMPLETE", integrityImpact: "COMPLETE", vectorString: "AV:A/AC:L/Au:N/C:C/I:C/A:C", version: "2.0", }, cvss_v3: { attackComplexity: "LOW", attackVector: "ADJACENT_NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", ], }, ], threats: [ { category: "impact", details: "Critical", }, ], title: "dnsmasq: stack buffer overflow in the DHCPv6 code", }, { acknowledgments: [ { names: [ "Felix Wilhelm", "Fermin J. Serna", "Gabriel Campana", "Kevin Hamacher", "Ron Bowes", ], organization: "Google Security Team", }, ], cve: "CVE-2017-14494", cwe: { id: "CWE-125", name: "Out-of-bounds Read", }, discovery_date: "2017-09-25T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1495412", }, ], notes: [ { category: "description", text: "An information leak was found in dnsmasq in the DHCPv6 relay code. An attacker on the local network could send crafted DHCPv6 packets to dnsmasq causing it to forward the contents of process memory, potentially leaking sensitive data.", title: "Vulnerability description", }, { category: "summary", text: "dnsmasq: information leak in the DHCPv6 relay code", title: "Vulnerability summary", }, { category: "other", text: "Red Hat OpenStack Platform includes the dnsmasq-utils RPM which does not contain this flaw's affected code-paths; Red Hat OpenStack Platform is therefore listed as not affected.\n\nHowever, because all versions of Red Hat OpenStack Platform are based on Red Hat Enterprise Linux, all Red Hat OpenStack Platform users should absolutely upgrade the dnsmasq RPM from Red Hat Enterprise Linux as a matter of urgency using standard update mechanisms (such as 'yum update' or 'openstack overcloud update').", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2017-14494", }, { category: "external", summary: "RHBZ#1495412", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1495412", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2017-14494", url: "https://www.cve.org/CVERecord?id=CVE-2017-14494", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2017-14494", url: "https://nvd.nist.gov/vuln/detail/CVE-2017-14494", }, { category: "external", summary: "https://access.redhat.com/security/vulnerabilities/3199382", url: "https://access.redhat.com/security/vulnerabilities/3199382", }, { category: "external", summary: "https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html", url: "https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html", }, ], release_date: "2017-10-02T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2017-10-02T16:19:55+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2017:2837", }, ], scores: [ { cvss_v2: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 7.8, confidentialityImpact: "COMPLETE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:C/I:N/A:N", version: "2.0", }, cvss_v3: { attackComplexity: "LOW", attackVector: "ADJACENT_NETWORK", availabilityImpact: "NONE", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.0", }, products: [ "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", ], }, ], threats: [ { category: "impact", details: "Important", }, ], title: "dnsmasq: information leak in the DHCPv6 relay code", }, ], }
rhsa-2017:2837
Vulnerability from csaf_redhat
Notes
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Critical", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "An update for dnsmasq is now available for Red Hat Enterprise Linux 7.2 Extended Update Support and Red Hat Enterprise Linux 7.3 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", title: "Topic", }, { category: "general", text: "The dnsmasq packages contain Dnsmasq, a lightweight DNS (Domain Name Server) forwarder and DHCP (Dynamic Host Configuration Protocol) server.\n\nSecurity Fix(es):\n\n* A heap buffer overflow was found in dnsmasq in the code responsible for building DNS replies. An attacker could send crafted DNS packets to dnsmasq which would cause it to crash or, potentially, execute arbitrary code. (CVE-2017-14491)\n\n* A heap buffer overflow was discovered in dnsmasq in the IPv6 router advertisement (RA) handling code. An attacker on the local network segment could send crafted RAs to dnsmasq which would cause it to crash or, potentially, execute arbitrary code. This issue only affected configurations using one of these options: enable-ra, ra-only, slaac, ra-names, ra-advrouter, or ra-stateless. (CVE-2017-14492)\n\n* A stack buffer overflow was found in dnsmasq in the DHCPv6 code. An attacker on the local network could send a crafted DHCPv6 request to dnsmasq which would cause it to a crash or, potentially, execute arbitrary code. (CVE-2017-14493)\n\n* An information leak was found in dnsmasq in the DHCPv6 relay code. An attacker on the local network could send crafted DHCPv6 packets to dnsmasq causing it to forward the contents of process memory, potentially leaking sensitive data. (CVE-2017-14494)\n\nRed Hat would like to thank Felix Wilhelm (Google Security Team), Fermin J. Serna (Google Security Team), Gabriel Campana (Google Security Team), Kevin Hamacher (Google Security Team), and Ron Bowes (Google Security Team) for reporting these issues.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2017:2837", url: "https://access.redhat.com/errata/RHSA-2017:2837", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#critical", url: "https://access.redhat.com/security/updates/classification/#critical", }, { category: "external", summary: "https://access.redhat.com/security/vulnerabilities/3199382", url: "https://access.redhat.com/security/vulnerabilities/3199382", }, { category: "external", summary: "1495409", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1495409", }, { category: "external", summary: "1495410", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1495410", }, { category: "external", summary: "1495411", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1495411", }, { category: "external", summary: "1495412", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1495412", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2017/rhsa-2017_2837.json", }, ], title: "Red Hat Security Advisory: dnsmasq security update", tracking: { current_release_date: "2024-11-22T11:34:10+00:00", generator: { date: "2024-11-22T11:34:10+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.1", }, }, id: "RHSA-2017:2837", initial_release_date: "2017-10-02T16:19:55+00:00", revision_history: [ { date: "2017-10-02T16:19:55+00:00", number: "1", summary: "Initial version", }, { date: "2017-10-02T16:19:55+00:00", number: "2", summary: "Last updated version", }, { date: "2024-11-22T11:34:10+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux ComputeNode EUS (v. 7.2)", product: { name: "Red Hat Enterprise Linux ComputeNode EUS (v. 7.2)", product_id: "7ComputeNode-7.2.EUS", product_identification_helper: { cpe: "cpe:/o:redhat:rhel_eus:7.2::computenode", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)", product: { name: "Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)", product_id: "7ComputeNode-optional-7.2.EUS", product_identification_helper: { cpe: "cpe:/o:redhat:rhel_eus:7.2::computenode", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Server EUS (v. 7.2)", product: { name: "Red Hat Enterprise Linux Server EUS (v. 7.2)", product_id: "7Server-7.2.EUS", product_identification_helper: { cpe: "cpe:/o:redhat:rhel_eus:7.2::server", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Server Optional EUS (v. 7.2)", product: { name: "Red Hat Enterprise Linux Server Optional EUS (v. 7.2)", product_id: "7Server-optional-7.2.EUS", product_identification_helper: { cpe: "cpe:/o:redhat:rhel_eus:7.2::server", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", product: { name: "Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", product_id: "7ComputeNode-7.3.EUS", product_identification_helper: { cpe: "cpe:/o:redhat:rhel_eus:7.3::computenode", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", product: { name: "Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", product_id: "7ComputeNode-optional-7.3.EUS", product_identification_helper: { cpe: "cpe:/o:redhat:rhel_eus:7.3::computenode", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Server EUS (v. 7.3)", product: { name: "Red Hat Enterprise Linux Server EUS (v. 7.3)", product_id: "7Server-7.3.EUS", product_identification_helper: { cpe: "cpe:/o:redhat:rhel_eus:7.3::server", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", product: { name: "Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", product_id: "7Server-optional-7.3.EUS", product_identification_helper: { cpe: "cpe:/o:redhat:rhel_eus:7.3::server", }, }, }, ], category: "product_family", name: "Red Hat Enterprise Linux", }, { branches: [ { category: "product_version", name: "dnsmasq-0:2.66-14.el7_2.2.x86_64", product: { name: "dnsmasq-0:2.66-14.el7_2.2.x86_64", product_id: "dnsmasq-0:2.66-14.el7_2.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/dnsmasq@2.66-14.el7_2.2?arch=x86_64", }, }, }, { category: "product_version", name: "dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", product: { name: "dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", product_id: "dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/dnsmasq-debuginfo@2.66-14.el7_2.2?arch=x86_64", }, }, }, { category: "product_version", name: "dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", product: { name: "dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", product_id: "dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/dnsmasq-utils@2.66-14.el7_2.2?arch=x86_64", }, }, }, { category: "product_version", name: "dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", product: { name: "dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", product_id: "dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/dnsmasq-debuginfo@2.66-21.el7_3.2?arch=x86_64", }, }, }, { category: "product_version", name: "dnsmasq-0:2.66-21.el7_3.2.x86_64", product: { name: "dnsmasq-0:2.66-21.el7_3.2.x86_64", product_id: "dnsmasq-0:2.66-21.el7_3.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/dnsmasq@2.66-21.el7_3.2?arch=x86_64", }, }, }, { category: "product_version", name: "dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", product: { name: "dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", product_id: "dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/dnsmasq-utils@2.66-21.el7_3.2?arch=x86_64", }, }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_version", name: "dnsmasq-0:2.66-14.el7_2.2.src", product: { name: "dnsmasq-0:2.66-14.el7_2.2.src", product_id: "dnsmasq-0:2.66-14.el7_2.2.src", product_identification_helper: { purl: "pkg:rpm/redhat/dnsmasq@2.66-14.el7_2.2?arch=src", }, }, }, { category: "product_version", name: "dnsmasq-0:2.66-21.el7_3.2.src", product: { name: "dnsmasq-0:2.66-21.el7_3.2.src", product_id: "dnsmasq-0:2.66-21.el7_3.2.src", product_identification_helper: { purl: "pkg:rpm/redhat/dnsmasq@2.66-21.el7_3.2?arch=src", }, }, }, ], category: "architecture", name: "src", }, { branches: [ { category: "product_version", name: "dnsmasq-utils-0:2.66-14.el7_2.2.s390x", product: { name: "dnsmasq-utils-0:2.66-14.el7_2.2.s390x", product_id: "dnsmasq-utils-0:2.66-14.el7_2.2.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/dnsmasq-utils@2.66-14.el7_2.2?arch=s390x", }, }, }, { category: "product_version", name: "dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", product: { name: "dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", product_id: "dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/dnsmasq-debuginfo@2.66-14.el7_2.2?arch=s390x", }, }, }, { category: "product_version", name: "dnsmasq-0:2.66-14.el7_2.2.s390x", product: { name: "dnsmasq-0:2.66-14.el7_2.2.s390x", product_id: "dnsmasq-0:2.66-14.el7_2.2.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/dnsmasq@2.66-14.el7_2.2?arch=s390x", }, }, }, { category: "product_version", name: "dnsmasq-utils-0:2.66-21.el7_3.2.s390x", product: { name: "dnsmasq-utils-0:2.66-21.el7_3.2.s390x", product_id: "dnsmasq-utils-0:2.66-21.el7_3.2.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/dnsmasq-utils@2.66-21.el7_3.2?arch=s390x", }, }, }, { category: "product_version", name: "dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", product: { name: "dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", product_id: "dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/dnsmasq-debuginfo@2.66-21.el7_3.2?arch=s390x", }, }, }, { category: "product_version", name: "dnsmasq-0:2.66-21.el7_3.2.s390x", product: { name: "dnsmasq-0:2.66-21.el7_3.2.s390x", product_id: "dnsmasq-0:2.66-21.el7_3.2.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/dnsmasq@2.66-21.el7_3.2?arch=s390x", }, }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", product: { name: "dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", product_id: "dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", product_identification_helper: { purl: "pkg:rpm/redhat/dnsmasq-utils@2.66-14.el7_2.2?arch=ppc64", }, }, }, { category: "product_version", name: "dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", product: { name: "dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", product_id: "dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", product_identification_helper: { purl: "pkg:rpm/redhat/dnsmasq-debuginfo@2.66-14.el7_2.2?arch=ppc64", }, }, }, { category: "product_version", name: "dnsmasq-0:2.66-14.el7_2.2.ppc64", product: { name: "dnsmasq-0:2.66-14.el7_2.2.ppc64", product_id: "dnsmasq-0:2.66-14.el7_2.2.ppc64", product_identification_helper: { purl: "pkg:rpm/redhat/dnsmasq@2.66-14.el7_2.2?arch=ppc64", }, }, }, { category: "product_version", name: "dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", product: { name: "dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", product_id: "dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", product_identification_helper: { purl: "pkg:rpm/redhat/dnsmasq-utils@2.66-21.el7_3.2?arch=ppc64", }, }, }, { category: "product_version", name: "dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", product: { name: "dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", product_id: "dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", product_identification_helper: { purl: "pkg:rpm/redhat/dnsmasq-debuginfo@2.66-21.el7_3.2?arch=ppc64", }, }, }, { category: "product_version", name: "dnsmasq-0:2.66-21.el7_3.2.ppc64", product: { name: "dnsmasq-0:2.66-21.el7_3.2.ppc64", product_id: "dnsmasq-0:2.66-21.el7_3.2.ppc64", product_identification_helper: { purl: "pkg:rpm/redhat/dnsmasq@2.66-21.el7_3.2?arch=ppc64", }, }, }, ], category: "architecture", name: "ppc64", }, { branches: [ { category: "product_version", name: "dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", product: { name: "dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", product_id: "dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/dnsmasq-utils@2.66-14.el7_2.2?arch=ppc64le", }, }, }, { category: "product_version", name: "dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", product: { name: "dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", product_id: "dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/dnsmasq-debuginfo@2.66-14.el7_2.2?arch=ppc64le", }, }, }, { category: "product_version", name: "dnsmasq-0:2.66-14.el7_2.2.ppc64le", product: { name: "dnsmasq-0:2.66-14.el7_2.2.ppc64le", product_id: "dnsmasq-0:2.66-14.el7_2.2.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/dnsmasq@2.66-14.el7_2.2?arch=ppc64le", }, }, }, { category: "product_version", name: "dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", product: { name: "dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", product_id: "dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/dnsmasq-utils@2.66-21.el7_3.2?arch=ppc64le", }, }, }, { category: "product_version", name: "dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", product: { name: "dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", product_id: "dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/dnsmasq-debuginfo@2.66-21.el7_3.2?arch=ppc64le", }, }, }, { category: "product_version", name: "dnsmasq-0:2.66-21.el7_3.2.ppc64le", product: { name: "dnsmasq-0:2.66-21.el7_3.2.ppc64le", product_id: "dnsmasq-0:2.66-21.el7_3.2.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/dnsmasq@2.66-21.el7_3.2?arch=ppc64le", }, }, }, ], category: "architecture", name: "ppc64le", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.66-14.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.2)", product_id: "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", }, product_reference: "dnsmasq-0:2.66-14.el7_2.2.ppc64", relates_to_product_reference: "7ComputeNode-7.2.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.66-14.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.2)", product_id: "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", }, product_reference: "dnsmasq-0:2.66-14.el7_2.2.ppc64le", relates_to_product_reference: "7ComputeNode-7.2.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.66-14.el7_2.2.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.2)", product_id: "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", }, product_reference: "dnsmasq-0:2.66-14.el7_2.2.s390x", relates_to_product_reference: "7ComputeNode-7.2.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.66-14.el7_2.2.src as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.2)", product_id: "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", }, product_reference: "dnsmasq-0:2.66-14.el7_2.2.src", relates_to_product_reference: "7ComputeNode-7.2.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.66-14.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.2)", product_id: "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", }, product_reference: "dnsmasq-0:2.66-14.el7_2.2.x86_64", relates_to_product_reference: "7ComputeNode-7.2.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.2)", product_id: "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", }, product_reference: "dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", relates_to_product_reference: "7ComputeNode-7.2.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.2)", product_id: "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", }, product_reference: "dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", relates_to_product_reference: "7ComputeNode-7.2.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.2)", product_id: "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", }, product_reference: "dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", relates_to_product_reference: "7ComputeNode-7.2.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.2)", product_id: "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", }, product_reference: "dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", relates_to_product_reference: "7ComputeNode-7.2.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.66-14.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.2)", product_id: "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", }, product_reference: "dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", relates_to_product_reference: "7ComputeNode-7.2.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.2)", product_id: "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", }, product_reference: "dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", relates_to_product_reference: "7ComputeNode-7.2.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.66-14.el7_2.2.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.2)", product_id: "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", }, product_reference: "dnsmasq-utils-0:2.66-14.el7_2.2.s390x", relates_to_product_reference: "7ComputeNode-7.2.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.66-14.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.2)", product_id: "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", }, product_reference: "dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", relates_to_product_reference: "7ComputeNode-7.2.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.66-21.el7_3.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", product_id: "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", }, product_reference: "dnsmasq-0:2.66-21.el7_3.2.ppc64", relates_to_product_reference: "7ComputeNode-7.3.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.66-21.el7_3.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", product_id: "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", }, product_reference: "dnsmasq-0:2.66-21.el7_3.2.ppc64le", relates_to_product_reference: "7ComputeNode-7.3.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.66-21.el7_3.2.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", product_id: "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", }, product_reference: "dnsmasq-0:2.66-21.el7_3.2.s390x", relates_to_product_reference: "7ComputeNode-7.3.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.66-21.el7_3.2.src as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", product_id: "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", }, product_reference: "dnsmasq-0:2.66-21.el7_3.2.src", relates_to_product_reference: "7ComputeNode-7.3.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.66-21.el7_3.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", product_id: "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", }, product_reference: "dnsmasq-0:2.66-21.el7_3.2.x86_64", relates_to_product_reference: "7ComputeNode-7.3.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", product_id: "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", }, product_reference: "dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", relates_to_product_reference: "7ComputeNode-7.3.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", product_id: "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", }, product_reference: "dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", relates_to_product_reference: "7ComputeNode-7.3.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", product_id: "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", }, product_reference: "dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", relates_to_product_reference: "7ComputeNode-7.3.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", product_id: "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", }, product_reference: "dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", relates_to_product_reference: "7ComputeNode-7.3.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.66-21.el7_3.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", product_id: "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", }, product_reference: "dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", relates_to_product_reference: "7ComputeNode-7.3.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", product_id: "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", }, product_reference: "dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", relates_to_product_reference: "7ComputeNode-7.3.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.66-21.el7_3.2.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", product_id: "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", }, product_reference: "dnsmasq-utils-0:2.66-21.el7_3.2.s390x", relates_to_product_reference: "7ComputeNode-7.3.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.66-21.el7_3.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", product_id: "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", }, product_reference: "dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", relates_to_product_reference: "7ComputeNode-7.3.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.66-14.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)", product_id: "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", }, product_reference: "dnsmasq-0:2.66-14.el7_2.2.ppc64", relates_to_product_reference: "7ComputeNode-optional-7.2.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.66-14.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)", product_id: "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", }, product_reference: "dnsmasq-0:2.66-14.el7_2.2.ppc64le", relates_to_product_reference: "7ComputeNode-optional-7.2.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.66-14.el7_2.2.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)", product_id: "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", }, product_reference: "dnsmasq-0:2.66-14.el7_2.2.s390x", relates_to_product_reference: "7ComputeNode-optional-7.2.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.66-14.el7_2.2.src as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)", product_id: "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", }, product_reference: "dnsmasq-0:2.66-14.el7_2.2.src", relates_to_product_reference: "7ComputeNode-optional-7.2.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.66-14.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)", product_id: "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", }, product_reference: "dnsmasq-0:2.66-14.el7_2.2.x86_64", relates_to_product_reference: "7ComputeNode-optional-7.2.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)", product_id: "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", }, product_reference: "dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", relates_to_product_reference: "7ComputeNode-optional-7.2.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)", product_id: "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", }, product_reference: "dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", relates_to_product_reference: "7ComputeNode-optional-7.2.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)", product_id: "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", }, product_reference: "dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", relates_to_product_reference: "7ComputeNode-optional-7.2.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)", product_id: "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", }, product_reference: "dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", relates_to_product_reference: "7ComputeNode-optional-7.2.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.66-14.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)", product_id: "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", }, product_reference: "dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", relates_to_product_reference: "7ComputeNode-optional-7.2.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)", product_id: "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", }, product_reference: "dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", relates_to_product_reference: "7ComputeNode-optional-7.2.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.66-14.el7_2.2.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)", product_id: "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", }, product_reference: "dnsmasq-utils-0:2.66-14.el7_2.2.s390x", relates_to_product_reference: "7ComputeNode-optional-7.2.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.66-14.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)", product_id: "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", }, product_reference: "dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", relates_to_product_reference: "7ComputeNode-optional-7.2.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.66-21.el7_3.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", product_id: "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", }, product_reference: "dnsmasq-0:2.66-21.el7_3.2.ppc64", relates_to_product_reference: "7ComputeNode-optional-7.3.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.66-21.el7_3.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", product_id: "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", }, product_reference: "dnsmasq-0:2.66-21.el7_3.2.ppc64le", relates_to_product_reference: "7ComputeNode-optional-7.3.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.66-21.el7_3.2.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", product_id: "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", }, product_reference: "dnsmasq-0:2.66-21.el7_3.2.s390x", relates_to_product_reference: "7ComputeNode-optional-7.3.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.66-21.el7_3.2.src as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", product_id: "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", }, product_reference: "dnsmasq-0:2.66-21.el7_3.2.src", relates_to_product_reference: "7ComputeNode-optional-7.3.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.66-21.el7_3.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", product_id: "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", }, product_reference: "dnsmasq-0:2.66-21.el7_3.2.x86_64", relates_to_product_reference: "7ComputeNode-optional-7.3.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", product_id: "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", }, product_reference: "dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", relates_to_product_reference: "7ComputeNode-optional-7.3.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", product_id: "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", }, product_reference: "dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", relates_to_product_reference: "7ComputeNode-optional-7.3.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", product_id: "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", }, product_reference: "dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", relates_to_product_reference: "7ComputeNode-optional-7.3.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", product_id: "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", }, product_reference: "dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", relates_to_product_reference: "7ComputeNode-optional-7.3.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.66-21.el7_3.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", product_id: "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", }, product_reference: "dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", relates_to_product_reference: "7ComputeNode-optional-7.3.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", product_id: "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", }, product_reference: "dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", relates_to_product_reference: "7ComputeNode-optional-7.3.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.66-21.el7_3.2.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", product_id: "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", }, product_reference: "dnsmasq-utils-0:2.66-21.el7_3.2.s390x", relates_to_product_reference: "7ComputeNode-optional-7.3.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.66-21.el7_3.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", product_id: "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", }, product_reference: "dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", relates_to_product_reference: "7ComputeNode-optional-7.3.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.66-14.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)", product_id: "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", }, product_reference: "dnsmasq-0:2.66-14.el7_2.2.ppc64", relates_to_product_reference: "7Server-7.2.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.66-14.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)", product_id: "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", }, product_reference: "dnsmasq-0:2.66-14.el7_2.2.ppc64le", relates_to_product_reference: "7Server-7.2.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.66-14.el7_2.2.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)", product_id: "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", }, product_reference: "dnsmasq-0:2.66-14.el7_2.2.s390x", relates_to_product_reference: "7Server-7.2.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.66-14.el7_2.2.src as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)", product_id: "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", }, product_reference: "dnsmasq-0:2.66-14.el7_2.2.src", relates_to_product_reference: "7Server-7.2.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.66-14.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)", product_id: "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", }, product_reference: "dnsmasq-0:2.66-14.el7_2.2.x86_64", relates_to_product_reference: "7Server-7.2.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)", product_id: "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", }, product_reference: "dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", relates_to_product_reference: "7Server-7.2.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)", product_id: "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", }, product_reference: "dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", relates_to_product_reference: "7Server-7.2.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)", product_id: "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", }, product_reference: "dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", relates_to_product_reference: "7Server-7.2.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)", product_id: "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", }, product_reference: "dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", relates_to_product_reference: "7Server-7.2.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.66-14.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)", product_id: "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", }, product_reference: "dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", relates_to_product_reference: "7Server-7.2.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)", product_id: "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", }, product_reference: "dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", relates_to_product_reference: "7Server-7.2.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.66-14.el7_2.2.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)", product_id: "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", }, product_reference: "dnsmasq-utils-0:2.66-14.el7_2.2.s390x", relates_to_product_reference: "7Server-7.2.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.66-14.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)", product_id: "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", }, product_reference: "dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", relates_to_product_reference: "7Server-7.2.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.66-21.el7_3.2.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", product_id: "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", }, product_reference: "dnsmasq-0:2.66-21.el7_3.2.ppc64", relates_to_product_reference: "7Server-7.3.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.66-21.el7_3.2.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", product_id: "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", }, product_reference: "dnsmasq-0:2.66-21.el7_3.2.ppc64le", relates_to_product_reference: "7Server-7.3.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.66-21.el7_3.2.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", product_id: "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", }, product_reference: "dnsmasq-0:2.66-21.el7_3.2.s390x", relates_to_product_reference: "7Server-7.3.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.66-21.el7_3.2.src as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", product_id: "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", }, product_reference: "dnsmasq-0:2.66-21.el7_3.2.src", relates_to_product_reference: "7Server-7.3.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.66-21.el7_3.2.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", product_id: "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", }, product_reference: "dnsmasq-0:2.66-21.el7_3.2.x86_64", relates_to_product_reference: "7Server-7.3.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", product_id: "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", }, product_reference: "dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", relates_to_product_reference: "7Server-7.3.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", product_id: "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", }, product_reference: "dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", relates_to_product_reference: "7Server-7.3.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", product_id: "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", }, product_reference: "dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", relates_to_product_reference: "7Server-7.3.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", product_id: "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", }, product_reference: "dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", relates_to_product_reference: "7Server-7.3.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.66-21.el7_3.2.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", product_id: "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", }, product_reference: "dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", relates_to_product_reference: "7Server-7.3.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", product_id: "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", }, product_reference: "dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", relates_to_product_reference: "7Server-7.3.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.66-21.el7_3.2.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", product_id: "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", }, product_reference: "dnsmasq-utils-0:2.66-21.el7_3.2.s390x", relates_to_product_reference: "7Server-7.3.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.66-21.el7_3.2.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", product_id: "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", }, product_reference: "dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", relates_to_product_reference: "7Server-7.3.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.66-14.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)", product_id: "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", }, product_reference: "dnsmasq-0:2.66-14.el7_2.2.ppc64", relates_to_product_reference: "7Server-optional-7.2.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.66-14.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)", product_id: "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", }, product_reference: "dnsmasq-0:2.66-14.el7_2.2.ppc64le", relates_to_product_reference: "7Server-optional-7.2.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.66-14.el7_2.2.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)", product_id: "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", }, product_reference: "dnsmasq-0:2.66-14.el7_2.2.s390x", relates_to_product_reference: "7Server-optional-7.2.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.66-14.el7_2.2.src as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)", product_id: "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", }, product_reference: "dnsmasq-0:2.66-14.el7_2.2.src", relates_to_product_reference: "7Server-optional-7.2.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.66-14.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)", product_id: "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", }, product_reference: "dnsmasq-0:2.66-14.el7_2.2.x86_64", relates_to_product_reference: "7Server-optional-7.2.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)", product_id: "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", }, product_reference: "dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", relates_to_product_reference: "7Server-optional-7.2.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)", product_id: "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", }, product_reference: "dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", relates_to_product_reference: "7Server-optional-7.2.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)", product_id: "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", }, product_reference: "dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", relates_to_product_reference: "7Server-optional-7.2.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)", product_id: "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", }, product_reference: "dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", relates_to_product_reference: "7Server-optional-7.2.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.66-14.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)", product_id: "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", }, product_reference: "dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", relates_to_product_reference: "7Server-optional-7.2.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)", product_id: "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", }, product_reference: "dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", relates_to_product_reference: "7Server-optional-7.2.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.66-14.el7_2.2.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)", product_id: "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", }, product_reference: "dnsmasq-utils-0:2.66-14.el7_2.2.s390x", relates_to_product_reference: "7Server-optional-7.2.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.66-14.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)", product_id: "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", }, product_reference: "dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", relates_to_product_reference: "7Server-optional-7.2.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.66-21.el7_3.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", product_id: "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", }, product_reference: "dnsmasq-0:2.66-21.el7_3.2.ppc64", relates_to_product_reference: "7Server-optional-7.3.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.66-21.el7_3.2.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", product_id: "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", }, product_reference: "dnsmasq-0:2.66-21.el7_3.2.ppc64le", relates_to_product_reference: "7Server-optional-7.3.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.66-21.el7_3.2.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", product_id: "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", }, product_reference: "dnsmasq-0:2.66-21.el7_3.2.s390x", relates_to_product_reference: "7Server-optional-7.3.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.66-21.el7_3.2.src as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", product_id: "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", }, product_reference: "dnsmasq-0:2.66-21.el7_3.2.src", relates_to_product_reference: "7Server-optional-7.3.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.66-21.el7_3.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", product_id: "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", }, product_reference: "dnsmasq-0:2.66-21.el7_3.2.x86_64", relates_to_product_reference: "7Server-optional-7.3.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", product_id: "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", }, product_reference: "dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", relates_to_product_reference: "7Server-optional-7.3.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", product_id: "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", }, product_reference: "dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", relates_to_product_reference: "7Server-optional-7.3.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", product_id: "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", }, product_reference: "dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", relates_to_product_reference: "7Server-optional-7.3.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", product_id: "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", }, product_reference: "dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", relates_to_product_reference: "7Server-optional-7.3.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.66-21.el7_3.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", product_id: "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", }, product_reference: "dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", relates_to_product_reference: "7Server-optional-7.3.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", product_id: "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", }, product_reference: "dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", relates_to_product_reference: "7Server-optional-7.3.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.66-21.el7_3.2.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", product_id: "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", }, product_reference: "dnsmasq-utils-0:2.66-21.el7_3.2.s390x", relates_to_product_reference: "7Server-optional-7.3.EUS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.66-21.el7_3.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", product_id: "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", }, product_reference: "dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", relates_to_product_reference: "7Server-optional-7.3.EUS", }, ], }, vulnerabilities: [ { acknowledgments: [ { names: [ "Felix Wilhelm", "Fermin J. Serna", "Gabriel Campana", "Kevin Hamacher", "Ron Bowes", ], organization: "Google Security Team", }, ], cve: "CVE-2017-14491", cwe: { id: "CWE-122", name: "Heap-based Buffer Overflow", }, discovery_date: "2017-09-25T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1495409", }, ], notes: [ { category: "description", text: "A heap buffer overflow was found in dnsmasq in the code responsible for building DNS replies. An attacker could send crafted DNS packets to dnsmasq which would cause it to crash or, potentially, execute arbitrary code.", title: "Vulnerability description", }, { category: "summary", text: "dnsmasq: heap overflow in the code responsible for building DNS replies", title: "Vulnerability summary", }, { category: "other", text: "Red Hat OpenStack Platform includes the dnsmasq-utils RPM which does not contain this flaw's affected code-paths; Red Hat OpenStack Platform is therefore listed as not affected.\n\nHowever, because all versions of Red Hat OpenStack Platform are based on Red Hat Enterprise Linux, all Red Hat OpenStack Platform users should absolutely upgrade the dnsmasq RPM from Red Hat Enterprise Linux as a matter of urgency using standard update mechanisms (such as 'yum update' or 'openstack overcloud update').", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2017-14491", }, { category: "external", summary: "RHBZ#1495409", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1495409", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2017-14491", url: "https://www.cve.org/CVERecord?id=CVE-2017-14491", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2017-14491", url: "https://nvd.nist.gov/vuln/detail/CVE-2017-14491", }, { category: "external", summary: "https://access.redhat.com/security/vulnerabilities/3199382", url: "https://access.redhat.com/security/vulnerabilities/3199382", }, { category: "external", summary: "https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html", url: "https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html", }, ], release_date: "2017-10-02T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2017-10-02T16:19:55+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2017:2837", }, ], scores: [ { cvss_v2: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 10, confidentialityImpact: "COMPLETE", integrityImpact: "COMPLETE", vectorString: "AV:N/AC:L/Au:N/C:C/I:C/A:C", version: "2.0", }, cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", ], }, ], threats: [ { category: "impact", details: "Critical", }, ], title: "dnsmasq: heap overflow in the code responsible for building DNS replies", }, { acknowledgments: [ { names: [ "Felix Wilhelm", "Fermin J. Serna", "Gabriel Campana", "Kevin Hamacher", "Ron Bowes", ], organization: "Google Security Team", }, ], cve: "CVE-2017-14492", cwe: { id: "CWE-122", name: "Heap-based Buffer Overflow", }, discovery_date: "2017-09-25T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1495410", }, ], notes: [ { category: "description", text: "A heap buffer overflow was discovered in dnsmasq in the IPv6 router advertisement (RA) handling code. An attacker on the local network segment could send crafted RAs to dnsmasq which would cause it to crash or, potentially, execute arbitrary code. This issue only affected configurations using one of these options: enable-ra, ra-only, slaac, ra-names, ra-advrouter, or ra-stateless.", title: "Vulnerability description", }, { category: "summary", text: "dnsmasq: heap overflow in the IPv6 router advertisement code", title: "Vulnerability summary", }, { category: "other", text: "Red Hat OpenStack Platform includes the dnsmasq-utils RPM which does not contain this flaw's affected code-paths; Red Hat OpenStack Platform is therefore listed as not affected.\n\nHowever, because all versions of Red Hat OpenStack Platform are based on Red Hat Enterprise Linux, all Red Hat OpenStack Platform users should absolutely upgrade the dnsmasq RPM from Red Hat Enterprise Linux as a matter of urgency using standard update mechanisms (such as 'yum update' or 'openstack overcloud update').", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2017-14492", }, { category: "external", summary: "RHBZ#1495410", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1495410", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2017-14492", url: "https://www.cve.org/CVERecord?id=CVE-2017-14492", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2017-14492", url: "https://nvd.nist.gov/vuln/detail/CVE-2017-14492", }, { category: "external", summary: "https://access.redhat.com/security/vulnerabilities/3199382", url: "https://access.redhat.com/security/vulnerabilities/3199382", }, { category: "external", summary: "https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html", url: "https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html", }, ], release_date: "2017-10-02T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2017-10-02T16:19:55+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2017:2837", }, ], scores: [ { cvss_v2: { accessComplexity: "LOW", accessVector: "ADJACENT_NETWORK", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 8.3, confidentialityImpact: "COMPLETE", integrityImpact: "COMPLETE", vectorString: "AV:A/AC:L/Au:N/C:C/I:C/A:C", version: "2.0", }, cvss_v3: { attackComplexity: "LOW", attackVector: "ADJACENT_NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", ], }, ], threats: [ { category: "impact", details: "Critical", }, ], title: "dnsmasq: heap overflow in the IPv6 router advertisement code", }, { acknowledgments: [ { names: [ "Felix Wilhelm", "Fermin J. Serna", "Gabriel Campana", "Kevin Hamacher", "Ron Bowes", ], organization: "Google Security Team", }, ], cve: "CVE-2017-14493", cwe: { id: "CWE-121", name: "Stack-based Buffer Overflow", }, discovery_date: "2017-09-25T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1495411", }, ], notes: [ { category: "description", text: "A stack buffer overflow was found in dnsmasq in the DHCPv6 code. An attacker on the local network could send a crafted DHCPv6 request to dnsmasq which would cause it to a crash or, potentially, execute arbitrary code.", title: "Vulnerability description", }, { category: "summary", text: "dnsmasq: stack buffer overflow in the DHCPv6 code", title: "Vulnerability summary", }, { category: "other", text: "Red Hat OpenStack Platform includes the dnsmasq-utils RPM which does not contain this flaw's affected code-paths; Red Hat OpenStack Platform is therefore listed as not affected.\n\nHowever, because all versions of Red Hat OpenStack Platform are based on Red Hat Enterprise Linux, all Red Hat OpenStack Platform users should absolutely upgrade the dnsmasq RPM from Red Hat Enterprise Linux as a matter of urgency using standard update mechanisms (such as 'yum update' or 'openstack overcloud update').", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2017-14493", }, { category: "external", summary: "RHBZ#1495411", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1495411", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2017-14493", url: "https://www.cve.org/CVERecord?id=CVE-2017-14493", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2017-14493", url: "https://nvd.nist.gov/vuln/detail/CVE-2017-14493", }, { category: "external", summary: "https://access.redhat.com/security/vulnerabilities/3199382", url: "https://access.redhat.com/security/vulnerabilities/3199382", }, { category: "external", summary: "https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html", url: "https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html", }, ], release_date: "2017-10-02T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2017-10-02T16:19:55+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2017:2837", }, ], scores: [ { cvss_v2: { accessComplexity: "LOW", accessVector: "ADJACENT_NETWORK", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 8.3, confidentialityImpact: "COMPLETE", integrityImpact: "COMPLETE", vectorString: "AV:A/AC:L/Au:N/C:C/I:C/A:C", version: "2.0", }, cvss_v3: { attackComplexity: "LOW", attackVector: "ADJACENT_NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", ], }, ], threats: [ { category: "impact", details: "Critical", }, ], title: "dnsmasq: stack buffer overflow in the DHCPv6 code", }, { acknowledgments: [ { names: [ "Felix Wilhelm", "Fermin J. Serna", "Gabriel Campana", "Kevin Hamacher", "Ron Bowes", ], organization: "Google Security Team", }, ], cve: "CVE-2017-14494", cwe: { id: "CWE-125", name: "Out-of-bounds Read", }, discovery_date: "2017-09-25T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1495412", }, ], notes: [ { category: "description", text: "An information leak was found in dnsmasq in the DHCPv6 relay code. An attacker on the local network could send crafted DHCPv6 packets to dnsmasq causing it to forward the contents of process memory, potentially leaking sensitive data.", title: "Vulnerability description", }, { category: "summary", text: "dnsmasq: information leak in the DHCPv6 relay code", title: "Vulnerability summary", }, { category: "other", text: "Red Hat OpenStack Platform includes the dnsmasq-utils RPM which does not contain this flaw's affected code-paths; Red Hat OpenStack Platform is therefore listed as not affected.\n\nHowever, because all versions of Red Hat OpenStack Platform are based on Red Hat Enterprise Linux, all Red Hat OpenStack Platform users should absolutely upgrade the dnsmasq RPM from Red Hat Enterprise Linux as a matter of urgency using standard update mechanisms (such as 'yum update' or 'openstack overcloud update').", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2017-14494", }, { category: "external", summary: "RHBZ#1495412", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1495412", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2017-14494", url: "https://www.cve.org/CVERecord?id=CVE-2017-14494", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2017-14494", url: "https://nvd.nist.gov/vuln/detail/CVE-2017-14494", }, { category: "external", summary: "https://access.redhat.com/security/vulnerabilities/3199382", url: "https://access.redhat.com/security/vulnerabilities/3199382", }, { category: "external", summary: "https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html", url: "https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html", }, ], release_date: "2017-10-02T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2017-10-02T16:19:55+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2017:2837", }, ], scores: [ { cvss_v2: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 7.8, confidentialityImpact: "COMPLETE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:C/I:N/A:N", version: "2.0", }, cvss_v3: { attackComplexity: "LOW", attackVector: "ADJACENT_NETWORK", availabilityImpact: "NONE", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.0", }, products: [ "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7ComputeNode-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7ComputeNode-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7ComputeNode-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7ComputeNode-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7ComputeNode-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7ComputeNode-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7ComputeNode-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7ComputeNode-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7ComputeNode-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7ComputeNode-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7ComputeNode-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7ComputeNode-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7Server-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7Server-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7Server-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7Server-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7Server-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7Server-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.ppc64le", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.s390x", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.src", "7Server-optional-7.2.EUS:dnsmasq-0:2.66-14.el7_2.2.x86_64", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.ppc64le", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.s390x", "7Server-optional-7.2.EUS:dnsmasq-debuginfo-0:2.66-14.el7_2.2.x86_64", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.ppc64le", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.s390x", "7Server-optional-7.2.EUS:dnsmasq-utils-0:2.66-14.el7_2.2.x86_64", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.ppc64le", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.s390x", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.src", "7Server-optional-7.3.EUS:dnsmasq-0:2.66-21.el7_3.2.x86_64", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.ppc64le", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.s390x", "7Server-optional-7.3.EUS:dnsmasq-debuginfo-0:2.66-21.el7_3.2.x86_64", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.ppc64le", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.s390x", "7Server-optional-7.3.EUS:dnsmasq-utils-0:2.66-21.el7_3.2.x86_64", ], }, ], threats: [ { category: "impact", details: "Important", }, ], title: "dnsmasq: information leak in the DHCPv6 relay code", }, ], }
rhsa-2017_2836
Vulnerability from csaf_redhat
Notes
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Critical", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "An update for dnsmasq is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", title: "Topic", }, { category: "general", text: "The dnsmasq packages contain Dnsmasq, a lightweight DNS (Domain Name Server) forwarder and DHCP (Dynamic Host Configuration Protocol) server.\n\nSecurity Fix(es):\n\n* A heap buffer overflow was found in dnsmasq in the code responsible for building DNS replies. An attacker could send crafted DNS packets to dnsmasq which would cause it to crash or, potentially, execute arbitrary code. (CVE-2017-14491)\n\n* A heap buffer overflow was discovered in dnsmasq in the IPv6 router advertisement (RA) handling code. An attacker on the local network segment could send crafted RAs to dnsmasq which would cause it to crash or, potentially, execute arbitrary code. This issue only affected configurations using one of these options: enable-ra, ra-only, slaac, ra-names, ra-advrouter, or ra-stateless. (CVE-2017-14492)\n\n* A stack buffer overflow was found in dnsmasq in the DHCPv6 code. An attacker on the local network could send a crafted DHCPv6 request to dnsmasq which would cause it to a crash or, potentially, execute arbitrary code. (CVE-2017-14493)\n\n* An information leak was found in dnsmasq in the DHCPv6 relay code. An attacker on the local network could send crafted DHCPv6 packets to dnsmasq causing it to forward the contents of process memory, potentially leaking sensitive data. (CVE-2017-14494)\n\n* A memory exhaustion flaw was found in dnsmasq in the EDNS0 code. An attacker could send crafted DNS packets which would trigger memory allocations which would never be freed, leading to unbounded memory consumption and eventually a crash. This issue only affected configurations using one of the options: add-mac, add-cpe-id, or add-subnet. (CVE-2017-14495)\n\n* An integer underflow flaw leading to a buffer over-read was found in dnsmasq in the EDNS0 code. An attacker could send crafted DNS packets to dnsmasq which would cause it to crash. This issue only affected configurations using one of the options: add-mac, add-cpe-id, or add-subnet. (CVE-2017-14496)\n\nRed Hat would like to thank Felix Wilhelm (Google Security Team), Fermin J. Serna (Google Security Team), Gabriel Campana (Google Security Team), Kevin Hamacher (Google Security Team), and Ron Bowes (Google Security Team) for reporting these issues.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2017:2836", url: "https://access.redhat.com/errata/RHSA-2017:2836", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#critical", url: "https://access.redhat.com/security/updates/classification/#critical", }, { category: "external", summary: "https://access.redhat.com/security/vulnerabilities/3199382", url: "https://access.redhat.com/security/vulnerabilities/3199382", }, { category: "external", summary: "1495409", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1495409", }, { category: "external", summary: "1495410", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1495410", }, { category: "external", summary: "1495411", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1495411", }, { category: "external", summary: "1495412", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1495412", }, { category: "external", summary: "1495415", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1495415", }, { category: "external", summary: "1495416", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1495416", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2017/rhsa-2017_2836.json", }, ], title: "Red Hat Security Advisory: dnsmasq security update", tracking: { current_release_date: "2024-11-22T11:34:05+00:00", generator: { date: "2024-11-22T11:34:05+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.1", }, }, id: "RHSA-2017:2836", initial_release_date: "2017-10-02T17:18:46+00:00", revision_history: [ { date: "2017-10-02T17:18:46+00:00", number: "1", summary: "Initial version", }, { date: "2017-10-02T17:18:46+00:00", number: "2", summary: "Last updated version", }, { date: "2024-11-22T11:34:05+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux Client (v. 7)", product: { name: "Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.4.Z", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:7::client", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Client Optional (v. 7)", product: { name: "Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.4.Z", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:7::client", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux ComputeNode (v. 7)", product: { name: "Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.4.Z", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:7::computenode", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product: { name: "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.4.Z", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:7::computenode", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Server (v. 7)", product: { name: "Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.4.Z", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:7::server", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Server Optional (v. 7)", product: { name: "Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.4.Z", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:7::server", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Workstation (v. 7)", product: { name: "Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.4.Z", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:7::workstation", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Workstation Optional (v. 7)", product: { name: "Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.4.Z", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:7::workstation", }, }, }, ], category: "product_family", name: "Red Hat Enterprise Linux", }, { branches: [ { category: "product_version", name: "dnsmasq-0:2.76-2.el7_4.2.x86_64", product: { name: "dnsmasq-0:2.76-2.el7_4.2.x86_64", product_id: "dnsmasq-0:2.76-2.el7_4.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/dnsmasq@2.76-2.el7_4.2?arch=x86_64", }, }, }, { category: "product_version", name: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", product: { name: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", product_id: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/dnsmasq-debuginfo@2.76-2.el7_4.2?arch=x86_64", }, }, }, { category: "product_version", name: "dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", product: { name: "dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", product_id: "dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/dnsmasq-utils@2.76-2.el7_4.2?arch=x86_64", }, }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_version", name: "dnsmasq-0:2.76-2.el7_4.2.src", product: { name: "dnsmasq-0:2.76-2.el7_4.2.src", product_id: "dnsmasq-0:2.76-2.el7_4.2.src", product_identification_helper: { purl: "pkg:rpm/redhat/dnsmasq@2.76-2.el7_4.2?arch=src", }, }, }, ], category: "architecture", name: "src", }, { branches: [ { category: "product_version", name: "dnsmasq-0:2.76-2.el7_4.2.ppc64le", product: { name: "dnsmasq-0:2.76-2.el7_4.2.ppc64le", product_id: "dnsmasq-0:2.76-2.el7_4.2.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/dnsmasq@2.76-2.el7_4.2?arch=ppc64le", }, }, }, { category: "product_version", name: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", product: { name: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", product_id: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/dnsmasq-debuginfo@2.76-2.el7_4.2?arch=ppc64le", }, }, }, { category: "product_version", name: "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", product: { name: "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", product_id: "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/dnsmasq-utils@2.76-2.el7_4.2?arch=ppc64le", }, }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "dnsmasq-0:2.76-2.el7_4.2.ppc64", product: { name: "dnsmasq-0:2.76-2.el7_4.2.ppc64", product_id: "dnsmasq-0:2.76-2.el7_4.2.ppc64", product_identification_helper: { purl: "pkg:rpm/redhat/dnsmasq@2.76-2.el7_4.2?arch=ppc64", }, }, }, { category: "product_version", name: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", product: { name: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", product_id: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", product_identification_helper: { purl: "pkg:rpm/redhat/dnsmasq-debuginfo@2.76-2.el7_4.2?arch=ppc64", }, }, }, { category: "product_version", name: "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", product: { name: "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", product_id: "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", product_identification_helper: { purl: "pkg:rpm/redhat/dnsmasq-utils@2.76-2.el7_4.2?arch=ppc64", }, }, }, ], category: "architecture", name: "ppc64", }, { branches: [ { category: "product_version", name: "dnsmasq-0:2.76-2.el7_4.2.s390x", product: { name: "dnsmasq-0:2.76-2.el7_4.2.s390x", product_id: "dnsmasq-0:2.76-2.el7_4.2.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/dnsmasq@2.76-2.el7_4.2?arch=s390x", }, }, }, { category: "product_version", name: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", product: { name: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", product_id: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/dnsmasq-debuginfo@2.76-2.el7_4.2?arch=s390x", }, }, }, { category: "product_version", name: "dnsmasq-utils-0:2.76-2.el7_4.2.s390x", product: { name: "dnsmasq-utils-0:2.76-2.el7_4.2.s390x", product_id: "dnsmasq-utils-0:2.76-2.el7_4.2.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/dnsmasq-utils@2.76-2.el7_4.2?arch=s390x", }, }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", product: { name: "dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", product_id: "dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/dnsmasq-utils@2.76-2.el7_4.2?arch=aarch64", }, }, }, { category: "product_version", name: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", product: { name: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", product_id: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/dnsmasq-debuginfo@2.76-2.el7_4.2?arch=aarch64", }, }, }, ], category: "architecture", name: "aarch64", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.76-2.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", }, product_reference: "dnsmasq-0:2.76-2.el7_4.2.ppc64", relates_to_product_reference: "7Client-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.76-2.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", }, product_reference: "dnsmasq-0:2.76-2.el7_4.2.ppc64le", relates_to_product_reference: "7Client-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.76-2.el7_4.2.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", }, product_reference: "dnsmasq-0:2.76-2.el7_4.2.s390x", relates_to_product_reference: "7Client-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.76-2.el7_4.2.src as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", }, product_reference: "dnsmasq-0:2.76-2.el7_4.2.src", relates_to_product_reference: "7Client-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.76-2.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", }, product_reference: "dnsmasq-0:2.76-2.el7_4.2.x86_64", relates_to_product_reference: "7Client-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", }, product_reference: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", relates_to_product_reference: "7Client-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", }, product_reference: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", relates_to_product_reference: "7Client-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", }, product_reference: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", relates_to_product_reference: "7Client-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", }, product_reference: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", relates_to_product_reference: "7Client-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", }, product_reference: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", relates_to_product_reference: "7Client-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.76-2.el7_4.2.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", }, product_reference: "dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", relates_to_product_reference: "7Client-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", }, product_reference: "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", relates_to_product_reference: "7Client-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", }, product_reference: "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", relates_to_product_reference: "7Client-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.76-2.el7_4.2.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", }, product_reference: "dnsmasq-utils-0:2.76-2.el7_4.2.s390x", relates_to_product_reference: "7Client-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.76-2.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", }, product_reference: "dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", relates_to_product_reference: "7Client-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.76-2.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", }, product_reference: "dnsmasq-0:2.76-2.el7_4.2.ppc64", relates_to_product_reference: "7Client-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.76-2.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", }, product_reference: "dnsmasq-0:2.76-2.el7_4.2.ppc64le", relates_to_product_reference: "7Client-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.76-2.el7_4.2.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", }, product_reference: "dnsmasq-0:2.76-2.el7_4.2.s390x", relates_to_product_reference: "7Client-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.76-2.el7_4.2.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", }, product_reference: "dnsmasq-0:2.76-2.el7_4.2.src", relates_to_product_reference: "7Client-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.76-2.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", }, product_reference: "dnsmasq-0:2.76-2.el7_4.2.x86_64", relates_to_product_reference: "7Client-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", }, product_reference: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", relates_to_product_reference: "7Client-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", }, product_reference: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", relates_to_product_reference: "7Client-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", }, product_reference: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", relates_to_product_reference: "7Client-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", }, product_reference: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", relates_to_product_reference: "7Client-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", }, product_reference: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", relates_to_product_reference: "7Client-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.76-2.el7_4.2.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", }, product_reference: "dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", relates_to_product_reference: "7Client-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", }, product_reference: "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", relates_to_product_reference: "7Client-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", }, product_reference: "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", relates_to_product_reference: "7Client-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.76-2.el7_4.2.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", }, product_reference: "dnsmasq-utils-0:2.76-2.el7_4.2.s390x", relates_to_product_reference: "7Client-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.76-2.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", }, product_reference: "dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", relates_to_product_reference: "7Client-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.76-2.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", }, product_reference: "dnsmasq-0:2.76-2.el7_4.2.ppc64", relates_to_product_reference: "7ComputeNode-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.76-2.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", }, product_reference: "dnsmasq-0:2.76-2.el7_4.2.ppc64le", relates_to_product_reference: "7ComputeNode-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.76-2.el7_4.2.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", }, product_reference: "dnsmasq-0:2.76-2.el7_4.2.s390x", relates_to_product_reference: "7ComputeNode-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.76-2.el7_4.2.src as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", }, product_reference: "dnsmasq-0:2.76-2.el7_4.2.src", relates_to_product_reference: "7ComputeNode-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.76-2.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", }, product_reference: "dnsmasq-0:2.76-2.el7_4.2.x86_64", relates_to_product_reference: "7ComputeNode-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", }, product_reference: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", relates_to_product_reference: "7ComputeNode-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", }, product_reference: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", relates_to_product_reference: "7ComputeNode-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", }, product_reference: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", relates_to_product_reference: "7ComputeNode-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", }, product_reference: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", relates_to_product_reference: "7ComputeNode-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", }, product_reference: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", relates_to_product_reference: "7ComputeNode-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.76-2.el7_4.2.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", }, product_reference: "dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", relates_to_product_reference: "7ComputeNode-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", }, product_reference: "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", relates_to_product_reference: "7ComputeNode-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", }, product_reference: "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", relates_to_product_reference: "7ComputeNode-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.76-2.el7_4.2.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", }, product_reference: "dnsmasq-utils-0:2.76-2.el7_4.2.s390x", relates_to_product_reference: "7ComputeNode-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.76-2.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", }, product_reference: "dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", relates_to_product_reference: "7ComputeNode-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.76-2.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", }, product_reference: "dnsmasq-0:2.76-2.el7_4.2.ppc64", relates_to_product_reference: "7ComputeNode-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.76-2.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", }, product_reference: "dnsmasq-0:2.76-2.el7_4.2.ppc64le", relates_to_product_reference: "7ComputeNode-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.76-2.el7_4.2.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", }, product_reference: "dnsmasq-0:2.76-2.el7_4.2.s390x", relates_to_product_reference: "7ComputeNode-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.76-2.el7_4.2.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", }, product_reference: "dnsmasq-0:2.76-2.el7_4.2.src", relates_to_product_reference: "7ComputeNode-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.76-2.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", }, product_reference: "dnsmasq-0:2.76-2.el7_4.2.x86_64", relates_to_product_reference: "7ComputeNode-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", }, product_reference: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", relates_to_product_reference: "7ComputeNode-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", }, product_reference: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", relates_to_product_reference: "7ComputeNode-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", }, product_reference: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", relates_to_product_reference: "7ComputeNode-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", }, product_reference: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", relates_to_product_reference: "7ComputeNode-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", }, product_reference: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", relates_to_product_reference: "7ComputeNode-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.76-2.el7_4.2.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", }, product_reference: "dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", relates_to_product_reference: "7ComputeNode-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", }, product_reference: "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", relates_to_product_reference: "7ComputeNode-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", }, product_reference: "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", relates_to_product_reference: "7ComputeNode-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.76-2.el7_4.2.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", }, product_reference: "dnsmasq-utils-0:2.76-2.el7_4.2.s390x", relates_to_product_reference: "7ComputeNode-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.76-2.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", }, product_reference: "dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", relates_to_product_reference: "7ComputeNode-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.76-2.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", }, product_reference: "dnsmasq-0:2.76-2.el7_4.2.ppc64", relates_to_product_reference: "7Server-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.76-2.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", }, product_reference: "dnsmasq-0:2.76-2.el7_4.2.ppc64le", relates_to_product_reference: "7Server-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.76-2.el7_4.2.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", }, product_reference: "dnsmasq-0:2.76-2.el7_4.2.s390x", relates_to_product_reference: "7Server-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.76-2.el7_4.2.src as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", }, product_reference: "dnsmasq-0:2.76-2.el7_4.2.src", relates_to_product_reference: "7Server-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.76-2.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", }, product_reference: "dnsmasq-0:2.76-2.el7_4.2.x86_64", relates_to_product_reference: "7Server-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", }, product_reference: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", relates_to_product_reference: "7Server-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", }, product_reference: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", relates_to_product_reference: "7Server-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", }, product_reference: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", relates_to_product_reference: "7Server-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", }, product_reference: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", relates_to_product_reference: "7Server-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", }, product_reference: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", relates_to_product_reference: "7Server-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.76-2.el7_4.2.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", }, product_reference: "dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", relates_to_product_reference: "7Server-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", }, product_reference: "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", relates_to_product_reference: "7Server-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", }, product_reference: "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", relates_to_product_reference: "7Server-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.76-2.el7_4.2.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", }, product_reference: "dnsmasq-utils-0:2.76-2.el7_4.2.s390x", relates_to_product_reference: "7Server-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.76-2.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", }, product_reference: "dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", relates_to_product_reference: "7Server-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.76-2.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", }, product_reference: "dnsmasq-0:2.76-2.el7_4.2.ppc64", relates_to_product_reference: "7Server-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.76-2.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", }, product_reference: "dnsmasq-0:2.76-2.el7_4.2.ppc64le", relates_to_product_reference: "7Server-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.76-2.el7_4.2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", }, product_reference: "dnsmasq-0:2.76-2.el7_4.2.s390x", relates_to_product_reference: "7Server-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.76-2.el7_4.2.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", }, product_reference: "dnsmasq-0:2.76-2.el7_4.2.src", relates_to_product_reference: "7Server-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.76-2.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", }, product_reference: "dnsmasq-0:2.76-2.el7_4.2.x86_64", relates_to_product_reference: "7Server-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", }, product_reference: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", relates_to_product_reference: "7Server-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", }, product_reference: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", relates_to_product_reference: "7Server-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", }, product_reference: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", relates_to_product_reference: "7Server-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", }, product_reference: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", relates_to_product_reference: "7Server-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", }, product_reference: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", relates_to_product_reference: "7Server-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.76-2.el7_4.2.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", }, product_reference: "dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", relates_to_product_reference: "7Server-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", }, product_reference: "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", relates_to_product_reference: "7Server-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", }, product_reference: "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", relates_to_product_reference: "7Server-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.76-2.el7_4.2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", }, product_reference: "dnsmasq-utils-0:2.76-2.el7_4.2.s390x", relates_to_product_reference: "7Server-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.76-2.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", }, product_reference: "dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", relates_to_product_reference: "7Server-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.76-2.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", }, product_reference: "dnsmasq-0:2.76-2.el7_4.2.ppc64", relates_to_product_reference: "7Workstation-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.76-2.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", }, product_reference: "dnsmasq-0:2.76-2.el7_4.2.ppc64le", relates_to_product_reference: "7Workstation-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.76-2.el7_4.2.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", }, product_reference: "dnsmasq-0:2.76-2.el7_4.2.s390x", relates_to_product_reference: "7Workstation-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.76-2.el7_4.2.src as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", }, product_reference: "dnsmasq-0:2.76-2.el7_4.2.src", relates_to_product_reference: "7Workstation-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.76-2.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", }, product_reference: "dnsmasq-0:2.76-2.el7_4.2.x86_64", relates_to_product_reference: "7Workstation-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", }, product_reference: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", relates_to_product_reference: "7Workstation-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", }, product_reference: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", relates_to_product_reference: "7Workstation-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", }, product_reference: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", relates_to_product_reference: "7Workstation-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", }, product_reference: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", relates_to_product_reference: "7Workstation-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", }, product_reference: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", relates_to_product_reference: "7Workstation-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.76-2.el7_4.2.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", }, product_reference: "dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", relates_to_product_reference: "7Workstation-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", }, product_reference: "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", relates_to_product_reference: "7Workstation-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", }, product_reference: "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", relates_to_product_reference: "7Workstation-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.76-2.el7_4.2.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", }, product_reference: "dnsmasq-utils-0:2.76-2.el7_4.2.s390x", relates_to_product_reference: "7Workstation-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.76-2.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", }, product_reference: "dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", relates_to_product_reference: "7Workstation-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.76-2.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", }, product_reference: "dnsmasq-0:2.76-2.el7_4.2.ppc64", relates_to_product_reference: "7Workstation-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.76-2.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", }, product_reference: "dnsmasq-0:2.76-2.el7_4.2.ppc64le", relates_to_product_reference: "7Workstation-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.76-2.el7_4.2.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", }, product_reference: "dnsmasq-0:2.76-2.el7_4.2.s390x", relates_to_product_reference: "7Workstation-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.76-2.el7_4.2.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", }, product_reference: "dnsmasq-0:2.76-2.el7_4.2.src", relates_to_product_reference: "7Workstation-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-0:2.76-2.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", }, product_reference: "dnsmasq-0:2.76-2.el7_4.2.x86_64", relates_to_product_reference: "7Workstation-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", }, product_reference: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", relates_to_product_reference: "7Workstation-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", }, product_reference: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", relates_to_product_reference: "7Workstation-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", }, product_reference: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", relates_to_product_reference: "7Workstation-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", }, product_reference: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", relates_to_product_reference: "7Workstation-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", }, product_reference: "dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", relates_to_product_reference: "7Workstation-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.76-2.el7_4.2.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", }, product_reference: "dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", relates_to_product_reference: "7Workstation-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", }, product_reference: "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", relates_to_product_reference: "7Workstation-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", }, product_reference: "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", relates_to_product_reference: "7Workstation-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.76-2.el7_4.2.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", }, product_reference: "dnsmasq-utils-0:2.76-2.el7_4.2.s390x", relates_to_product_reference: "7Workstation-optional-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-0:2.76-2.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", }, product_reference: "dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", relates_to_product_reference: "7Workstation-optional-7.4.Z", }, ], }, vulnerabilities: [ { acknowledgments: [ { names: [ "Felix Wilhelm", "Fermin J. Serna", "Gabriel Campana", "Kevin Hamacher", "Ron Bowes", ], organization: "Google Security Team", }, ], cve: "CVE-2017-14491", cwe: { id: "CWE-122", name: "Heap-based Buffer Overflow", }, discovery_date: "2017-09-25T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1495409", }, ], notes: [ { category: "description", text: "A heap buffer overflow was found in dnsmasq in the code responsible for building DNS replies. An attacker could send crafted DNS packets to dnsmasq which would cause it to crash or, potentially, execute arbitrary code.", title: "Vulnerability description", }, { category: "summary", text: "dnsmasq: heap overflow in the code responsible for building DNS replies", title: "Vulnerability summary", }, { category: "other", text: "Red Hat OpenStack Platform includes the dnsmasq-utils RPM which does not contain this flaw's affected code-paths; Red Hat OpenStack Platform is therefore listed as not affected.\n\nHowever, because all versions of Red Hat OpenStack Platform are based on Red Hat Enterprise Linux, all Red Hat OpenStack Platform users should absolutely upgrade the dnsmasq RPM from Red Hat Enterprise Linux as a matter of urgency using standard update mechanisms (such as 'yum update' or 'openstack overcloud update').", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2017-14491", }, { category: "external", summary: "RHBZ#1495409", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1495409", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2017-14491", url: "https://www.cve.org/CVERecord?id=CVE-2017-14491", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2017-14491", url: "https://nvd.nist.gov/vuln/detail/CVE-2017-14491", }, { category: "external", summary: "https://access.redhat.com/security/vulnerabilities/3199382", url: "https://access.redhat.com/security/vulnerabilities/3199382", }, { category: "external", summary: "https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html", url: "https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html", }, ], release_date: "2017-10-02T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2017-10-02T17:18:46+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2017:2836", }, ], scores: [ { cvss_v2: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 10, confidentialityImpact: "COMPLETE", integrityImpact: "COMPLETE", vectorString: "AV:N/AC:L/Au:N/C:C/I:C/A:C", version: "2.0", }, cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", ], }, ], threats: [ { category: "impact", details: "Critical", }, ], title: "dnsmasq: heap overflow in the code responsible for building DNS replies", }, { acknowledgments: [ { names: [ "Felix Wilhelm", "Fermin J. Serna", "Gabriel Campana", "Kevin Hamacher", "Ron Bowes", ], organization: "Google Security Team", }, ], cve: "CVE-2017-14492", cwe: { id: "CWE-122", name: "Heap-based Buffer Overflow", }, discovery_date: "2017-09-25T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1495410", }, ], notes: [ { category: "description", text: "A heap buffer overflow was discovered in dnsmasq in the IPv6 router advertisement (RA) handling code. An attacker on the local network segment could send crafted RAs to dnsmasq which would cause it to crash or, potentially, execute arbitrary code. This issue only affected configurations using one of these options: enable-ra, ra-only, slaac, ra-names, ra-advrouter, or ra-stateless.", title: "Vulnerability description", }, { category: "summary", text: "dnsmasq: heap overflow in the IPv6 router advertisement code", title: "Vulnerability summary", }, { category: "other", text: "Red Hat OpenStack Platform includes the dnsmasq-utils RPM which does not contain this flaw's affected code-paths; Red Hat OpenStack Platform is therefore listed as not affected.\n\nHowever, because all versions of Red Hat OpenStack Platform are based on Red Hat Enterprise Linux, all Red Hat OpenStack Platform users should absolutely upgrade the dnsmasq RPM from Red Hat Enterprise Linux as a matter of urgency using standard update mechanisms (such as 'yum update' or 'openstack overcloud update').", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2017-14492", }, { category: "external", summary: "RHBZ#1495410", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1495410", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2017-14492", url: "https://www.cve.org/CVERecord?id=CVE-2017-14492", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2017-14492", url: "https://nvd.nist.gov/vuln/detail/CVE-2017-14492", }, { category: "external", summary: "https://access.redhat.com/security/vulnerabilities/3199382", url: "https://access.redhat.com/security/vulnerabilities/3199382", }, { category: "external", summary: "https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html", url: "https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html", }, ], release_date: "2017-10-02T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2017-10-02T17:18:46+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2017:2836", }, ], scores: [ { cvss_v2: { accessComplexity: "LOW", accessVector: "ADJACENT_NETWORK", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 8.3, confidentialityImpact: "COMPLETE", integrityImpact: "COMPLETE", vectorString: "AV:A/AC:L/Au:N/C:C/I:C/A:C", version: "2.0", }, cvss_v3: { attackComplexity: "LOW", attackVector: "ADJACENT_NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", ], }, ], threats: [ { category: "impact", details: "Critical", }, ], title: "dnsmasq: heap overflow in the IPv6 router advertisement code", }, { acknowledgments: [ { names: [ "Felix Wilhelm", "Fermin J. Serna", "Gabriel Campana", "Kevin Hamacher", "Ron Bowes", ], organization: "Google Security Team", }, ], cve: "CVE-2017-14493", cwe: { id: "CWE-121", name: "Stack-based Buffer Overflow", }, discovery_date: "2017-09-25T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1495411", }, ], notes: [ { category: "description", text: "A stack buffer overflow was found in dnsmasq in the DHCPv6 code. An attacker on the local network could send a crafted DHCPv6 request to dnsmasq which would cause it to a crash or, potentially, execute arbitrary code.", title: "Vulnerability description", }, { category: "summary", text: "dnsmasq: stack buffer overflow in the DHCPv6 code", title: "Vulnerability summary", }, { category: "other", text: "Red Hat OpenStack Platform includes the dnsmasq-utils RPM which does not contain this flaw's affected code-paths; Red Hat OpenStack Platform is therefore listed as not affected.\n\nHowever, because all versions of Red Hat OpenStack Platform are based on Red Hat Enterprise Linux, all Red Hat OpenStack Platform users should absolutely upgrade the dnsmasq RPM from Red Hat Enterprise Linux as a matter of urgency using standard update mechanisms (such as 'yum update' or 'openstack overcloud update').", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2017-14493", }, { category: "external", summary: "RHBZ#1495411", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1495411", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2017-14493", url: "https://www.cve.org/CVERecord?id=CVE-2017-14493", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2017-14493", url: "https://nvd.nist.gov/vuln/detail/CVE-2017-14493", }, { category: "external", summary: "https://access.redhat.com/security/vulnerabilities/3199382", url: "https://access.redhat.com/security/vulnerabilities/3199382", }, { category: "external", summary: "https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html", url: "https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html", }, ], release_date: "2017-10-02T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2017-10-02T17:18:46+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2017:2836", }, ], scores: [ { cvss_v2: { accessComplexity: "LOW", accessVector: "ADJACENT_NETWORK", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 8.3, confidentialityImpact: "COMPLETE", integrityImpact: "COMPLETE", vectorString: "AV:A/AC:L/Au:N/C:C/I:C/A:C", version: "2.0", }, cvss_v3: { attackComplexity: "LOW", attackVector: "ADJACENT_NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", ], }, ], threats: [ { category: "impact", details: "Critical", }, ], title: "dnsmasq: stack buffer overflow in the DHCPv6 code", }, { acknowledgments: [ { names: [ "Felix Wilhelm", "Fermin J. Serna", "Gabriel Campana", "Kevin Hamacher", "Ron Bowes", ], organization: "Google Security Team", }, ], cve: "CVE-2017-14494", cwe: { id: "CWE-125", name: "Out-of-bounds Read", }, discovery_date: "2017-09-25T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1495412", }, ], notes: [ { category: "description", text: "An information leak was found in dnsmasq in the DHCPv6 relay code. An attacker on the local network could send crafted DHCPv6 packets to dnsmasq causing it to forward the contents of process memory, potentially leaking sensitive data.", title: "Vulnerability description", }, { category: "summary", text: "dnsmasq: information leak in the DHCPv6 relay code", title: "Vulnerability summary", }, { category: "other", text: "Red Hat OpenStack Platform includes the dnsmasq-utils RPM which does not contain this flaw's affected code-paths; Red Hat OpenStack Platform is therefore listed as not affected.\n\nHowever, because all versions of Red Hat OpenStack Platform are based on Red Hat Enterprise Linux, all Red Hat OpenStack Platform users should absolutely upgrade the dnsmasq RPM from Red Hat Enterprise Linux as a matter of urgency using standard update mechanisms (such as 'yum update' or 'openstack overcloud update').", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2017-14494", }, { category: "external", summary: "RHBZ#1495412", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1495412", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2017-14494", url: "https://www.cve.org/CVERecord?id=CVE-2017-14494", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2017-14494", url: "https://nvd.nist.gov/vuln/detail/CVE-2017-14494", }, { category: "external", summary: "https://access.redhat.com/security/vulnerabilities/3199382", url: "https://access.redhat.com/security/vulnerabilities/3199382", }, { category: "external", summary: "https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html", url: "https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html", }, ], release_date: "2017-10-02T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2017-10-02T17:18:46+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2017:2836", }, ], scores: [ { cvss_v2: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 7.8, confidentialityImpact: "COMPLETE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:C/I:N/A:N", version: "2.0", }, cvss_v3: { attackComplexity: "LOW", attackVector: "ADJACENT_NETWORK", availabilityImpact: "NONE", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.0", }, products: [ "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", ], }, ], threats: [ { category: "impact", details: "Important", }, ], title: "dnsmasq: information leak in the DHCPv6 relay code", }, { acknowledgments: [ { names: [ "Felix Wilhelm", "Fermin J. Serna", "Gabriel Campana", "Kevin Hamacher", "Ron Bowes", ], organization: "Google Security Team", }, ], cve: "CVE-2017-14495", cwe: { id: "CWE-400", name: "Uncontrolled Resource Consumption", }, discovery_date: "2017-09-25T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1495415", }, ], notes: [ { category: "description", text: "A memory exhaustion flaw was found in dnsmasq in the EDNS0 code. An attacker could send crafted DNS packets which would trigger memory allocations which would never be freed, leading to unbounded memory consumption and eventually a crash. This issue only affected configurations using one of the options: add-mac, add-cpe-id, or add-subnet.", title: "Vulnerability description", }, { category: "summary", text: "dnsmasq: memory exhaustion vulnerability in the EDNS0 code", title: "Vulnerability summary", }, { category: "other", text: "Red Hat OpenStack Platform includes the dnsmasq-utils RPM which does not contain this flaw's affected code-paths; Red Hat OpenStack Platform is therefore listed as not affected.\n\nHowever, because all versions of Red Hat OpenStack Platform are based on Red Hat Enterprise Linux, all Red Hat OpenStack Platform users should absolutely upgrade the dnsmasq RPM from Red Hat Enterprise Linux as a matter of urgency using standard update mechanisms (such as 'yum update' or 'openstack overcloud update').", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2017-14495", }, { category: "external", summary: "RHBZ#1495415", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1495415", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2017-14495", url: "https://www.cve.org/CVERecord?id=CVE-2017-14495", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2017-14495", url: "https://nvd.nist.gov/vuln/detail/CVE-2017-14495", }, { category: "external", summary: "https://access.redhat.com/security/vulnerabilities/3199382", url: "https://access.redhat.com/security/vulnerabilities/3199382", }, { category: "external", summary: "https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html", url: "https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html", }, ], release_date: "2017-10-02T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2017-10-02T17:18:46+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2017:2836", }, ], scores: [ { cvss_v2: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 7.8, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:C", version: "2.0", }, cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", ], }, ], threats: [ { category: "impact", details: "Important", }, ], title: "dnsmasq: memory exhaustion vulnerability in the EDNS0 code", }, { acknowledgments: [ { names: [ "Felix Wilhelm", "Fermin J. Serna", "Gabriel Campana", "Kevin Hamacher", "Ron Bowes", ], organization: "Google Security Team", }, ], cve: "CVE-2017-14496", cwe: { id: "CWE-125", name: "Out-of-bounds Read", }, discovery_date: "2017-09-25T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1495416", }, ], notes: [ { category: "description", text: "An integer underflow flaw leading to a buffer over-read was found in dnsmasq in the EDNS0 code. An attacker could send crafted DNS packets to dnsmasq which would cause it to crash. This issue only affected configurations using one of the options: add-mac, add-cpe-id, or add-subnet.", title: "Vulnerability description", }, { category: "summary", text: "dnsmasq: integer underflow leading to buffer over-read in the EDNS0 code", title: "Vulnerability summary", }, { category: "other", text: "Red Hat OpenStack Platform includes the dnsmasq-utils RPM which does not contain this flaw's affected code-paths; Red Hat OpenStack Platform is therefore listed as not affected.\n\nHowever, because all versions of Red Hat OpenStack Platform are based on Red Hat Enterprise Linux, all Red Hat OpenStack Platform users should absolutely upgrade the dnsmasq RPM from Red Hat Enterprise Linux as a matter of urgency using standard update mechanisms (such as 'yum update' or 'openstack overcloud update').", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2017-14496", }, { category: "external", summary: "RHBZ#1495416", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1495416", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2017-14496", url: "https://www.cve.org/CVERecord?id=CVE-2017-14496", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2017-14496", url: "https://nvd.nist.gov/vuln/detail/CVE-2017-14496", }, { category: "external", summary: "https://access.redhat.com/security/vulnerabilities/3199382", url: "https://access.redhat.com/security/vulnerabilities/3199382", }, { category: "external", summary: "https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html", url: "https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html", }, ], release_date: "2017-10-02T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2017-10-02T17:18:46+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2017:2836", }, ], scores: [ { cvss_v2: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 7.8, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:C", version: "2.0", }, cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", ], }, ], threats: [ { category: "impact", details: "Important", }, ], title: "dnsmasq: integer underflow leading to buffer over-read in the EDNS0 code", }, ], }
suse-su-2017:2619-1
Vulnerability from csaf_suse
Notes
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for dnsmasq", title: "Title of the patch", }, { category: "description", text: "This update for dnsmasq fixes the following security issues:\n\n- CVE-2017-14491: 2 byte heap based overflow. [bsc#1060354]\n- CVE-2017-14492: heap based overflow. [bsc#1060355]\n- CVE-2017-14493: stack based overflow. [bsc#1060360]\n- CVE-2017-14494: DHCP - info leak. [bsc#1060361]\n- CVE-2017-14495: DNS - OOM DoS. [bsc#1060362]\n- CVE-2017-14496: DNS - DoS Integer underflow. [bsc#1060364]\n\nThis update brings a (small) potential incompatibility in the handling of\n'basename' in --pxe-service. Please read the CHANGELOG and the documentation if\nyou are using this option.\n", title: "Description of the patch", }, { category: "details", text: "slessp4-dnsmasq-13294", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2017_2619-1.json", }, { category: "self", summary: "URL for SUSE-SU-2017:2619-1", url: "https://www.suse.com/support/update/announcement/2017/suse-su-20172619-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2017:2619-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2017-October/003271.html", }, { category: "self", summary: "SUSE Bug 1060354", url: "https://bugzilla.suse.com/1060354", }, { category: "self", summary: "SUSE Bug 1060355", url: "https://bugzilla.suse.com/1060355", }, { category: "self", summary: "SUSE Bug 1060360", url: "https://bugzilla.suse.com/1060360", }, { category: "self", summary: "SUSE Bug 1060361", url: "https://bugzilla.suse.com/1060361", }, { category: "self", summary: "SUSE Bug 1060362", url: "https://bugzilla.suse.com/1060362", }, { category: "self", summary: "SUSE Bug 1060364", url: "https://bugzilla.suse.com/1060364", }, { category: "self", summary: "SUSE CVE CVE-2015-3294 page", url: "https://www.suse.com/security/cve/CVE-2015-3294/", }, { category: "self", summary: "SUSE CVE CVE-2015-8899 page", url: "https://www.suse.com/security/cve/CVE-2015-8899/", }, { category: "self", summary: "SUSE CVE CVE-2017-14491 page", url: "https://www.suse.com/security/cve/CVE-2017-14491/", }, { category: "self", summary: "SUSE CVE CVE-2017-14492 page", url: "https://www.suse.com/security/cve/CVE-2017-14492/", }, { category: "self", summary: "SUSE CVE CVE-2017-14493 page", url: "https://www.suse.com/security/cve/CVE-2017-14493/", }, { category: "self", summary: "SUSE CVE CVE-2017-14494 page", url: "https://www.suse.com/security/cve/CVE-2017-14494/", }, { category: "self", summary: "SUSE CVE CVE-2017-14495 page", url: "https://www.suse.com/security/cve/CVE-2017-14495/", }, { category: "self", summary: "SUSE CVE CVE-2017-14496 page", url: "https://www.suse.com/security/cve/CVE-2017-14496/", }, ], title: "Security update for dnsmasq", tracking: { current_release_date: "2017-10-02T13:51:46Z", generator: { date: "2017-10-02T13:51:46Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2017:2619-1", initial_release_date: "2017-10-02T13:51:46Z", revision_history: [ { date: "2017-10-02T13:51:46Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "dnsmasq-2.78-0.17.5.1.i586", product: { name: "dnsmasq-2.78-0.17.5.1.i586", product_id: "dnsmasq-2.78-0.17.5.1.i586", }, }, ], category: "architecture", name: "i586", }, { branches: [ { category: "product_version", name: "dnsmasq-2.78-0.17.5.1.ia64", product: { name: "dnsmasq-2.78-0.17.5.1.ia64", product_id: "dnsmasq-2.78-0.17.5.1.ia64", }, }, ], category: "architecture", name: "ia64", }, { branches: [ { category: "product_version", name: "dnsmasq-2.78-0.17.5.1.ppc64", product: { name: "dnsmasq-2.78-0.17.5.1.ppc64", product_id: "dnsmasq-2.78-0.17.5.1.ppc64", }, }, ], category: "architecture", name: "ppc64", }, { branches: [ { category: "product_version", name: "dnsmasq-2.78-0.17.5.1.s390x", product: { name: "dnsmasq-2.78-0.17.5.1.s390x", product_id: "dnsmasq-2.78-0.17.5.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "dnsmasq-2.78-0.17.5.1.x86_64", product: { name: "dnsmasq-2.78-0.17.5.1.x86_64", product_id: "dnsmasq-2.78-0.17.5.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Server 11 SP4", product: { name: "SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4", product_identification_helper: { cpe: "cpe:/o:suse:suse_sles:11:sp4", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", product: { name: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:11:sp4", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "dnsmasq-2.78-0.17.5.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.i586", }, product_reference: "dnsmasq-2.78-0.17.5.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-2.78-0.17.5.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.ia64", }, product_reference: "dnsmasq-2.78-0.17.5.1.ia64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-2.78-0.17.5.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.ppc64", }, product_reference: "dnsmasq-2.78-0.17.5.1.ppc64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-2.78-0.17.5.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.s390x", }, product_reference: "dnsmasq-2.78-0.17.5.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-2.78-0.17.5.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.x86_64", }, product_reference: "dnsmasq-2.78-0.17.5.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-2.78-0.17.5.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.i586", }, product_reference: "dnsmasq-2.78-0.17.5.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-2.78-0.17.5.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.ia64", }, product_reference: "dnsmasq-2.78-0.17.5.1.ia64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-2.78-0.17.5.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.ppc64", }, product_reference: "dnsmasq-2.78-0.17.5.1.ppc64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-2.78-0.17.5.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.s390x", }, product_reference: "dnsmasq-2.78-0.17.5.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-2.78-0.17.5.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.x86_64", }, product_reference: "dnsmasq-2.78-0.17.5.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, ], }, vulnerabilities: [ { cve: "CVE-2015-3294", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-3294", }, ], notes: [ { category: "general", text: "The tcp_request function in Dnsmasq before 2.73rc4 does not properly handle the return value of the setup_reply function, which allows remote attackers to read process memory and cause a denial of service (out-of-bounds read and crash) via a malformed DNS request.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.i586", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.ia64", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.s390x", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-3294", url: "https://www.suse.com/security/cve/CVE-2015-3294", }, { category: "external", summary: "SUSE Bug 923144 for CVE-2015-3294", url: "https://bugzilla.suse.com/923144", }, { category: "external", summary: "SUSE Bug 928867 for CVE-2015-3294", url: "https://bugzilla.suse.com/928867", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.i586", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.ia64", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.s390x", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-02T13:51:46Z", details: "moderate", }, ], title: "CVE-2015-3294", }, { cve: "CVE-2015-8899", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-8899", }, ], notes: [ { category: "general", text: "Dnsmasq before 2.76 allows remote servers to cause a denial of service (crash) via a reply with an empty DNS address that has an (1) A or (2) AAAA record defined locally.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.i586", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.ia64", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.s390x", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-8899", url: "https://www.suse.com/security/cve/CVE-2015-8899", }, { category: "external", summary: "SUSE Bug 983273 for CVE-2015-8899", url: "https://bugzilla.suse.com/983273", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.i586", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.ia64", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.s390x", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-02T13:51:46Z", details: "moderate", }, ], title: "CVE-2015-8899", }, { cve: "CVE-2017-14491", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-14491", }, ], notes: [ { category: "general", text: "Heap-based buffer overflow in dnsmasq before 2.78 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted DNS response.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.i586", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.ia64", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.s390x", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-14491", url: "https://www.suse.com/security/cve/CVE-2017-14491", }, { category: "external", summary: "SUSE Bug 1060354 for CVE-2017-14491", url: "https://bugzilla.suse.com/1060354", }, { category: "external", summary: "SUSE Bug 1060360 for CVE-2017-14491", url: "https://bugzilla.suse.com/1060360", }, { category: "external", summary: "SUSE Bug 1060361 for CVE-2017-14491", url: "https://bugzilla.suse.com/1060361", }, { category: "external", summary: "SUSE Bug 1060362 for CVE-2017-14491", url: "https://bugzilla.suse.com/1060362", }, { category: "external", summary: "SUSE Bug 1060364 for CVE-2017-14491", url: "https://bugzilla.suse.com/1060364", }, { category: "external", summary: "SUSE Bug 1063832 for CVE-2017-14491", url: "https://bugzilla.suse.com/1063832", }, { category: "external", summary: "SUSE Bug 1143944 for CVE-2017-14491", url: "https://bugzilla.suse.com/1143944", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.i586", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.ia64", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.s390x", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.i586", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.ia64", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.s390x", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-02T13:51:46Z", details: "moderate", }, ], title: "CVE-2017-14491", }, { cve: "CVE-2017-14492", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-14492", }, ], notes: [ { category: "general", text: "Heap-based buffer overflow in dnsmasq before 2.78 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted IPv6 router advertisement request.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.i586", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.ia64", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.s390x", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-14492", url: "https://www.suse.com/security/cve/CVE-2017-14492", }, { category: "external", summary: "SUSE Bug 1060355 for CVE-2017-14492", url: "https://bugzilla.suse.com/1060355", }, { category: "external", summary: "SUSE Bug 1060360 for CVE-2017-14492", url: "https://bugzilla.suse.com/1060360", }, { category: "external", summary: "SUSE Bug 1060361 for CVE-2017-14492", url: "https://bugzilla.suse.com/1060361", }, { category: "external", summary: "SUSE Bug 1060362 for CVE-2017-14492", url: "https://bugzilla.suse.com/1060362", }, { category: "external", summary: "SUSE Bug 1060364 for CVE-2017-14492", url: "https://bugzilla.suse.com/1060364", }, { category: "external", summary: "SUSE Bug 1063832 for CVE-2017-14492", url: "https://bugzilla.suse.com/1063832", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.i586", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.ia64", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.s390x", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.i586", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.ia64", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.s390x", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-02T13:51:46Z", details: "moderate", }, ], title: "CVE-2017-14492", }, { cve: "CVE-2017-14493", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-14493", }, ], notes: [ { category: "general", text: "Stack-based buffer overflow in dnsmasq before 2.78 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted DHCPv6 request.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.i586", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.ia64", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.s390x", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-14493", url: "https://www.suse.com/security/cve/CVE-2017-14493", }, { category: "external", summary: "SUSE Bug 1060360 for CVE-2017-14493", url: "https://bugzilla.suse.com/1060360", }, { category: "external", summary: "SUSE Bug 1060361 for CVE-2017-14493", url: "https://bugzilla.suse.com/1060361", }, { category: "external", summary: "SUSE Bug 1060362 for CVE-2017-14493", url: "https://bugzilla.suse.com/1060362", }, { category: "external", summary: "SUSE Bug 1060364 for CVE-2017-14493", url: "https://bugzilla.suse.com/1060364", }, { category: "external", summary: "SUSE Bug 1063832 for CVE-2017-14493", url: "https://bugzilla.suse.com/1063832", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.i586", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.ia64", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.s390x", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.i586", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.ia64", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.s390x", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-02T13:51:46Z", details: "moderate", }, ], title: "CVE-2017-14493", }, { cve: "CVE-2017-14494", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-14494", }, ], notes: [ { category: "general", text: "dnsmasq before 2.78, when configured as a relay, allows remote attackers to obtain sensitive memory information via vectors involving handling DHCPv6 forwarded requests.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.i586", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.ia64", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.s390x", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-14494", url: "https://www.suse.com/security/cve/CVE-2017-14494", }, { category: "external", summary: "SUSE Bug 1060360 for CVE-2017-14494", url: "https://bugzilla.suse.com/1060360", }, { category: "external", summary: "SUSE Bug 1060361 for CVE-2017-14494", url: "https://bugzilla.suse.com/1060361", }, { category: "external", summary: "SUSE Bug 1060362 for CVE-2017-14494", url: "https://bugzilla.suse.com/1060362", }, { category: "external", summary: "SUSE Bug 1060364 for CVE-2017-14494", url: "https://bugzilla.suse.com/1060364", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.i586", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.ia64", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.s390x", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.i586", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.ia64", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.s390x", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-02T13:51:46Z", details: "moderate", }, ], title: "CVE-2017-14494", }, { cve: "CVE-2017-14495", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-14495", }, ], notes: [ { category: "general", text: "Memory leak in dnsmasq before 2.78, when the --add-mac, --add-cpe-id or --add-subnet option is specified, allows remote attackers to cause a denial of service (memory consumption) via vectors involving DNS response creation.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.i586", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.ia64", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.s390x", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-14495", url: "https://www.suse.com/security/cve/CVE-2017-14495", }, { category: "external", summary: "SUSE Bug 1060360 for CVE-2017-14495", url: "https://bugzilla.suse.com/1060360", }, { category: "external", summary: "SUSE Bug 1060361 for CVE-2017-14495", url: "https://bugzilla.suse.com/1060361", }, { category: "external", summary: "SUSE Bug 1060362 for CVE-2017-14495", url: "https://bugzilla.suse.com/1060362", }, { category: "external", summary: "SUSE Bug 1060364 for CVE-2017-14495", url: "https://bugzilla.suse.com/1060364", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.i586", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.ia64", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.s390x", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.i586", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.ia64", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.s390x", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-02T13:51:46Z", details: "important", }, ], title: "CVE-2017-14495", }, { cve: "CVE-2017-14496", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-14496", }, ], notes: [ { category: "general", text: "Integer underflow in the add_pseudoheader function in dnsmasq before 2.78 , when the --add-mac, --add-cpe-id or --add-subnet option is specified, allows remote attackers to cause a denial of service via a crafted DNS request.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.i586", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.ia64", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.s390x", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-14496", url: "https://www.suse.com/security/cve/CVE-2017-14496", }, { category: "external", summary: "SUSE Bug 1060360 for CVE-2017-14496", url: "https://bugzilla.suse.com/1060360", }, { category: "external", summary: "SUSE Bug 1060361 for CVE-2017-14496", url: "https://bugzilla.suse.com/1060361", }, { category: "external", summary: "SUSE Bug 1060362 for CVE-2017-14496", url: "https://bugzilla.suse.com/1060362", }, { category: "external", summary: "SUSE Bug 1060364 for CVE-2017-14496", url: "https://bugzilla.suse.com/1060364", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.i586", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.ia64", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.s390x", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.i586", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.ia64", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.s390x", "SUSE Linux Enterprise Server 11 SP4:dnsmasq-2.78-0.17.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:dnsmasq-2.78-0.17.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-02T13:51:46Z", details: "important", }, ], title: "CVE-2017-14496", }, ], }
suse-su-2017:2616-1
Vulnerability from csaf_suse
Notes
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for dnsmasq", title: "Title of the patch", }, { category: "description", text: "This update for dnsmasq fixes the following issues.\n\nRemedy the following security issues:\n\n- CVE-2017-14491: 2 byte heap based overflow. [bsc#1060354]\n- CVE-2017-14492: heap based overflow. [bsc#1060355]\n- CVE-2017-14493: stack based overflow. [bsc#1060360]\n- CVE-2017-14494: DHCP - info leak. [bsc#1060361]\n- CVE-2017-14495: DNS - OOM DoS. [bsc#1060362]\n- CVE-2017-14496: DNS - DoS Integer underflow. [bsc#1060364]\n- Prevent a man-in-the-middle attack (bsc#972164, fate#321175).\n\nFurthermore, the following issues have been fixed:\n\n- Fix DHCP relaying, broken in 2.76 and 2.77.\n- Update to version 2.78 (fate#321175, fate#322030, bsc#1035227).\n- Fix PXE booting for UEFI architectures (fate#322030).\n- Drop PrivateDevices=yes which breaks logging (bsc#902511, bsc#904537)\n- Build with support for DNSSEC (fate#318323, bsc#908137).\n\nPlease note that this update brings a (small) potential incompatibility in the\nhandling of 'basename' in --pxe-service. Please read the CHANGELOG and the\ndocumentation if you are using this option.\n\n", title: "Description of the patch", }, { category: "details", text: "SUSE-SLE-SERVER-12-2017-1616", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2017_2616-1.json", }, { category: "self", summary: "URL for SUSE-SU-2017:2616-1", url: "https://www.suse.com/support/update/announcement/2017/suse-su-20172616-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2017:2616-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2017-October/003268.html", }, { category: "self", summary: "SUSE Bug 1035227", url: "https://bugzilla.suse.com/1035227", }, { category: "self", summary: "SUSE Bug 1060354", url: "https://bugzilla.suse.com/1060354", }, { category: "self", summary: "SUSE Bug 1060355", url: "https://bugzilla.suse.com/1060355", }, { category: "self", summary: "SUSE Bug 1060360", url: "https://bugzilla.suse.com/1060360", }, { category: "self", summary: "SUSE Bug 1060361", url: "https://bugzilla.suse.com/1060361", }, { category: "self", summary: "SUSE Bug 1060362", url: "https://bugzilla.suse.com/1060362", }, { category: "self", summary: "SUSE Bug 1060364", url: "https://bugzilla.suse.com/1060364", }, { category: "self", summary: "SUSE Bug 902511", url: "https://bugzilla.suse.com/902511", }, { category: "self", summary: "SUSE Bug 904537", url: "https://bugzilla.suse.com/904537", }, { category: "self", summary: "SUSE Bug 908137", url: "https://bugzilla.suse.com/908137", }, { category: "self", summary: "SUSE Bug 972164", url: "https://bugzilla.suse.com/972164", }, { category: "self", summary: "SUSE CVE CVE-2015-3294 page", url: "https://www.suse.com/security/cve/CVE-2015-3294/", }, { category: "self", summary: "SUSE CVE CVE-2015-8899 page", url: "https://www.suse.com/security/cve/CVE-2015-8899/", }, { category: "self", summary: "SUSE CVE CVE-2017-14491 page", url: "https://www.suse.com/security/cve/CVE-2017-14491/", }, { category: "self", summary: "SUSE CVE CVE-2017-14492 page", url: "https://www.suse.com/security/cve/CVE-2017-14492/", }, { category: "self", summary: "SUSE CVE CVE-2017-14493 page", url: "https://www.suse.com/security/cve/CVE-2017-14493/", }, { category: "self", summary: "SUSE CVE CVE-2017-14494 page", url: "https://www.suse.com/security/cve/CVE-2017-14494/", }, { category: "self", summary: "SUSE CVE CVE-2017-14495 page", url: "https://www.suse.com/security/cve/CVE-2017-14495/", }, { category: "self", summary: "SUSE CVE CVE-2017-14496 page", url: "https://www.suse.com/security/cve/CVE-2017-14496/", }, ], title: "Security update for dnsmasq", tracking: { current_release_date: "2017-10-02T13:53:30Z", generator: { date: "2017-10-02T13:53:30Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2017:2616-1", initial_release_date: "2017-10-02T13:53:30Z", revision_history: [ { date: "2017-10-02T13:53:30Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "dnsmasq-2.78-6.6.1.ppc64le", product: { name: "dnsmasq-2.78-6.6.1.ppc64le", product_id: "dnsmasq-2.78-6.6.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "dnsmasq-2.78-6.6.1.s390x", product: { name: "dnsmasq-2.78-6.6.1.s390x", product_id: "dnsmasq-2.78-6.6.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "dnsmasq-2.78-6.6.1.x86_64", product: { name: "dnsmasq-2.78-6.6.1.x86_64", product_id: "dnsmasq-2.78-6.6.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Server 12-LTSS", product: { name: "SUSE Linux Enterprise Server 12-LTSS", product_id: "SUSE Linux Enterprise Server 12-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sles-ltss:12", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "dnsmasq-2.78-6.6.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS", product_id: "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.ppc64le", }, product_reference: "dnsmasq-2.78-6.6.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12-LTSS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-2.78-6.6.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS", product_id: "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.s390x", }, product_reference: "dnsmasq-2.78-6.6.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12-LTSS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-2.78-6.6.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", product_id: "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.x86_64", }, product_reference: "dnsmasq-2.78-6.6.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12-LTSS", }, ], }, vulnerabilities: [ { cve: "CVE-2015-3294", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-3294", }, ], notes: [ { category: "general", text: "The tcp_request function in Dnsmasq before 2.73rc4 does not properly handle the return value of the setup_reply function, which allows remote attackers to read process memory and cause a denial of service (out-of-bounds read and crash) via a malformed DNS request.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-3294", url: "https://www.suse.com/security/cve/CVE-2015-3294", }, { category: "external", summary: "SUSE Bug 923144 for CVE-2015-3294", url: "https://bugzilla.suse.com/923144", }, { category: "external", summary: "SUSE Bug 928867 for CVE-2015-3294", url: "https://bugzilla.suse.com/928867", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-02T13:53:30Z", details: "moderate", }, ], title: "CVE-2015-3294", }, { cve: "CVE-2015-8899", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-8899", }, ], notes: [ { category: "general", text: "Dnsmasq before 2.76 allows remote servers to cause a denial of service (crash) via a reply with an empty DNS address that has an (1) A or (2) AAAA record defined locally.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-8899", url: "https://www.suse.com/security/cve/CVE-2015-8899", }, { category: "external", summary: "SUSE Bug 983273 for CVE-2015-8899", url: "https://bugzilla.suse.com/983273", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-02T13:53:30Z", details: "moderate", }, ], title: "CVE-2015-8899", }, { cve: "CVE-2017-14491", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-14491", }, ], notes: [ { category: "general", text: "Heap-based buffer overflow in dnsmasq before 2.78 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted DNS response.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-14491", url: "https://www.suse.com/security/cve/CVE-2017-14491", }, { category: "external", summary: "SUSE Bug 1060354 for CVE-2017-14491", url: "https://bugzilla.suse.com/1060354", }, { category: "external", summary: "SUSE Bug 1060360 for CVE-2017-14491", url: "https://bugzilla.suse.com/1060360", }, { category: "external", summary: "SUSE Bug 1060361 for CVE-2017-14491", url: "https://bugzilla.suse.com/1060361", }, { category: "external", summary: "SUSE Bug 1060362 for CVE-2017-14491", url: "https://bugzilla.suse.com/1060362", }, { category: "external", summary: "SUSE Bug 1060364 for CVE-2017-14491", url: "https://bugzilla.suse.com/1060364", }, { category: "external", summary: "SUSE Bug 1063832 for CVE-2017-14491", url: "https://bugzilla.suse.com/1063832", }, { category: "external", summary: "SUSE Bug 1143944 for CVE-2017-14491", url: "https://bugzilla.suse.com/1143944", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-02T13:53:30Z", details: "moderate", }, ], title: "CVE-2017-14491", }, { cve: "CVE-2017-14492", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-14492", }, ], notes: [ { category: "general", text: "Heap-based buffer overflow in dnsmasq before 2.78 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted IPv6 router advertisement request.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-14492", url: "https://www.suse.com/security/cve/CVE-2017-14492", }, { category: "external", summary: "SUSE Bug 1060355 for CVE-2017-14492", url: "https://bugzilla.suse.com/1060355", }, { category: "external", summary: "SUSE Bug 1060360 for CVE-2017-14492", url: "https://bugzilla.suse.com/1060360", }, { category: "external", summary: "SUSE Bug 1060361 for CVE-2017-14492", url: "https://bugzilla.suse.com/1060361", }, { category: "external", summary: "SUSE Bug 1060362 for CVE-2017-14492", url: "https://bugzilla.suse.com/1060362", }, { category: "external", summary: "SUSE Bug 1060364 for CVE-2017-14492", url: "https://bugzilla.suse.com/1060364", }, { category: "external", summary: "SUSE Bug 1063832 for CVE-2017-14492", url: "https://bugzilla.suse.com/1063832", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-02T13:53:30Z", details: "moderate", }, ], title: "CVE-2017-14492", }, { cve: "CVE-2017-14493", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-14493", }, ], notes: [ { category: "general", text: "Stack-based buffer overflow in dnsmasq before 2.78 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted DHCPv6 request.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-14493", url: "https://www.suse.com/security/cve/CVE-2017-14493", }, { category: "external", summary: "SUSE Bug 1060360 for CVE-2017-14493", url: "https://bugzilla.suse.com/1060360", }, { category: "external", summary: "SUSE Bug 1060361 for CVE-2017-14493", url: "https://bugzilla.suse.com/1060361", }, { category: "external", summary: "SUSE Bug 1060362 for CVE-2017-14493", url: "https://bugzilla.suse.com/1060362", }, { category: "external", summary: "SUSE Bug 1060364 for CVE-2017-14493", url: "https://bugzilla.suse.com/1060364", }, { category: "external", summary: "SUSE Bug 1063832 for CVE-2017-14493", url: "https://bugzilla.suse.com/1063832", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-02T13:53:30Z", details: "moderate", }, ], title: "CVE-2017-14493", }, { cve: "CVE-2017-14494", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-14494", }, ], notes: [ { category: "general", text: "dnsmasq before 2.78, when configured as a relay, allows remote attackers to obtain sensitive memory information via vectors involving handling DHCPv6 forwarded requests.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-14494", url: "https://www.suse.com/security/cve/CVE-2017-14494", }, { category: "external", summary: "SUSE Bug 1060360 for CVE-2017-14494", url: "https://bugzilla.suse.com/1060360", }, { category: "external", summary: "SUSE Bug 1060361 for CVE-2017-14494", url: "https://bugzilla.suse.com/1060361", }, { category: "external", summary: "SUSE Bug 1060362 for CVE-2017-14494", url: "https://bugzilla.suse.com/1060362", }, { category: "external", summary: "SUSE Bug 1060364 for CVE-2017-14494", url: "https://bugzilla.suse.com/1060364", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-02T13:53:30Z", details: "moderate", }, ], title: "CVE-2017-14494", }, { cve: "CVE-2017-14495", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-14495", }, ], notes: [ { category: "general", text: "Memory leak in dnsmasq before 2.78, when the --add-mac, --add-cpe-id or --add-subnet option is specified, allows remote attackers to cause a denial of service (memory consumption) via vectors involving DNS response creation.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-14495", url: "https://www.suse.com/security/cve/CVE-2017-14495", }, { category: "external", summary: "SUSE Bug 1060360 for CVE-2017-14495", url: "https://bugzilla.suse.com/1060360", }, { category: "external", summary: "SUSE Bug 1060361 for CVE-2017-14495", url: "https://bugzilla.suse.com/1060361", }, { category: "external", summary: "SUSE Bug 1060362 for CVE-2017-14495", url: "https://bugzilla.suse.com/1060362", }, { category: "external", summary: "SUSE Bug 1060364 for CVE-2017-14495", url: "https://bugzilla.suse.com/1060364", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-02T13:53:30Z", details: "important", }, ], title: "CVE-2017-14495", }, { cve: "CVE-2017-14496", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-14496", }, ], notes: [ { category: "general", text: "Integer underflow in the add_pseudoheader function in dnsmasq before 2.78 , when the --add-mac, --add-cpe-id or --add-subnet option is specified, allows remote attackers to cause a denial of service via a crafted DNS request.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-14496", url: "https://www.suse.com/security/cve/CVE-2017-14496", }, { category: "external", summary: "SUSE Bug 1060360 for CVE-2017-14496", url: "https://bugzilla.suse.com/1060360", }, { category: "external", summary: "SUSE Bug 1060361 for CVE-2017-14496", url: "https://bugzilla.suse.com/1060361", }, { category: "external", summary: "SUSE Bug 1060362 for CVE-2017-14496", url: "https://bugzilla.suse.com/1060362", }, { category: "external", summary: "SUSE Bug 1060364 for CVE-2017-14496", url: "https://bugzilla.suse.com/1060364", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:dnsmasq-2.78-6.6.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-02T13:53:30Z", details: "important", }, ], title: "CVE-2017-14496", }, ], }
suse-su-2017:2618-1
Vulnerability from csaf_suse
Notes
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for dnsmasq", title: "Title of the patch", }, { category: "description", text: "This update for dnsmasq fixes the following security issues:\n\n- CVE-2017-14491: 2 byte heap based overflow. [bsc#1060354]\n- CVE-2017-14492: heap based overflow. [bsc#1060355]\n- CVE-2017-14493: stack based overflow. [bsc#1060360]\n- CVE-2017-14494: DHCP - info leak. [bsc#1060361]\n- CVE-2017-14495: DNS - OOM DoS. [bsc#1060362]\n- CVE-2017-14496: DNS - DoS Integer underflow. [bsc#1060364]\n", title: "Description of the patch", }, { category: "details", text: "SUSE-OpenStack-Cloud-6-2017-1615,SUSE-OpenStack-Cloud-7-2017-1615,SUSE-SLE-DESKTOP-12-SP2-2017-1615,SUSE-SLE-DESKTOP-12-SP3-2017-1615,SUSE-SLE-RPI-12-SP2-2017-1615,SUSE-SLE-SAP-12-SP1-2017-1615,SUSE-SLE-SERVER-12-SP1-2017-1615,SUSE-SLE-SERVER-12-SP2-2017-1615,SUSE-SLE-SERVER-12-SP3-2017-1615", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2017_2618-1.json", }, { category: "self", summary: "URL for SUSE-SU-2017:2618-1", url: "https://www.suse.com/support/update/announcement/2017/suse-su-20172618-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2017:2618-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2017-October/003270.html", }, { category: "self", summary: "SUSE Bug 1060354", url: "https://bugzilla.suse.com/1060354", }, { category: "self", summary: "SUSE Bug 1060355", url: "https://bugzilla.suse.com/1060355", }, { category: "self", summary: "SUSE Bug 1060360", url: "https://bugzilla.suse.com/1060360", }, { category: "self", summary: "SUSE Bug 1060361", url: "https://bugzilla.suse.com/1060361", }, { category: "self", summary: "SUSE Bug 1060362", url: "https://bugzilla.suse.com/1060362", }, { category: "self", summary: "SUSE Bug 1060364", url: "https://bugzilla.suse.com/1060364", }, { category: "self", summary: "SUSE CVE CVE-2017-14491 page", url: "https://www.suse.com/security/cve/CVE-2017-14491/", }, { category: "self", summary: "SUSE CVE CVE-2017-14492 page", url: "https://www.suse.com/security/cve/CVE-2017-14492/", }, { category: "self", summary: "SUSE CVE CVE-2017-14493 page", url: "https://www.suse.com/security/cve/CVE-2017-14493/", }, { category: "self", summary: "SUSE CVE CVE-2017-14494 page", url: "https://www.suse.com/security/cve/CVE-2017-14494/", }, { category: "self", summary: "SUSE CVE CVE-2017-14495 page", url: "https://www.suse.com/security/cve/CVE-2017-14495/", }, { category: "self", summary: "SUSE CVE CVE-2017-14496 page", url: "https://www.suse.com/security/cve/CVE-2017-14496/", }, ], title: "Security update for dnsmasq", tracking: { current_release_date: "2017-10-02T13:53:24Z", generator: { date: "2017-10-02T13:53:24Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2017:2618-1", initial_release_date: "2017-10-02T13:53:24Z", revision_history: [ { date: "2017-10-02T13:53:24Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "dnsmasq-utils-2.78-18.3.1.aarch64", product: { name: "dnsmasq-utils-2.78-18.3.1.aarch64", product_id: "dnsmasq-utils-2.78-18.3.1.aarch64", }, }, { category: "product_version", name: "dnsmasq-2.78-18.3.1.aarch64", product: { name: "dnsmasq-2.78-18.3.1.aarch64", product_id: "dnsmasq-2.78-18.3.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "dnsmasq-2.78-18.3.1.ppc64le", product: { name: "dnsmasq-2.78-18.3.1.ppc64le", product_id: "dnsmasq-2.78-18.3.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "dnsmasq-utils-2.78-18.3.1.s390x", product: { name: "dnsmasq-utils-2.78-18.3.1.s390x", product_id: "dnsmasq-utils-2.78-18.3.1.s390x", }, }, { category: "product_version", name: "dnsmasq-2.78-18.3.1.s390x", product: { name: "dnsmasq-2.78-18.3.1.s390x", product_id: "dnsmasq-2.78-18.3.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "dnsmasq-2.78-18.3.1.x86_64", product: { name: "dnsmasq-2.78-18.3.1.x86_64", product_id: "dnsmasq-2.78-18.3.1.x86_64", }, }, { category: "product_version", name: "dnsmasq-utils-2.78-18.3.1.x86_64", product: { name: "dnsmasq-utils-2.78-18.3.1.x86_64", product_id: "dnsmasq-utils-2.78-18.3.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE OpenStack Cloud 6", product: { name: "SUSE OpenStack Cloud 6", product_id: "SUSE OpenStack Cloud 6", product_identification_helper: { cpe: "cpe:/o:suse:suse-openstack-cloud:6", }, }, }, { category: "product_name", name: "SUSE OpenStack Cloud 7", product: { name: "SUSE OpenStack Cloud 7", product_id: "SUSE OpenStack Cloud 7", product_identification_helper: { cpe: "cpe:/o:suse:suse-openstack-cloud:7", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Desktop 12 SP2", product: { name: "SUSE Linux Enterprise Desktop 12 SP2", product_id: "SUSE Linux Enterprise Desktop 12 SP2", product_identification_helper: { cpe: "cpe:/o:suse:sled:12:sp2", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Desktop 12 SP3", product: { name: "SUSE Linux Enterprise Desktop 12 SP3", product_id: "SUSE Linux Enterprise Desktop 12 SP3", product_identification_helper: { cpe: "cpe:/o:suse:sled:12:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2", product: { name: "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2", product_id: "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2", product_identification_helper: { cpe: "cpe:/o:suse:sles:12:sp2", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 12 SP1", product: { name: "SUSE Linux Enterprise Server for SAP Applications 12 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP1", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:12:sp1", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 12 SP1-LTSS", product: { name: "SUSE Linux Enterprise Server 12 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP1-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sles-ltss:12:sp1", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 12 SP2", product: { name: "SUSE Linux Enterprise Server 12 SP2", product_id: "SUSE Linux Enterprise Server 12 SP2", product_identification_helper: { cpe: "cpe:/o:suse:sles:12:sp2", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", product: { name: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:12:sp2", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 12 SP3", product: { name: "SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3", product_identification_helper: { cpe: "cpe:/o:suse:sles:12:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", product: { name: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:12:sp3", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "dnsmasq-2.78-18.3.1.x86_64 as component of SUSE OpenStack Cloud 6", product_id: "SUSE OpenStack Cloud 6:dnsmasq-2.78-18.3.1.x86_64", }, product_reference: "dnsmasq-2.78-18.3.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud 6", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-2.78-18.3.1.x86_64 as component of SUSE OpenStack Cloud 6", product_id: "SUSE OpenStack Cloud 6:dnsmasq-utils-2.78-18.3.1.x86_64", }, product_reference: "dnsmasq-utils-2.78-18.3.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud 6", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-2.78-18.3.1.aarch64 as component of SUSE OpenStack Cloud 7", product_id: "SUSE OpenStack Cloud 7:dnsmasq-utils-2.78-18.3.1.aarch64", }, product_reference: "dnsmasq-utils-2.78-18.3.1.aarch64", relates_to_product_reference: "SUSE OpenStack Cloud 7", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-2.78-18.3.1.s390x as component of SUSE OpenStack Cloud 7", product_id: "SUSE OpenStack Cloud 7:dnsmasq-utils-2.78-18.3.1.s390x", }, product_reference: "dnsmasq-utils-2.78-18.3.1.s390x", relates_to_product_reference: "SUSE OpenStack Cloud 7", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-2.78-18.3.1.x86_64 as component of SUSE OpenStack Cloud 7", product_id: "SUSE OpenStack Cloud 7:dnsmasq-utils-2.78-18.3.1.x86_64", }, product_reference: "dnsmasq-utils-2.78-18.3.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud 7", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-2.78-18.3.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP2", product_id: "SUSE Linux Enterprise Desktop 12 SP2:dnsmasq-2.78-18.3.1.x86_64", }, product_reference: "dnsmasq-2.78-18.3.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Desktop 12 SP2", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-2.78-18.3.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3", product_id: "SUSE Linux Enterprise Desktop 12 SP3:dnsmasq-2.78-18.3.1.x86_64", }, product_reference: "dnsmasq-2.78-18.3.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Desktop 12 SP3", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-2.78-18.3.1.aarch64 as component of SUSE Linux Enterprise Server for Raspberry Pi 12 SP2", product_id: "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:dnsmasq-2.78-18.3.1.aarch64", }, product_reference: "dnsmasq-2.78-18.3.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-2.78-18.3.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP1:dnsmasq-2.78-18.3.1.ppc64le", }, product_reference: "dnsmasq-2.78-18.3.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP1", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-2.78-18.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP1:dnsmasq-2.78-18.3.1.x86_64", }, product_reference: "dnsmasq-2.78-18.3.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP1", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-2.78-18.3.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP1-LTSS:dnsmasq-2.78-18.3.1.ppc64le", }, product_reference: "dnsmasq-2.78-18.3.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-2.78-18.3.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP1-LTSS:dnsmasq-2.78-18.3.1.s390x", }, product_reference: "dnsmasq-2.78-18.3.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-2.78-18.3.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP1-LTSS:dnsmasq-2.78-18.3.1.x86_64", }, product_reference: "dnsmasq-2.78-18.3.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-2.78-18.3.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP2", product_id: "SUSE Linux Enterprise Server 12 SP2:dnsmasq-2.78-18.3.1.aarch64", }, product_reference: "dnsmasq-2.78-18.3.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-2.78-18.3.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2", product_id: "SUSE Linux Enterprise Server 12 SP2:dnsmasq-2.78-18.3.1.ppc64le", }, product_reference: "dnsmasq-2.78-18.3.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-2.78-18.3.1.s390x as component of SUSE Linux Enterprise Server 12 SP2", product_id: "SUSE Linux Enterprise Server 12 SP2:dnsmasq-2.78-18.3.1.s390x", }, product_reference: "dnsmasq-2.78-18.3.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-2.78-18.3.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2", product_id: "SUSE Linux Enterprise Server 12 SP2:dnsmasq-2.78-18.3.1.x86_64", }, product_reference: "dnsmasq-2.78-18.3.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-2.78-18.3.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP2:dnsmasq-2.78-18.3.1.aarch64", }, product_reference: "dnsmasq-2.78-18.3.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-2.78-18.3.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP2:dnsmasq-2.78-18.3.1.ppc64le", }, product_reference: "dnsmasq-2.78-18.3.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-2.78-18.3.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP2:dnsmasq-2.78-18.3.1.s390x", }, product_reference: "dnsmasq-2.78-18.3.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-2.78-18.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP2:dnsmasq-2.78-18.3.1.x86_64", }, product_reference: "dnsmasq-2.78-18.3.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-2.78-18.3.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3:dnsmasq-2.78-18.3.1.aarch64", }, product_reference: "dnsmasq-2.78-18.3.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-2.78-18.3.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3:dnsmasq-2.78-18.3.1.ppc64le", }, product_reference: "dnsmasq-2.78-18.3.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-2.78-18.3.1.s390x as component of SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3:dnsmasq-2.78-18.3.1.s390x", }, product_reference: "dnsmasq-2.78-18.3.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-2.78-18.3.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3:dnsmasq-2.78-18.3.1.x86_64", }, product_reference: "dnsmasq-2.78-18.3.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-2.78-18.3.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dnsmasq-2.78-18.3.1.aarch64", }, product_reference: "dnsmasq-2.78-18.3.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-2.78-18.3.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dnsmasq-2.78-18.3.1.ppc64le", }, product_reference: "dnsmasq-2.78-18.3.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-2.78-18.3.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dnsmasq-2.78-18.3.1.s390x", }, product_reference: "dnsmasq-2.78-18.3.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-2.78-18.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dnsmasq-2.78-18.3.1.x86_64", }, product_reference: "dnsmasq-2.78-18.3.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, ], }, vulnerabilities: [ { cve: "CVE-2017-14491", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-14491", }, ], notes: [ { category: "general", text: "Heap-based buffer overflow in dnsmasq before 2.78 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted DNS response.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP2:dnsmasq-2.78-18.3.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:dnsmasq-2.78-18.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:dnsmasq-2.78-18.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:dnsmasq-2.78-18.3.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:dnsmasq-2.78-18.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:dnsmasq-2.78-18.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:dnsmasq-2.78-18.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:dnsmasq-2.78-18.3.1.s390x", "SUSE Linux Enterprise Server 12 SP2:dnsmasq-2.78-18.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:dnsmasq-2.78-18.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:dnsmasq-2.78-18.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:dnsmasq-2.78-18.3.1.s390x", "SUSE Linux Enterprise Server 12 SP3:dnsmasq-2.78-18.3.1.x86_64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:dnsmasq-2.78-18.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:dnsmasq-2.78-18.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:dnsmasq-2.78-18.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:dnsmasq-2.78-18.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:dnsmasq-2.78-18.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:dnsmasq-2.78-18.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:dnsmasq-2.78-18.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dnsmasq-2.78-18.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dnsmasq-2.78-18.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dnsmasq-2.78-18.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dnsmasq-2.78-18.3.1.x86_64", "SUSE OpenStack Cloud 6:dnsmasq-2.78-18.3.1.x86_64", "SUSE OpenStack Cloud 6:dnsmasq-utils-2.78-18.3.1.x86_64", "SUSE OpenStack Cloud 7:dnsmasq-utils-2.78-18.3.1.aarch64", "SUSE OpenStack Cloud 7:dnsmasq-utils-2.78-18.3.1.s390x", "SUSE OpenStack Cloud 7:dnsmasq-utils-2.78-18.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-14491", url: "https://www.suse.com/security/cve/CVE-2017-14491", }, { category: "external", summary: "SUSE Bug 1060354 for CVE-2017-14491", url: "https://bugzilla.suse.com/1060354", }, { category: "external", summary: "SUSE Bug 1060360 for CVE-2017-14491", url: "https://bugzilla.suse.com/1060360", }, { category: "external", summary: "SUSE Bug 1060361 for CVE-2017-14491", url: "https://bugzilla.suse.com/1060361", }, { category: "external", summary: "SUSE Bug 1060362 for CVE-2017-14491", url: "https://bugzilla.suse.com/1060362", }, { category: "external", summary: "SUSE Bug 1060364 for CVE-2017-14491", url: "https://bugzilla.suse.com/1060364", }, { category: "external", summary: "SUSE Bug 1063832 for CVE-2017-14491", url: "https://bugzilla.suse.com/1063832", }, { category: "external", summary: "SUSE Bug 1143944 for CVE-2017-14491", url: "https://bugzilla.suse.com/1143944", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP2:dnsmasq-2.78-18.3.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:dnsmasq-2.78-18.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:dnsmasq-2.78-18.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:dnsmasq-2.78-18.3.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:dnsmasq-2.78-18.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:dnsmasq-2.78-18.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:dnsmasq-2.78-18.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:dnsmasq-2.78-18.3.1.s390x", "SUSE Linux Enterprise Server 12 SP2:dnsmasq-2.78-18.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:dnsmasq-2.78-18.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:dnsmasq-2.78-18.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:dnsmasq-2.78-18.3.1.s390x", "SUSE Linux Enterprise Server 12 SP3:dnsmasq-2.78-18.3.1.x86_64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:dnsmasq-2.78-18.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:dnsmasq-2.78-18.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:dnsmasq-2.78-18.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:dnsmasq-2.78-18.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:dnsmasq-2.78-18.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:dnsmasq-2.78-18.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:dnsmasq-2.78-18.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dnsmasq-2.78-18.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dnsmasq-2.78-18.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dnsmasq-2.78-18.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dnsmasq-2.78-18.3.1.x86_64", "SUSE OpenStack Cloud 6:dnsmasq-2.78-18.3.1.x86_64", "SUSE OpenStack Cloud 6:dnsmasq-utils-2.78-18.3.1.x86_64", "SUSE OpenStack Cloud 7:dnsmasq-utils-2.78-18.3.1.aarch64", "SUSE OpenStack Cloud 7:dnsmasq-utils-2.78-18.3.1.s390x", "SUSE OpenStack Cloud 7:dnsmasq-utils-2.78-18.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Desktop 12 SP2:dnsmasq-2.78-18.3.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:dnsmasq-2.78-18.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:dnsmasq-2.78-18.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:dnsmasq-2.78-18.3.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:dnsmasq-2.78-18.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:dnsmasq-2.78-18.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:dnsmasq-2.78-18.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:dnsmasq-2.78-18.3.1.s390x", "SUSE Linux Enterprise Server 12 SP2:dnsmasq-2.78-18.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:dnsmasq-2.78-18.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:dnsmasq-2.78-18.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:dnsmasq-2.78-18.3.1.s390x", "SUSE Linux Enterprise Server 12 SP3:dnsmasq-2.78-18.3.1.x86_64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:dnsmasq-2.78-18.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:dnsmasq-2.78-18.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:dnsmasq-2.78-18.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:dnsmasq-2.78-18.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:dnsmasq-2.78-18.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:dnsmasq-2.78-18.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:dnsmasq-2.78-18.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dnsmasq-2.78-18.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dnsmasq-2.78-18.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dnsmasq-2.78-18.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dnsmasq-2.78-18.3.1.x86_64", "SUSE OpenStack Cloud 6:dnsmasq-2.78-18.3.1.x86_64", "SUSE OpenStack Cloud 6:dnsmasq-utils-2.78-18.3.1.x86_64", "SUSE OpenStack Cloud 7:dnsmasq-utils-2.78-18.3.1.aarch64", "SUSE OpenStack Cloud 7:dnsmasq-utils-2.78-18.3.1.s390x", "SUSE OpenStack Cloud 7:dnsmasq-utils-2.78-18.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-02T13:53:24Z", details: "moderate", }, ], title: "CVE-2017-14491", }, { cve: "CVE-2017-14492", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-14492", }, ], notes: [ { category: "general", text: "Heap-based buffer overflow in dnsmasq before 2.78 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted IPv6 router advertisement request.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP2:dnsmasq-2.78-18.3.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:dnsmasq-2.78-18.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:dnsmasq-2.78-18.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:dnsmasq-2.78-18.3.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:dnsmasq-2.78-18.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:dnsmasq-2.78-18.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:dnsmasq-2.78-18.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:dnsmasq-2.78-18.3.1.s390x", "SUSE Linux Enterprise Server 12 SP2:dnsmasq-2.78-18.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:dnsmasq-2.78-18.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:dnsmasq-2.78-18.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:dnsmasq-2.78-18.3.1.s390x", "SUSE Linux Enterprise Server 12 SP3:dnsmasq-2.78-18.3.1.x86_64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:dnsmasq-2.78-18.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:dnsmasq-2.78-18.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:dnsmasq-2.78-18.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:dnsmasq-2.78-18.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:dnsmasq-2.78-18.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:dnsmasq-2.78-18.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:dnsmasq-2.78-18.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dnsmasq-2.78-18.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dnsmasq-2.78-18.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dnsmasq-2.78-18.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dnsmasq-2.78-18.3.1.x86_64", "SUSE OpenStack Cloud 6:dnsmasq-2.78-18.3.1.x86_64", "SUSE OpenStack Cloud 6:dnsmasq-utils-2.78-18.3.1.x86_64", "SUSE OpenStack Cloud 7:dnsmasq-utils-2.78-18.3.1.aarch64", "SUSE OpenStack Cloud 7:dnsmasq-utils-2.78-18.3.1.s390x", "SUSE OpenStack Cloud 7:dnsmasq-utils-2.78-18.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-14492", url: "https://www.suse.com/security/cve/CVE-2017-14492", }, { category: "external", summary: "SUSE Bug 1060355 for CVE-2017-14492", url: "https://bugzilla.suse.com/1060355", }, { category: "external", summary: "SUSE Bug 1060360 for CVE-2017-14492", url: "https://bugzilla.suse.com/1060360", }, { category: "external", summary: "SUSE Bug 1060361 for CVE-2017-14492", url: "https://bugzilla.suse.com/1060361", }, { category: "external", summary: "SUSE Bug 1060362 for CVE-2017-14492", url: "https://bugzilla.suse.com/1060362", }, { category: "external", summary: "SUSE Bug 1060364 for CVE-2017-14492", url: "https://bugzilla.suse.com/1060364", }, { category: "external", summary: "SUSE Bug 1063832 for CVE-2017-14492", url: "https://bugzilla.suse.com/1063832", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP2:dnsmasq-2.78-18.3.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:dnsmasq-2.78-18.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:dnsmasq-2.78-18.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:dnsmasq-2.78-18.3.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:dnsmasq-2.78-18.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:dnsmasq-2.78-18.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:dnsmasq-2.78-18.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:dnsmasq-2.78-18.3.1.s390x", "SUSE Linux Enterprise Server 12 SP2:dnsmasq-2.78-18.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:dnsmasq-2.78-18.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:dnsmasq-2.78-18.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:dnsmasq-2.78-18.3.1.s390x", "SUSE Linux Enterprise Server 12 SP3:dnsmasq-2.78-18.3.1.x86_64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:dnsmasq-2.78-18.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:dnsmasq-2.78-18.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:dnsmasq-2.78-18.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:dnsmasq-2.78-18.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:dnsmasq-2.78-18.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:dnsmasq-2.78-18.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:dnsmasq-2.78-18.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dnsmasq-2.78-18.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dnsmasq-2.78-18.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dnsmasq-2.78-18.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dnsmasq-2.78-18.3.1.x86_64", "SUSE OpenStack Cloud 6:dnsmasq-2.78-18.3.1.x86_64", "SUSE OpenStack Cloud 6:dnsmasq-utils-2.78-18.3.1.x86_64", "SUSE OpenStack Cloud 7:dnsmasq-utils-2.78-18.3.1.aarch64", "SUSE OpenStack Cloud 7:dnsmasq-utils-2.78-18.3.1.s390x", "SUSE OpenStack Cloud 7:dnsmasq-utils-2.78-18.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Desktop 12 SP2:dnsmasq-2.78-18.3.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:dnsmasq-2.78-18.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:dnsmasq-2.78-18.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:dnsmasq-2.78-18.3.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:dnsmasq-2.78-18.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:dnsmasq-2.78-18.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:dnsmasq-2.78-18.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:dnsmasq-2.78-18.3.1.s390x", "SUSE Linux Enterprise Server 12 SP2:dnsmasq-2.78-18.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:dnsmasq-2.78-18.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:dnsmasq-2.78-18.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:dnsmasq-2.78-18.3.1.s390x", "SUSE Linux Enterprise Server 12 SP3:dnsmasq-2.78-18.3.1.x86_64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:dnsmasq-2.78-18.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:dnsmasq-2.78-18.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:dnsmasq-2.78-18.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:dnsmasq-2.78-18.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:dnsmasq-2.78-18.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:dnsmasq-2.78-18.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:dnsmasq-2.78-18.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dnsmasq-2.78-18.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dnsmasq-2.78-18.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dnsmasq-2.78-18.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dnsmasq-2.78-18.3.1.x86_64", "SUSE OpenStack Cloud 6:dnsmasq-2.78-18.3.1.x86_64", "SUSE OpenStack Cloud 6:dnsmasq-utils-2.78-18.3.1.x86_64", "SUSE OpenStack Cloud 7:dnsmasq-utils-2.78-18.3.1.aarch64", "SUSE OpenStack Cloud 7:dnsmasq-utils-2.78-18.3.1.s390x", "SUSE OpenStack Cloud 7:dnsmasq-utils-2.78-18.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-02T13:53:24Z", details: "moderate", }, ], title: "CVE-2017-14492", }, { cve: "CVE-2017-14493", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-14493", }, ], notes: [ { category: "general", text: "Stack-based buffer overflow in dnsmasq before 2.78 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted DHCPv6 request.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP2:dnsmasq-2.78-18.3.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:dnsmasq-2.78-18.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:dnsmasq-2.78-18.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:dnsmasq-2.78-18.3.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:dnsmasq-2.78-18.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:dnsmasq-2.78-18.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:dnsmasq-2.78-18.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:dnsmasq-2.78-18.3.1.s390x", "SUSE Linux Enterprise Server 12 SP2:dnsmasq-2.78-18.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:dnsmasq-2.78-18.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:dnsmasq-2.78-18.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:dnsmasq-2.78-18.3.1.s390x", "SUSE Linux Enterprise Server 12 SP3:dnsmasq-2.78-18.3.1.x86_64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:dnsmasq-2.78-18.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:dnsmasq-2.78-18.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:dnsmasq-2.78-18.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:dnsmasq-2.78-18.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:dnsmasq-2.78-18.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:dnsmasq-2.78-18.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:dnsmasq-2.78-18.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dnsmasq-2.78-18.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dnsmasq-2.78-18.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dnsmasq-2.78-18.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dnsmasq-2.78-18.3.1.x86_64", "SUSE OpenStack Cloud 6:dnsmasq-2.78-18.3.1.x86_64", "SUSE OpenStack Cloud 6:dnsmasq-utils-2.78-18.3.1.x86_64", "SUSE OpenStack Cloud 7:dnsmasq-utils-2.78-18.3.1.aarch64", "SUSE OpenStack Cloud 7:dnsmasq-utils-2.78-18.3.1.s390x", "SUSE OpenStack Cloud 7:dnsmasq-utils-2.78-18.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-14493", url: "https://www.suse.com/security/cve/CVE-2017-14493", }, { category: "external", summary: "SUSE Bug 1060360 for CVE-2017-14493", url: "https://bugzilla.suse.com/1060360", }, { category: "external", summary: "SUSE Bug 1060361 for CVE-2017-14493", url: "https://bugzilla.suse.com/1060361", }, { category: "external", summary: "SUSE Bug 1060362 for CVE-2017-14493", url: "https://bugzilla.suse.com/1060362", }, { category: "external", summary: "SUSE Bug 1060364 for CVE-2017-14493", url: "https://bugzilla.suse.com/1060364", }, { category: "external", summary: "SUSE Bug 1063832 for CVE-2017-14493", url: "https://bugzilla.suse.com/1063832", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP2:dnsmasq-2.78-18.3.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:dnsmasq-2.78-18.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:dnsmasq-2.78-18.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:dnsmasq-2.78-18.3.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:dnsmasq-2.78-18.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:dnsmasq-2.78-18.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:dnsmasq-2.78-18.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:dnsmasq-2.78-18.3.1.s390x", "SUSE Linux Enterprise Server 12 SP2:dnsmasq-2.78-18.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:dnsmasq-2.78-18.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:dnsmasq-2.78-18.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:dnsmasq-2.78-18.3.1.s390x", "SUSE Linux Enterprise Server 12 SP3:dnsmasq-2.78-18.3.1.x86_64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:dnsmasq-2.78-18.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:dnsmasq-2.78-18.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:dnsmasq-2.78-18.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:dnsmasq-2.78-18.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:dnsmasq-2.78-18.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:dnsmasq-2.78-18.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:dnsmasq-2.78-18.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dnsmasq-2.78-18.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dnsmasq-2.78-18.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dnsmasq-2.78-18.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dnsmasq-2.78-18.3.1.x86_64", "SUSE OpenStack Cloud 6:dnsmasq-2.78-18.3.1.x86_64", "SUSE OpenStack Cloud 6:dnsmasq-utils-2.78-18.3.1.x86_64", "SUSE OpenStack Cloud 7:dnsmasq-utils-2.78-18.3.1.aarch64", "SUSE OpenStack Cloud 7:dnsmasq-utils-2.78-18.3.1.s390x", "SUSE OpenStack Cloud 7:dnsmasq-utils-2.78-18.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Desktop 12 SP2:dnsmasq-2.78-18.3.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:dnsmasq-2.78-18.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:dnsmasq-2.78-18.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:dnsmasq-2.78-18.3.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:dnsmasq-2.78-18.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:dnsmasq-2.78-18.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:dnsmasq-2.78-18.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:dnsmasq-2.78-18.3.1.s390x", "SUSE Linux Enterprise Server 12 SP2:dnsmasq-2.78-18.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:dnsmasq-2.78-18.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:dnsmasq-2.78-18.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:dnsmasq-2.78-18.3.1.s390x", "SUSE Linux Enterprise Server 12 SP3:dnsmasq-2.78-18.3.1.x86_64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:dnsmasq-2.78-18.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:dnsmasq-2.78-18.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:dnsmasq-2.78-18.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:dnsmasq-2.78-18.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:dnsmasq-2.78-18.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:dnsmasq-2.78-18.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:dnsmasq-2.78-18.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dnsmasq-2.78-18.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dnsmasq-2.78-18.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dnsmasq-2.78-18.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dnsmasq-2.78-18.3.1.x86_64", "SUSE OpenStack Cloud 6:dnsmasq-2.78-18.3.1.x86_64", "SUSE OpenStack Cloud 6:dnsmasq-utils-2.78-18.3.1.x86_64", "SUSE OpenStack Cloud 7:dnsmasq-utils-2.78-18.3.1.aarch64", "SUSE OpenStack Cloud 7:dnsmasq-utils-2.78-18.3.1.s390x", "SUSE OpenStack Cloud 7:dnsmasq-utils-2.78-18.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-02T13:53:24Z", details: "moderate", }, ], title: "CVE-2017-14493", }, { cve: "CVE-2017-14494", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-14494", }, ], notes: [ { category: "general", text: "dnsmasq before 2.78, when configured as a relay, allows remote attackers to obtain sensitive memory information via vectors involving handling DHCPv6 forwarded requests.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP2:dnsmasq-2.78-18.3.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:dnsmasq-2.78-18.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:dnsmasq-2.78-18.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:dnsmasq-2.78-18.3.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:dnsmasq-2.78-18.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:dnsmasq-2.78-18.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:dnsmasq-2.78-18.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:dnsmasq-2.78-18.3.1.s390x", "SUSE Linux Enterprise Server 12 SP2:dnsmasq-2.78-18.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:dnsmasq-2.78-18.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:dnsmasq-2.78-18.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:dnsmasq-2.78-18.3.1.s390x", "SUSE Linux Enterprise Server 12 SP3:dnsmasq-2.78-18.3.1.x86_64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:dnsmasq-2.78-18.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:dnsmasq-2.78-18.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:dnsmasq-2.78-18.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:dnsmasq-2.78-18.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:dnsmasq-2.78-18.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:dnsmasq-2.78-18.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:dnsmasq-2.78-18.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dnsmasq-2.78-18.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dnsmasq-2.78-18.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dnsmasq-2.78-18.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dnsmasq-2.78-18.3.1.x86_64", "SUSE OpenStack Cloud 6:dnsmasq-2.78-18.3.1.x86_64", "SUSE OpenStack Cloud 6:dnsmasq-utils-2.78-18.3.1.x86_64", "SUSE OpenStack Cloud 7:dnsmasq-utils-2.78-18.3.1.aarch64", "SUSE OpenStack Cloud 7:dnsmasq-utils-2.78-18.3.1.s390x", "SUSE OpenStack Cloud 7:dnsmasq-utils-2.78-18.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-14494", url: "https://www.suse.com/security/cve/CVE-2017-14494", }, { category: "external", summary: "SUSE Bug 1060360 for CVE-2017-14494", url: "https://bugzilla.suse.com/1060360", }, { category: "external", summary: "SUSE Bug 1060361 for CVE-2017-14494", url: "https://bugzilla.suse.com/1060361", }, { category: "external", summary: "SUSE Bug 1060362 for CVE-2017-14494", url: "https://bugzilla.suse.com/1060362", }, { category: "external", summary: "SUSE Bug 1060364 for CVE-2017-14494", url: "https://bugzilla.suse.com/1060364", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP2:dnsmasq-2.78-18.3.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:dnsmasq-2.78-18.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:dnsmasq-2.78-18.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:dnsmasq-2.78-18.3.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:dnsmasq-2.78-18.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:dnsmasq-2.78-18.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:dnsmasq-2.78-18.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:dnsmasq-2.78-18.3.1.s390x", "SUSE Linux Enterprise Server 12 SP2:dnsmasq-2.78-18.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:dnsmasq-2.78-18.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:dnsmasq-2.78-18.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:dnsmasq-2.78-18.3.1.s390x", "SUSE Linux Enterprise Server 12 SP3:dnsmasq-2.78-18.3.1.x86_64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:dnsmasq-2.78-18.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:dnsmasq-2.78-18.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:dnsmasq-2.78-18.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:dnsmasq-2.78-18.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:dnsmasq-2.78-18.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:dnsmasq-2.78-18.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:dnsmasq-2.78-18.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dnsmasq-2.78-18.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dnsmasq-2.78-18.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dnsmasq-2.78-18.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dnsmasq-2.78-18.3.1.x86_64", "SUSE OpenStack Cloud 6:dnsmasq-2.78-18.3.1.x86_64", "SUSE OpenStack Cloud 6:dnsmasq-utils-2.78-18.3.1.x86_64", "SUSE OpenStack Cloud 7:dnsmasq-utils-2.78-18.3.1.aarch64", "SUSE OpenStack Cloud 7:dnsmasq-utils-2.78-18.3.1.s390x", "SUSE OpenStack Cloud 7:dnsmasq-utils-2.78-18.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Desktop 12 SP2:dnsmasq-2.78-18.3.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:dnsmasq-2.78-18.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:dnsmasq-2.78-18.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:dnsmasq-2.78-18.3.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:dnsmasq-2.78-18.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:dnsmasq-2.78-18.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:dnsmasq-2.78-18.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:dnsmasq-2.78-18.3.1.s390x", "SUSE Linux Enterprise Server 12 SP2:dnsmasq-2.78-18.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:dnsmasq-2.78-18.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:dnsmasq-2.78-18.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:dnsmasq-2.78-18.3.1.s390x", "SUSE Linux Enterprise Server 12 SP3:dnsmasq-2.78-18.3.1.x86_64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:dnsmasq-2.78-18.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:dnsmasq-2.78-18.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:dnsmasq-2.78-18.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:dnsmasq-2.78-18.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:dnsmasq-2.78-18.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:dnsmasq-2.78-18.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:dnsmasq-2.78-18.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dnsmasq-2.78-18.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dnsmasq-2.78-18.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dnsmasq-2.78-18.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dnsmasq-2.78-18.3.1.x86_64", "SUSE OpenStack Cloud 6:dnsmasq-2.78-18.3.1.x86_64", "SUSE OpenStack Cloud 6:dnsmasq-utils-2.78-18.3.1.x86_64", "SUSE OpenStack Cloud 7:dnsmasq-utils-2.78-18.3.1.aarch64", "SUSE OpenStack Cloud 7:dnsmasq-utils-2.78-18.3.1.s390x", "SUSE OpenStack Cloud 7:dnsmasq-utils-2.78-18.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-02T13:53:24Z", details: "moderate", }, ], title: "CVE-2017-14494", }, { cve: "CVE-2017-14495", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-14495", }, ], notes: [ { category: "general", text: "Memory leak in dnsmasq before 2.78, when the --add-mac, --add-cpe-id or --add-subnet option is specified, allows remote attackers to cause a denial of service (memory consumption) via vectors involving DNS response creation.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP2:dnsmasq-2.78-18.3.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:dnsmasq-2.78-18.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:dnsmasq-2.78-18.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:dnsmasq-2.78-18.3.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:dnsmasq-2.78-18.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:dnsmasq-2.78-18.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:dnsmasq-2.78-18.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:dnsmasq-2.78-18.3.1.s390x", "SUSE Linux Enterprise Server 12 SP2:dnsmasq-2.78-18.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:dnsmasq-2.78-18.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:dnsmasq-2.78-18.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:dnsmasq-2.78-18.3.1.s390x", "SUSE Linux Enterprise Server 12 SP3:dnsmasq-2.78-18.3.1.x86_64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:dnsmasq-2.78-18.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:dnsmasq-2.78-18.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:dnsmasq-2.78-18.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:dnsmasq-2.78-18.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:dnsmasq-2.78-18.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:dnsmasq-2.78-18.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:dnsmasq-2.78-18.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dnsmasq-2.78-18.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dnsmasq-2.78-18.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dnsmasq-2.78-18.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dnsmasq-2.78-18.3.1.x86_64", "SUSE OpenStack Cloud 6:dnsmasq-2.78-18.3.1.x86_64", "SUSE OpenStack Cloud 6:dnsmasq-utils-2.78-18.3.1.x86_64", "SUSE OpenStack Cloud 7:dnsmasq-utils-2.78-18.3.1.aarch64", "SUSE OpenStack Cloud 7:dnsmasq-utils-2.78-18.3.1.s390x", "SUSE OpenStack Cloud 7:dnsmasq-utils-2.78-18.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-14495", url: "https://www.suse.com/security/cve/CVE-2017-14495", }, { category: "external", summary: "SUSE Bug 1060360 for CVE-2017-14495", url: "https://bugzilla.suse.com/1060360", }, { category: "external", summary: "SUSE Bug 1060361 for CVE-2017-14495", url: "https://bugzilla.suse.com/1060361", }, { category: "external", summary: "SUSE Bug 1060362 for CVE-2017-14495", url: "https://bugzilla.suse.com/1060362", }, { category: "external", summary: "SUSE Bug 1060364 for CVE-2017-14495", url: "https://bugzilla.suse.com/1060364", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP2:dnsmasq-2.78-18.3.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:dnsmasq-2.78-18.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:dnsmasq-2.78-18.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:dnsmasq-2.78-18.3.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:dnsmasq-2.78-18.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:dnsmasq-2.78-18.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:dnsmasq-2.78-18.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:dnsmasq-2.78-18.3.1.s390x", "SUSE Linux Enterprise Server 12 SP2:dnsmasq-2.78-18.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:dnsmasq-2.78-18.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:dnsmasq-2.78-18.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:dnsmasq-2.78-18.3.1.s390x", "SUSE Linux Enterprise Server 12 SP3:dnsmasq-2.78-18.3.1.x86_64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:dnsmasq-2.78-18.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:dnsmasq-2.78-18.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:dnsmasq-2.78-18.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:dnsmasq-2.78-18.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:dnsmasq-2.78-18.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:dnsmasq-2.78-18.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:dnsmasq-2.78-18.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dnsmasq-2.78-18.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dnsmasq-2.78-18.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dnsmasq-2.78-18.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dnsmasq-2.78-18.3.1.x86_64", "SUSE OpenStack Cloud 6:dnsmasq-2.78-18.3.1.x86_64", "SUSE OpenStack Cloud 6:dnsmasq-utils-2.78-18.3.1.x86_64", "SUSE OpenStack Cloud 7:dnsmasq-utils-2.78-18.3.1.aarch64", "SUSE OpenStack Cloud 7:dnsmasq-utils-2.78-18.3.1.s390x", "SUSE OpenStack Cloud 7:dnsmasq-utils-2.78-18.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Desktop 12 SP2:dnsmasq-2.78-18.3.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:dnsmasq-2.78-18.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:dnsmasq-2.78-18.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:dnsmasq-2.78-18.3.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:dnsmasq-2.78-18.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:dnsmasq-2.78-18.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:dnsmasq-2.78-18.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:dnsmasq-2.78-18.3.1.s390x", "SUSE Linux Enterprise Server 12 SP2:dnsmasq-2.78-18.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:dnsmasq-2.78-18.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:dnsmasq-2.78-18.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:dnsmasq-2.78-18.3.1.s390x", "SUSE Linux Enterprise Server 12 SP3:dnsmasq-2.78-18.3.1.x86_64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:dnsmasq-2.78-18.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:dnsmasq-2.78-18.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:dnsmasq-2.78-18.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:dnsmasq-2.78-18.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:dnsmasq-2.78-18.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:dnsmasq-2.78-18.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:dnsmasq-2.78-18.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dnsmasq-2.78-18.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dnsmasq-2.78-18.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dnsmasq-2.78-18.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dnsmasq-2.78-18.3.1.x86_64", "SUSE OpenStack Cloud 6:dnsmasq-2.78-18.3.1.x86_64", "SUSE OpenStack Cloud 6:dnsmasq-utils-2.78-18.3.1.x86_64", "SUSE OpenStack Cloud 7:dnsmasq-utils-2.78-18.3.1.aarch64", "SUSE OpenStack Cloud 7:dnsmasq-utils-2.78-18.3.1.s390x", "SUSE OpenStack Cloud 7:dnsmasq-utils-2.78-18.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-02T13:53:24Z", details: "important", }, ], title: "CVE-2017-14495", }, { cve: "CVE-2017-14496", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-14496", }, ], notes: [ { category: "general", text: "Integer underflow in the add_pseudoheader function in dnsmasq before 2.78 , when the --add-mac, --add-cpe-id or --add-subnet option is specified, allows remote attackers to cause a denial of service via a crafted DNS request.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP2:dnsmasq-2.78-18.3.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:dnsmasq-2.78-18.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:dnsmasq-2.78-18.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:dnsmasq-2.78-18.3.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:dnsmasq-2.78-18.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:dnsmasq-2.78-18.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:dnsmasq-2.78-18.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:dnsmasq-2.78-18.3.1.s390x", "SUSE Linux Enterprise Server 12 SP2:dnsmasq-2.78-18.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:dnsmasq-2.78-18.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:dnsmasq-2.78-18.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:dnsmasq-2.78-18.3.1.s390x", "SUSE Linux Enterprise Server 12 SP3:dnsmasq-2.78-18.3.1.x86_64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:dnsmasq-2.78-18.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:dnsmasq-2.78-18.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:dnsmasq-2.78-18.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:dnsmasq-2.78-18.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:dnsmasq-2.78-18.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:dnsmasq-2.78-18.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:dnsmasq-2.78-18.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dnsmasq-2.78-18.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dnsmasq-2.78-18.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dnsmasq-2.78-18.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dnsmasq-2.78-18.3.1.x86_64", "SUSE OpenStack Cloud 6:dnsmasq-2.78-18.3.1.x86_64", "SUSE OpenStack Cloud 6:dnsmasq-utils-2.78-18.3.1.x86_64", "SUSE OpenStack Cloud 7:dnsmasq-utils-2.78-18.3.1.aarch64", "SUSE OpenStack Cloud 7:dnsmasq-utils-2.78-18.3.1.s390x", "SUSE OpenStack Cloud 7:dnsmasq-utils-2.78-18.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-14496", url: "https://www.suse.com/security/cve/CVE-2017-14496", }, { category: "external", summary: "SUSE Bug 1060360 for CVE-2017-14496", url: "https://bugzilla.suse.com/1060360", }, { category: "external", summary: "SUSE Bug 1060361 for CVE-2017-14496", url: "https://bugzilla.suse.com/1060361", }, { category: "external", summary: "SUSE Bug 1060362 for CVE-2017-14496", url: "https://bugzilla.suse.com/1060362", }, { category: "external", summary: "SUSE Bug 1060364 for CVE-2017-14496", url: "https://bugzilla.suse.com/1060364", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP2:dnsmasq-2.78-18.3.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:dnsmasq-2.78-18.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:dnsmasq-2.78-18.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:dnsmasq-2.78-18.3.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:dnsmasq-2.78-18.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:dnsmasq-2.78-18.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:dnsmasq-2.78-18.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:dnsmasq-2.78-18.3.1.s390x", "SUSE Linux Enterprise Server 12 SP2:dnsmasq-2.78-18.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:dnsmasq-2.78-18.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:dnsmasq-2.78-18.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:dnsmasq-2.78-18.3.1.s390x", "SUSE Linux Enterprise Server 12 SP3:dnsmasq-2.78-18.3.1.x86_64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:dnsmasq-2.78-18.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:dnsmasq-2.78-18.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:dnsmasq-2.78-18.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:dnsmasq-2.78-18.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:dnsmasq-2.78-18.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:dnsmasq-2.78-18.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:dnsmasq-2.78-18.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dnsmasq-2.78-18.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dnsmasq-2.78-18.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dnsmasq-2.78-18.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dnsmasq-2.78-18.3.1.x86_64", "SUSE OpenStack Cloud 6:dnsmasq-2.78-18.3.1.x86_64", "SUSE OpenStack Cloud 6:dnsmasq-utils-2.78-18.3.1.x86_64", "SUSE OpenStack Cloud 7:dnsmasq-utils-2.78-18.3.1.aarch64", "SUSE OpenStack Cloud 7:dnsmasq-utils-2.78-18.3.1.s390x", "SUSE OpenStack Cloud 7:dnsmasq-utils-2.78-18.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Desktop 12 SP2:dnsmasq-2.78-18.3.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:dnsmasq-2.78-18.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:dnsmasq-2.78-18.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:dnsmasq-2.78-18.3.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:dnsmasq-2.78-18.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:dnsmasq-2.78-18.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:dnsmasq-2.78-18.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:dnsmasq-2.78-18.3.1.s390x", "SUSE Linux Enterprise Server 12 SP2:dnsmasq-2.78-18.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:dnsmasq-2.78-18.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:dnsmasq-2.78-18.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:dnsmasq-2.78-18.3.1.s390x", "SUSE Linux Enterprise Server 12 SP3:dnsmasq-2.78-18.3.1.x86_64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:dnsmasq-2.78-18.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:dnsmasq-2.78-18.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:dnsmasq-2.78-18.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:dnsmasq-2.78-18.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:dnsmasq-2.78-18.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:dnsmasq-2.78-18.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:dnsmasq-2.78-18.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dnsmasq-2.78-18.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dnsmasq-2.78-18.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dnsmasq-2.78-18.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dnsmasq-2.78-18.3.1.x86_64", "SUSE OpenStack Cloud 6:dnsmasq-2.78-18.3.1.x86_64", "SUSE OpenStack Cloud 6:dnsmasq-utils-2.78-18.3.1.x86_64", "SUSE OpenStack Cloud 7:dnsmasq-utils-2.78-18.3.1.aarch64", "SUSE OpenStack Cloud 7:dnsmasq-utils-2.78-18.3.1.s390x", "SUSE OpenStack Cloud 7:dnsmasq-utils-2.78-18.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-02T13:53:24Z", details: "important", }, ], title: "CVE-2017-14496", }, ], }
suse-su-2017:2617-1
Vulnerability from csaf_suse
Notes
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for dnsmasq", title: "Title of the patch", }, { category: "description", text: "This update for dnsmasq fixes the following security issues:\n\n- CVE-2017-14491: 2 byte heap based overflow. [bsc#1060354]\n- CVE-2017-14492: heap based overflow. [bsc#1060355]\n- CVE-2017-14493: stack based overflow. [bsc#1060360]\n- CVE-2017-14494: DHCP - info leak. [bsc#1060361]\n- CVE-2017-14495: DNS - OOM DoS. [bsc#1060362]\n- CVE-2017-14496: DNS - DoS Integer underflow. [bsc#1060364]\n\nThis update brings a (small) potential incompatibility in the handling of\n'basename' in --pxe-service. Please read the CHANGELOG and the documentation if\nyou are using this option.\n", title: "Description of the patch", }, { category: "details", text: "sleposp3-dnsmasq-13296,slessp3-dnsmasq-13296", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2017_2617-1.json", }, { category: "self", summary: "URL for SUSE-SU-2017:2617-1", url: "https://www.suse.com/support/update/announcement/2017/suse-su-20172617-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2017:2617-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2017-October/003269.html", }, { category: "self", summary: "SUSE Bug 1060354", url: "https://bugzilla.suse.com/1060354", }, { category: "self", summary: "SUSE Bug 1060355", url: "https://bugzilla.suse.com/1060355", }, { category: "self", summary: "SUSE Bug 1060360", url: "https://bugzilla.suse.com/1060360", }, { category: "self", summary: "SUSE Bug 1060361", url: "https://bugzilla.suse.com/1060361", }, { category: "self", summary: "SUSE Bug 1060362", url: "https://bugzilla.suse.com/1060362", }, { category: "self", summary: "SUSE Bug 1060364", url: "https://bugzilla.suse.com/1060364", }, { category: "self", summary: "SUSE CVE CVE-2015-3294 page", url: "https://www.suse.com/security/cve/CVE-2015-3294/", }, { category: "self", summary: "SUSE CVE CVE-2015-8899 page", url: "https://www.suse.com/security/cve/CVE-2015-8899/", }, { category: "self", summary: "SUSE CVE CVE-2017-14491 page", url: "https://www.suse.com/security/cve/CVE-2017-14491/", }, { category: "self", summary: "SUSE CVE CVE-2017-14492 page", url: "https://www.suse.com/security/cve/CVE-2017-14492/", }, { category: "self", summary: "SUSE CVE CVE-2017-14493 page", url: "https://www.suse.com/security/cve/CVE-2017-14493/", }, { category: "self", summary: "SUSE CVE CVE-2017-14494 page", url: "https://www.suse.com/security/cve/CVE-2017-14494/", }, { category: "self", summary: "SUSE CVE CVE-2017-14495 page", url: "https://www.suse.com/security/cve/CVE-2017-14495/", }, { category: "self", summary: "SUSE CVE CVE-2017-14496 page", url: "https://www.suse.com/security/cve/CVE-2017-14496/", }, ], title: "Security update for dnsmasq", tracking: { current_release_date: "2017-10-02T13:53:56Z", generator: { date: "2017-10-02T13:53:56Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2017:2617-1", initial_release_date: "2017-10-02T13:53:56Z", revision_history: [ { date: "2017-10-02T13:53:56Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "dnsmasq-2.78-0.16.5.1.i586", product: { name: "dnsmasq-2.78-0.16.5.1.i586", product_id: "dnsmasq-2.78-0.16.5.1.i586", }, }, ], category: "architecture", name: "i586", }, { branches: [ { category: "product_version", name: "dnsmasq-2.78-0.16.5.1.s390x", product: { name: "dnsmasq-2.78-0.16.5.1.s390x", product_id: "dnsmasq-2.78-0.16.5.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "dnsmasq-2.78-0.16.5.1.x86_64", product: { name: "dnsmasq-2.78-0.16.5.1.x86_64", product_id: "dnsmasq-2.78-0.16.5.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Point of Sale 11 SP3", product: { name: "SUSE Linux Enterprise Point of Sale 11 SP3", product_id: "SUSE Linux Enterprise Point of Sale 11 SP3", product_identification_helper: { cpe: "cpe:/o:suse:sle-pos:11:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 11 SP3-LTSS", product: { name: "SUSE Linux Enterprise Server 11 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP3-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:suse_sles_ltss:11:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 11 SP3-TERADATA", product: { name: "SUSE Linux Enterprise Server 11 SP3-TERADATA", product_id: "SUSE Linux Enterprise Server 11 SP3-TERADATA", product_identification_helper: { cpe: "cpe:/o:suse:sles:11:sp3:teradata", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "dnsmasq-2.78-0.16.5.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", product_id: "SUSE Linux Enterprise Point of Sale 11 SP3:dnsmasq-2.78-0.16.5.1.i586", }, product_reference: "dnsmasq-2.78-0.16.5.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Point of Sale 11 SP3", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-2.78-0.16.5.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.i586", }, product_reference: "dnsmasq-2.78-0.16.5.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-2.78-0.16.5.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.s390x", }, product_reference: "dnsmasq-2.78-0.16.5.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-2.78-0.16.5.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.x86_64", }, product_reference: "dnsmasq-2.78-0.16.5.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-2.78-0.16.5.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", product_id: "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.i586", }, product_reference: "dnsmasq-2.78-0.16.5.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP3-TERADATA", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-2.78-0.16.5.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", product_id: "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.s390x", }, product_reference: "dnsmasq-2.78-0.16.5.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP3-TERADATA", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-2.78-0.16.5.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", product_id: "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.x86_64", }, product_reference: "dnsmasq-2.78-0.16.5.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP3-TERADATA", }, ], }, vulnerabilities: [ { cve: "CVE-2015-3294", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-3294", }, ], notes: [ { category: "general", text: "The tcp_request function in Dnsmasq before 2.73rc4 does not properly handle the return value of the setup_reply function, which allows remote attackers to read process memory and cause a denial of service (out-of-bounds read and crash) via a malformed DNS request.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Point of Sale 11 SP3:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-3294", url: "https://www.suse.com/security/cve/CVE-2015-3294", }, { category: "external", summary: "SUSE Bug 923144 for CVE-2015-3294", url: "https://bugzilla.suse.com/923144", }, { category: "external", summary: "SUSE Bug 928867 for CVE-2015-3294", url: "https://bugzilla.suse.com/928867", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Point of Sale 11 SP3:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-02T13:53:56Z", details: "moderate", }, ], title: "CVE-2015-3294", }, { cve: "CVE-2015-8899", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-8899", }, ], notes: [ { category: "general", text: "Dnsmasq before 2.76 allows remote servers to cause a denial of service (crash) via a reply with an empty DNS address that has an (1) A or (2) AAAA record defined locally.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Point of Sale 11 SP3:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-8899", url: "https://www.suse.com/security/cve/CVE-2015-8899", }, { category: "external", summary: "SUSE Bug 983273 for CVE-2015-8899", url: "https://bugzilla.suse.com/983273", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Point of Sale 11 SP3:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-02T13:53:56Z", details: "moderate", }, ], title: "CVE-2015-8899", }, { cve: "CVE-2017-14491", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-14491", }, ], notes: [ { category: "general", text: "Heap-based buffer overflow in dnsmasq before 2.78 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted DNS response.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Point of Sale 11 SP3:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-14491", url: "https://www.suse.com/security/cve/CVE-2017-14491", }, { category: "external", summary: "SUSE Bug 1060354 for CVE-2017-14491", url: "https://bugzilla.suse.com/1060354", }, { category: "external", summary: "SUSE Bug 1060360 for CVE-2017-14491", url: "https://bugzilla.suse.com/1060360", }, { category: "external", summary: "SUSE Bug 1060361 for CVE-2017-14491", url: "https://bugzilla.suse.com/1060361", }, { category: "external", summary: "SUSE Bug 1060362 for CVE-2017-14491", url: "https://bugzilla.suse.com/1060362", }, { category: "external", summary: "SUSE Bug 1060364 for CVE-2017-14491", url: "https://bugzilla.suse.com/1060364", }, { category: "external", summary: "SUSE Bug 1063832 for CVE-2017-14491", url: "https://bugzilla.suse.com/1063832", }, { category: "external", summary: "SUSE Bug 1143944 for CVE-2017-14491", url: "https://bugzilla.suse.com/1143944", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Point of Sale 11 SP3:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Point of Sale 11 SP3:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-02T13:53:56Z", details: "moderate", }, ], title: "CVE-2017-14491", }, { cve: "CVE-2017-14492", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-14492", }, ], notes: [ { category: "general", text: "Heap-based buffer overflow in dnsmasq before 2.78 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted IPv6 router advertisement request.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Point of Sale 11 SP3:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-14492", url: "https://www.suse.com/security/cve/CVE-2017-14492", }, { category: "external", summary: "SUSE Bug 1060355 for CVE-2017-14492", url: "https://bugzilla.suse.com/1060355", }, { category: "external", summary: "SUSE Bug 1060360 for CVE-2017-14492", url: "https://bugzilla.suse.com/1060360", }, { category: "external", summary: "SUSE Bug 1060361 for CVE-2017-14492", url: "https://bugzilla.suse.com/1060361", }, { category: "external", summary: "SUSE Bug 1060362 for CVE-2017-14492", url: "https://bugzilla.suse.com/1060362", }, { category: "external", summary: "SUSE Bug 1060364 for CVE-2017-14492", url: "https://bugzilla.suse.com/1060364", }, { category: "external", summary: "SUSE Bug 1063832 for CVE-2017-14492", url: "https://bugzilla.suse.com/1063832", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Point of Sale 11 SP3:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Point of Sale 11 SP3:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-02T13:53:56Z", details: "moderate", }, ], title: "CVE-2017-14492", }, { cve: "CVE-2017-14493", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-14493", }, ], notes: [ { category: "general", text: "Stack-based buffer overflow in dnsmasq before 2.78 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted DHCPv6 request.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Point of Sale 11 SP3:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-14493", url: "https://www.suse.com/security/cve/CVE-2017-14493", }, { category: "external", summary: "SUSE Bug 1060360 for CVE-2017-14493", url: "https://bugzilla.suse.com/1060360", }, { category: "external", summary: "SUSE Bug 1060361 for CVE-2017-14493", url: "https://bugzilla.suse.com/1060361", }, { category: "external", summary: "SUSE Bug 1060362 for CVE-2017-14493", url: "https://bugzilla.suse.com/1060362", }, { category: "external", summary: "SUSE Bug 1060364 for CVE-2017-14493", url: "https://bugzilla.suse.com/1060364", }, { category: "external", summary: "SUSE Bug 1063832 for CVE-2017-14493", url: "https://bugzilla.suse.com/1063832", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Point of Sale 11 SP3:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Point of Sale 11 SP3:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-02T13:53:56Z", details: "moderate", }, ], title: "CVE-2017-14493", }, { cve: "CVE-2017-14494", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-14494", }, ], notes: [ { category: "general", text: "dnsmasq before 2.78, when configured as a relay, allows remote attackers to obtain sensitive memory information via vectors involving handling DHCPv6 forwarded requests.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Point of Sale 11 SP3:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-14494", url: "https://www.suse.com/security/cve/CVE-2017-14494", }, { category: "external", summary: "SUSE Bug 1060360 for CVE-2017-14494", url: "https://bugzilla.suse.com/1060360", }, { category: "external", summary: "SUSE Bug 1060361 for CVE-2017-14494", url: "https://bugzilla.suse.com/1060361", }, { category: "external", summary: "SUSE Bug 1060362 for CVE-2017-14494", url: "https://bugzilla.suse.com/1060362", }, { category: "external", summary: "SUSE Bug 1060364 for CVE-2017-14494", url: "https://bugzilla.suse.com/1060364", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Point of Sale 11 SP3:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Point of Sale 11 SP3:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-02T13:53:56Z", details: "moderate", }, ], title: "CVE-2017-14494", }, { cve: "CVE-2017-14495", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-14495", }, ], notes: [ { category: "general", text: "Memory leak in dnsmasq before 2.78, when the --add-mac, --add-cpe-id or --add-subnet option is specified, allows remote attackers to cause a denial of service (memory consumption) via vectors involving DNS response creation.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Point of Sale 11 SP3:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-14495", url: "https://www.suse.com/security/cve/CVE-2017-14495", }, { category: "external", summary: "SUSE Bug 1060360 for CVE-2017-14495", url: "https://bugzilla.suse.com/1060360", }, { category: "external", summary: "SUSE Bug 1060361 for CVE-2017-14495", url: "https://bugzilla.suse.com/1060361", }, { category: "external", summary: "SUSE Bug 1060362 for CVE-2017-14495", url: "https://bugzilla.suse.com/1060362", }, { category: "external", summary: "SUSE Bug 1060364 for CVE-2017-14495", url: "https://bugzilla.suse.com/1060364", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Point of Sale 11 SP3:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Point of Sale 11 SP3:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-02T13:53:56Z", details: "important", }, ], title: "CVE-2017-14495", }, { cve: "CVE-2017-14496", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-14496", }, ], notes: [ { category: "general", text: "Integer underflow in the add_pseudoheader function in dnsmasq before 2.78 , when the --add-mac, --add-cpe-id or --add-subnet option is specified, allows remote attackers to cause a denial of service via a crafted DNS request.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Point of Sale 11 SP3:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-14496", url: "https://www.suse.com/security/cve/CVE-2017-14496", }, { category: "external", summary: "SUSE Bug 1060360 for CVE-2017-14496", url: "https://bugzilla.suse.com/1060360", }, { category: "external", summary: "SUSE Bug 1060361 for CVE-2017-14496", url: "https://bugzilla.suse.com/1060361", }, { category: "external", summary: "SUSE Bug 1060362 for CVE-2017-14496", url: "https://bugzilla.suse.com/1060362", }, { category: "external", summary: "SUSE Bug 1060364 for CVE-2017-14496", url: "https://bugzilla.suse.com/1060364", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Point of Sale 11 SP3:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Point of Sale 11 SP3:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:dnsmasq-2.78-0.16.5.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:dnsmasq-2.78-0.16.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-02T13:53:56Z", details: "important", }, ], title: "CVE-2017-14496", }, ], }
ghsa-7mpq-366q-m6vq
Vulnerability from github
Stack-based buffer overflow in dnsmasq before 2.78 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted DHCPv6 request.
{ affected: [], aliases: [ "CVE-2017-14493", ], database_specific: { cwe_ids: [ "CWE-119", ], github_reviewed: false, github_reviewed_at: null, nvd_published_at: "2017-10-03T01:29:00Z", severity: "CRITICAL", }, details: "Stack-based buffer overflow in dnsmasq before 2.78 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted DHCPv6 request.", id: "GHSA-7mpq-366q-m6vq", modified: "2025-04-20T03:46:12Z", published: "2022-05-14T03:40:36Z", references: [ { type: "ADVISORY", url: "https://nvd.nist.gov/vuln/detail/CVE-2017-14493", }, { type: "WEB", url: "https://access.redhat.com/errata/RHSA-2017:2836", }, { type: "WEB", url: "https://access.redhat.com/errata/RHSA-2017:2837", }, { type: "WEB", url: "https://access.redhat.com/security/vulnerabilities/3199382", }, { type: "WEB", url: "https://security.gentoo.org/glsa/201710-27", }, { type: "WEB", url: "https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html", }, { type: "WEB", url: "https://www.exploit-db.com/exploits/42943", }, { type: "WEB", url: "https://www.kb.cert.org/vuls/id/973527", }, { type: "WEB", url: "https://www.mail-archive.com/dnsmasq-discuss%40lists.thekelleys.org.uk/msg11664.html", }, { type: "WEB", url: "https://www.mail-archive.com/dnsmasq-discuss%40lists.thekelleys.org.uk/msg11665.html", }, { type: "WEB", url: "https://www.mail-archive.com/dnsmasq-discuss@lists.thekelleys.org.uk/msg11664.html", }, { type: "WEB", url: "https://www.mail-archive.com/dnsmasq-discuss@lists.thekelleys.org.uk/msg11665.html", }, { type: "WEB", url: "https://www.synology.com/support/security/Synology_SA_17_59_Dnsmasq", }, { type: "WEB", url: "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00006.html", }, { type: "WEB", url: "http://nvidia.custhelp.com/app/answers/detail/a_id/4561", }, { type: "WEB", url: "http://thekelleys.org.uk/dnsmasq/CHANGELOG", }, { type: "WEB", url: "http://thekelleys.org.uk/gitweb/?p=dnsmasq.git%3Ba=commit%3Bh=3d4ff1ba8419546490b464418223132529514033", }, { type: "WEB", url: "http://thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=commit;h=3d4ff1ba8419546490b464418223132529514033", }, { type: "WEB", url: "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-005.txt", }, { type: "WEB", url: "http://www.debian.org/security/2017/dsa-3989", }, { type: "WEB", url: "http://www.securityfocus.com/bid/101085", }, { type: "WEB", url: "http://www.securitytracker.com/id/1039474", }, { type: "WEB", url: "http://www.ubuntu.com/usn/USN-3430-1", }, { type: "WEB", url: "http://www.ubuntu.com/usn/USN-3430-2", }, ], schema_version: "1.4.0", severity: [ { score: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", type: "CVSS_V3", }, ], }
gsd-2017-14493
Vulnerability from gsd
{ GSD: { alias: "CVE-2017-14493", description: "Stack-based buffer overflow in dnsmasq before 2.78 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted DHCPv6 request.", id: "GSD-2017-14493", references: [ "https://www.suse.com/security/cve/CVE-2017-14493.html", "https://www.debian.org/security/2017/dsa-3989", "https://access.redhat.com/errata/RHSA-2017:2837", "https://access.redhat.com/errata/RHSA-2017:2836", "https://ubuntu.com/security/CVE-2017-14493", "https://advisories.mageia.org/CVE-2017-14493.html", "https://security.archlinux.org/CVE-2017-14493", "https://alas.aws.amazon.com/cve/html/CVE-2017-14493.html", "https://linux.oracle.com/cve/CVE-2017-14493.html", "https://packetstormsecurity.com/files/cve/CVE-2017-14493", ], }, gsd: { metadata: { exploitCode: "unknown", remediation: "unknown", reportConfidence: "confirmed", type: "vulnerability", }, osvSchema: { aliases: [ "CVE-2017-14493", ], details: "Stack-based buffer overflow in dnsmasq before 2.78 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted DHCPv6 request.", id: "GSD-2017-14493", modified: "2023-12-13T01:21:12.870730Z", schema_version: "1.4.0", }, }, namespaces: { "cve.org": { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2017-14493", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Stack-based buffer overflow in dnsmasq before 2.78 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted DHCPv6 request.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "1039474", refsource: "SECTRACK", url: "http://www.securitytracker.com/id/1039474", }, { name: "https://www.synology.com/support/security/Synology_SA_17_59_Dnsmasq", refsource: "CONFIRM", url: "https://www.synology.com/support/security/Synology_SA_17_59_Dnsmasq", }, { name: "DSA-3989", refsource: "DEBIAN", url: "http://www.debian.org/security/2017/dsa-3989", }, { name: "http://thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=commit;h=3d4ff1ba8419546490b464418223132529514033", refsource: "CONFIRM", url: "http://thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=commit;h=3d4ff1ba8419546490b464418223132529514033", }, { name: "https://access.redhat.com/security/vulnerabilities/3199382", refsource: "CONFIRM", url: "https://access.redhat.com/security/vulnerabilities/3199382", }, { name: "101085", refsource: "BID", url: "http://www.securityfocus.com/bid/101085", }, { name: "42943", refsource: "EXPLOIT-DB", url: "https://www.exploit-db.com/exploits/42943/", }, { name: "USN-3430-1", refsource: "UBUNTU", url: "http://www.ubuntu.com/usn/USN-3430-1", }, { name: "VU#973527", refsource: "CERT-VN", url: "https://www.kb.cert.org/vuls/id/973527", }, { name: "GLSA-201710-27", refsource: "GENTOO", url: "https://security.gentoo.org/glsa/201710-27", }, { name: "USN-3430-2", refsource: "UBUNTU", url: "http://www.ubuntu.com/usn/USN-3430-2", }, { name: "[dnsmasq-discuss] 20171002 Announce: dnsmasq-2.78.", refsource: "MLIST", url: "https://www.mail-archive.com/dnsmasq-discuss@lists.thekelleys.org.uk/msg11665.html", }, { name: "RHSA-2017:2836", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2017:2836", }, { name: "http://nvidia.custhelp.com/app/answers/detail/a_id/4561", refsource: "CONFIRM", url: "http://nvidia.custhelp.com/app/answers/detail/a_id/4561", }, { name: "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-005.txt", refsource: "CONFIRM", url: "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-005.txt", }, { name: "RHSA-2017:2837", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2017:2837", }, { name: "http://thekelleys.org.uk/dnsmasq/CHANGELOG", refsource: "CONFIRM", url: "http://thekelleys.org.uk/dnsmasq/CHANGELOG", }, { name: "openSUSE-SU-2017:2633", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00006.html", }, { name: "https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html", refsource: "MISC", url: "https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html", }, { name: "[dnsmasq-discuss] 20171002 IMPORTANT SECURITY INFORMATION.", refsource: "MLIST", url: "https://www.mail-archive.com/dnsmasq-discuss@lists.thekelleys.org.uk/msg11664.html", }, ], }, }, "nvd.nist.gov": { configurations: { CVE_data_version: "4.0", nodes: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:canonical:ubuntu_linux:17.04:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:debian:debian_linux:7.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:opensuse:leap:42.2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:a:thekelleys:dnsmasq:*:*:*:*:*:*:*:*", cpe_name: [], versionEndIncluding: "2.77", vulnerable: true, }, ], operator: "OR", }, ], }, cve: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2017-14493", }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "en", value: "Stack-based buffer overflow in dnsmasq before 2.78 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted DHCPv6 request.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "en", value: "CWE-119", }, ], }, ], }, references: { reference_data: [ { name: "[dnsmasq-discuss] 20171002 Announce: dnsmasq-2.78.", refsource: "MLIST", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://www.mail-archive.com/dnsmasq-discuss@lists.thekelleys.org.uk/msg11665.html", }, { name: "[dnsmasq-discuss] 20171002 IMPORTANT SECURITY INFORMATION.", refsource: "MLIST", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://www.mail-archive.com/dnsmasq-discuss@lists.thekelleys.org.uk/msg11664.html", }, { name: "https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html", refsource: "MISC", tags: [ "Third Party Advisory", ], url: "https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html", }, { name: "http://thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=commit;h=3d4ff1ba8419546490b464418223132529514033", refsource: "CONFIRM", tags: [ "Vendor Advisory", ], url: "http://thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=commit;h=3d4ff1ba8419546490b464418223132529514033", }, { name: "http://thekelleys.org.uk/dnsmasq/CHANGELOG", refsource: "CONFIRM", tags: [ "Release Notes", "Vendor Advisory", ], url: "http://thekelleys.org.uk/dnsmasq/CHANGELOG", }, { name: "1039474", refsource: "SECTRACK", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securitytracker.com/id/1039474", }, { name: "42943", refsource: "EXPLOIT-DB", tags: [ "Exploit", "Third Party Advisory", "VDB Entry", ], url: "https://www.exploit-db.com/exploits/42943/", }, { name: "101085", refsource: "BID", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/101085", }, { name: "VU#973527", refsource: "CERT-VN", tags: [ "Third Party Advisory", "US Government Resource", ], url: "https://www.kb.cert.org/vuls/id/973527", }, { name: "https://access.redhat.com/security/vulnerabilities/3199382", refsource: "CONFIRM", tags: [ "Issue Tracking", "Third Party Advisory", ], url: "https://access.redhat.com/security/vulnerabilities/3199382", }, { name: "RHSA-2017:2837", refsource: "REDHAT", tags: [ "Patch", "Third Party Advisory", ], url: "https://access.redhat.com/errata/RHSA-2017:2837", }, { name: "RHSA-2017:2836", refsource: "REDHAT", tags: [ "Patch", "Third Party Advisory", ], url: "https://access.redhat.com/errata/RHSA-2017:2836", }, { name: "USN-3430-2", refsource: "UBUNTU", tags: [ "Third Party Advisory", ], url: "http://www.ubuntu.com/usn/USN-3430-2", }, { name: "USN-3430-1", refsource: "UBUNTU", tags: [ "Third Party Advisory", ], url: "http://www.ubuntu.com/usn/USN-3430-1", }, { name: "DSA-3989", refsource: "DEBIAN", tags: [ "Third Party Advisory", ], url: "http://www.debian.org/security/2017/dsa-3989", }, { name: "openSUSE-SU-2017:2633", refsource: "SUSE", tags: [ "Issue Tracking", "Mailing List", "Third Party Advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00006.html", }, { name: "http://nvidia.custhelp.com/app/answers/detail/a_id/4561", refsource: "CONFIRM", tags: [ "Third Party Advisory", ], url: "http://nvidia.custhelp.com/app/answers/detail/a_id/4561", }, { name: "GLSA-201710-27", refsource: "GENTOO", tags: [ "Third Party Advisory", ], url: "https://security.gentoo.org/glsa/201710-27", }, { name: "https://www.synology.com/support/security/Synology_SA_17_59_Dnsmasq", refsource: "CONFIRM", tags: [ "Third Party Advisory", ], url: "https://www.synology.com/support/security/Synology_SA_17_59_Dnsmasq", }, { name: "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-005.txt", refsource: "CONFIRM", tags: [], url: "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-005.txt", }, ], }, }, impact: { baseMetricV2: { cvssV2: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 7.5, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, severity: "HIGH", userInteractionRequired: false, }, baseMetricV3: { cvssV3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, exploitabilityScore: 3.9, impactScore: 5.9, }, }, lastModifiedDate: "2018-03-04T02:29Z", publishedDate: "2017-10-03T01:29Z", }, }, }
fkie_cve-2017-14493
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
canonical | ubuntu_linux | 14.04 | |
canonical | ubuntu_linux | 16.04 | |
canonical | ubuntu_linux | 17.04 | |
debian | debian_linux | 7.0 | |
debian | debian_linux | 7.1 | |
debian | debian_linux | 9.0 | |
opensuse | leap | 42.2 | |
opensuse | leap | 42.3 | |
redhat | enterprise_linux_desktop | 7.0 | |
redhat | enterprise_linux_server | 7.0 | |
redhat | enterprise_linux_workstation | 7.0 | |
thekelleys | dnsmasq | * |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", matchCriteriaId: "B5A6F2F3-4894-4392-8296-3B8DD2679084", vulnerable: true, }, { criteria: "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", matchCriteriaId: "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B", vulnerable: true, }, { criteria: "cpe:2.3:o:canonical:ubuntu_linux:17.04:*:*:*:*:*:*:*", matchCriteriaId: "588D4F37-0A56-47A4-B710-4D5F3D214FB9", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", matchCriteriaId: "16F59A04-14CF-49E2-9973-645477EA09DA", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:7.1:*:*:*:*:*:*:*", matchCriteriaId: "7B21E9A8-CE63-42C2-A11A-94D977A96DF1", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", matchCriteriaId: "DEECE5FC-CACF-4496-A3E7-164736409252", vulnerable: true, }, { criteria: "cpe:2.3:o:opensuse:leap:42.2:*:*:*:*:*:*:*", matchCriteriaId: "1EA337A3-B9A3-4962-B8BD-8E0C7C5B28EB", vulnerable: true, }, { criteria: "cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*", matchCriteriaId: "5F65DAB0-3DAD-49FF-BC73-3581CC3D5BF3", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", matchCriteriaId: "33C068A4-3780-4EAB-A937-6082DF847564", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", matchCriteriaId: "51EF4996-72F4-4FA4-814F-F5991E7A8318", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", matchCriteriaId: "825ECE2D-E232-46E0-A047-074B34DB1E97", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:thekelleys:dnsmasq:*:*:*:*:*:*:*:*", matchCriteriaId: "B85D7A28-8CBA-4D77-AD30-DB3CA49F2F98", versionEndIncluding: "2.77", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Stack-based buffer overflow in dnsmasq before 2.78 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted DHCPv6 request.", }, { lang: "es", value: "Un desbordamiento de búfer basado en pila en dnsmasq en versiones anteriores a la 2.78 permite a los atacantes provocar una denegación de servicio (cierre inesperado) o ejecutar código arbitrario mediante una petición DHCPv6 manipulada.", }, ], id: "CVE-2017-14493", lastModified: "2025-04-20T01:37:25.860", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 7.5, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, exploitabilityScore: 3.9, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2017-10-03T01:29:02.077", references: [ { source: "cve@mitre.org", tags: [ "Issue Tracking", "Mailing List", "Third Party Advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00006.html", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "http://nvidia.custhelp.com/app/answers/detail/a_id/4561", }, { source: "cve@mitre.org", tags: [ "Release Notes", "Vendor Advisory", ], url: "http://thekelleys.org.uk/dnsmasq/CHANGELOG", }, { source: "cve@mitre.org", url: "http://thekelleys.org.uk/gitweb/?p=dnsmasq.git%3Ba=commit%3Bh=3d4ff1ba8419546490b464418223132529514033", }, { source: "cve@mitre.org", url: "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-005.txt", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "http://www.debian.org/security/2017/dsa-3989", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/101085", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securitytracker.com/id/1039474", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "http://www.ubuntu.com/usn/USN-3430-1", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "http://www.ubuntu.com/usn/USN-3430-2", }, { source: "cve@mitre.org", tags: [ "Patch", "Third Party Advisory", ], url: "https://access.redhat.com/errata/RHSA-2017:2836", }, { source: "cve@mitre.org", tags: [ "Patch", "Third Party Advisory", ], url: "https://access.redhat.com/errata/RHSA-2017:2837", }, { source: "cve@mitre.org", tags: [ "Issue Tracking", "Third Party Advisory", ], url: "https://access.redhat.com/security/vulnerabilities/3199382", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://security.gentoo.org/glsa/201710-27", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html", }, { source: "cve@mitre.org", tags: [ "Exploit", "Third Party Advisory", "VDB Entry", ], url: "https://www.exploit-db.com/exploits/42943/", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", "US Government Resource", ], url: "https://www.kb.cert.org/vuls/id/973527", }, { source: "cve@mitre.org", url: "https://www.mail-archive.com/dnsmasq-discuss%40lists.thekelleys.org.uk/msg11664.html", }, { source: "cve@mitre.org", url: "https://www.mail-archive.com/dnsmasq-discuss%40lists.thekelleys.org.uk/msg11665.html", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://www.synology.com/support/security/Synology_SA_17_59_Dnsmasq", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Issue Tracking", "Mailing List", "Third Party Advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00006.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "http://nvidia.custhelp.com/app/answers/detail/a_id/4561", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Release Notes", "Vendor Advisory", ], url: "http://thekelleys.org.uk/dnsmasq/CHANGELOG", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://thekelleys.org.uk/gitweb/?p=dnsmasq.git%3Ba=commit%3Bh=3d4ff1ba8419546490b464418223132529514033", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-005.txt", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "http://www.debian.org/security/2017/dsa-3989", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/101085", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securitytracker.com/id/1039474", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "http://www.ubuntu.com/usn/USN-3430-1", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "http://www.ubuntu.com/usn/USN-3430-2", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Third Party Advisory", ], url: "https://access.redhat.com/errata/RHSA-2017:2836", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Third Party Advisory", ], url: "https://access.redhat.com/errata/RHSA-2017:2837", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Issue Tracking", "Third Party Advisory", ], url: "https://access.redhat.com/security/vulnerabilities/3199382", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://security.gentoo.org/glsa/201710-27", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Third Party Advisory", "VDB Entry", ], url: "https://www.exploit-db.com/exploits/42943/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "US Government Resource", ], url: "https://www.kb.cert.org/vuls/id/973527", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://www.mail-archive.com/dnsmasq-discuss%40lists.thekelleys.org.uk/msg11664.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://www.mail-archive.com/dnsmasq-discuss%40lists.thekelleys.org.uk/msg11665.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://www.synology.com/support/security/Synology_SA_17_59_Dnsmasq", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Deferred", weaknesses: [ { description: [ { lang: "en", value: "CWE-119", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
opensuse-su-2024:10721-1
Vulnerability from csaf_opensuse
Notes
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "dnsmasq-2.86-1.1 on GA media", title: "Title of the patch", }, { category: "description", text: "These are all security issues fixed in the dnsmasq-2.86-1.1 package on the GA media of openSUSE Tumbleweed.", title: "Description of the patch", }, { category: "details", text: "openSUSE-Tumbleweed-2024-10721", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10721-1.json", }, { category: "self", summary: "SUSE CVE CVE-2017-14491 page", url: "https://www.suse.com/security/cve/CVE-2017-14491/", }, { category: "self", summary: "SUSE CVE CVE-2017-14492 page", url: "https://www.suse.com/security/cve/CVE-2017-14492/", }, { category: "self", summary: "SUSE CVE CVE-2017-14493 page", url: "https://www.suse.com/security/cve/CVE-2017-14493/", }, { category: "self", summary: "SUSE CVE CVE-2017-14494 page", url: "https://www.suse.com/security/cve/CVE-2017-14494/", }, { category: "self", summary: "SUSE CVE CVE-2017-14495 page", url: "https://www.suse.com/security/cve/CVE-2017-14495/", }, { category: "self", summary: "SUSE CVE CVE-2017-14496 page", url: "https://www.suse.com/security/cve/CVE-2017-14496/", }, { category: "self", summary: "SUSE CVE CVE-2017-15107 page", url: "https://www.suse.com/security/cve/CVE-2017-15107/", }, { category: "self", summary: "SUSE CVE CVE-2019-14834 page", url: "https://www.suse.com/security/cve/CVE-2019-14834/", }, { category: "self", summary: "SUSE CVE CVE-2020-25681 page", url: "https://www.suse.com/security/cve/CVE-2020-25681/", }, { category: "self", summary: "SUSE CVE CVE-2020-25683 page", url: "https://www.suse.com/security/cve/CVE-2020-25683/", }, { category: "self", summary: "SUSE CVE CVE-2020-25684 page", url: "https://www.suse.com/security/cve/CVE-2020-25684/", }, { category: "self", summary: "SUSE CVE CVE-2020-25685 page", url: "https://www.suse.com/security/cve/CVE-2020-25685/", }, { category: "self", summary: "SUSE CVE CVE-2020-25686 page", url: "https://www.suse.com/security/cve/CVE-2020-25686/", }, { category: "self", summary: "SUSE CVE CVE-2021-3448 page", url: "https://www.suse.com/security/cve/CVE-2021-3448/", }, ], title: "dnsmasq-2.86-1.1 on GA media", tracking: { current_release_date: "2024-06-15T00:00:00Z", generator: { date: "2024-06-15T00:00:00Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "openSUSE-SU-2024:10721-1", initial_release_date: "2024-06-15T00:00:00Z", revision_history: [ { date: "2024-06-15T00:00:00Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "dnsmasq-2.86-1.1.aarch64", product: { name: "dnsmasq-2.86-1.1.aarch64", product_id: "dnsmasq-2.86-1.1.aarch64", }, }, { category: "product_version", name: "dnsmasq-utils-2.86-1.1.aarch64", product: { name: "dnsmasq-utils-2.86-1.1.aarch64", product_id: "dnsmasq-utils-2.86-1.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "dnsmasq-2.86-1.1.ppc64le", product: { name: "dnsmasq-2.86-1.1.ppc64le", product_id: "dnsmasq-2.86-1.1.ppc64le", }, }, { category: "product_version", name: "dnsmasq-utils-2.86-1.1.ppc64le", product: { name: "dnsmasq-utils-2.86-1.1.ppc64le", product_id: "dnsmasq-utils-2.86-1.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "dnsmasq-2.86-1.1.s390x", product: { name: "dnsmasq-2.86-1.1.s390x", product_id: "dnsmasq-2.86-1.1.s390x", }, }, { category: "product_version", name: "dnsmasq-utils-2.86-1.1.s390x", product: { name: "dnsmasq-utils-2.86-1.1.s390x", product_id: "dnsmasq-utils-2.86-1.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "dnsmasq-2.86-1.1.x86_64", product: { name: "dnsmasq-2.86-1.1.x86_64", product_id: "dnsmasq-2.86-1.1.x86_64", }, }, { category: "product_version", name: "dnsmasq-utils-2.86-1.1.x86_64", product: { name: "dnsmasq-utils-2.86-1.1.x86_64", product_id: "dnsmasq-utils-2.86-1.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "openSUSE Tumbleweed", product: { name: "openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed", product_identification_helper: { cpe: "cpe:/o:opensuse:tumbleweed", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "dnsmasq-2.86-1.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:dnsmasq-2.86-1.1.aarch64", }, product_reference: "dnsmasq-2.86-1.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-2.86-1.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:dnsmasq-2.86-1.1.ppc64le", }, product_reference: "dnsmasq-2.86-1.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-2.86-1.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:dnsmasq-2.86-1.1.s390x", }, product_reference: "dnsmasq-2.86-1.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-2.86-1.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:dnsmasq-2.86-1.1.x86_64", }, product_reference: "dnsmasq-2.86-1.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-2.86-1.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.aarch64", }, product_reference: "dnsmasq-utils-2.86-1.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-2.86-1.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.ppc64le", }, product_reference: "dnsmasq-utils-2.86-1.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-2.86-1.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.s390x", }, product_reference: "dnsmasq-utils-2.86-1.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "dnsmasq-utils-2.86-1.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.x86_64", }, product_reference: "dnsmasq-utils-2.86-1.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, ], }, vulnerabilities: [ { cve: "CVE-2017-14491", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-14491", }, ], notes: [ { category: "general", text: "Heap-based buffer overflow in dnsmasq before 2.78 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted DNS response.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:dnsmasq-2.86-1.1.aarch64", "openSUSE Tumbleweed:dnsmasq-2.86-1.1.ppc64le", "openSUSE Tumbleweed:dnsmasq-2.86-1.1.s390x", "openSUSE Tumbleweed:dnsmasq-2.86-1.1.x86_64", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.aarch64", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.ppc64le", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.s390x", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-14491", url: "https://www.suse.com/security/cve/CVE-2017-14491", }, { category: "external", summary: "SUSE Bug 1060354 for CVE-2017-14491", url: "https://bugzilla.suse.com/1060354", }, { category: "external", summary: "SUSE Bug 1060360 for CVE-2017-14491", url: "https://bugzilla.suse.com/1060360", }, { category: "external", summary: "SUSE Bug 1060361 for CVE-2017-14491", url: "https://bugzilla.suse.com/1060361", }, { category: "external", summary: "SUSE Bug 1060362 for CVE-2017-14491", url: "https://bugzilla.suse.com/1060362", }, { category: "external", summary: "SUSE Bug 1060364 for CVE-2017-14491", url: "https://bugzilla.suse.com/1060364", }, { category: "external", summary: "SUSE Bug 1063832 for CVE-2017-14491", url: "https://bugzilla.suse.com/1063832", }, { category: "external", summary: "SUSE Bug 1143944 for CVE-2017-14491", url: "https://bugzilla.suse.com/1143944", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:dnsmasq-2.86-1.1.aarch64", "openSUSE Tumbleweed:dnsmasq-2.86-1.1.ppc64le", "openSUSE Tumbleweed:dnsmasq-2.86-1.1.s390x", "openSUSE Tumbleweed:dnsmasq-2.86-1.1.x86_64", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.aarch64", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.ppc64le", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.s390x", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:dnsmasq-2.86-1.1.aarch64", "openSUSE Tumbleweed:dnsmasq-2.86-1.1.ppc64le", "openSUSE Tumbleweed:dnsmasq-2.86-1.1.s390x", "openSUSE Tumbleweed:dnsmasq-2.86-1.1.x86_64", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.aarch64", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.ppc64le", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.s390x", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-14491", }, { cve: "CVE-2017-14492", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-14492", }, ], notes: [ { category: "general", text: "Heap-based buffer overflow in dnsmasq before 2.78 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted IPv6 router advertisement request.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:dnsmasq-2.86-1.1.aarch64", "openSUSE Tumbleweed:dnsmasq-2.86-1.1.ppc64le", "openSUSE Tumbleweed:dnsmasq-2.86-1.1.s390x", "openSUSE Tumbleweed:dnsmasq-2.86-1.1.x86_64", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.aarch64", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.ppc64le", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.s390x", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-14492", url: "https://www.suse.com/security/cve/CVE-2017-14492", }, { category: "external", summary: "SUSE Bug 1060355 for CVE-2017-14492", url: "https://bugzilla.suse.com/1060355", }, { category: "external", summary: "SUSE Bug 1060360 for CVE-2017-14492", url: "https://bugzilla.suse.com/1060360", }, { category: "external", summary: "SUSE Bug 1060361 for CVE-2017-14492", url: "https://bugzilla.suse.com/1060361", }, { category: "external", summary: "SUSE Bug 1060362 for CVE-2017-14492", url: "https://bugzilla.suse.com/1060362", }, { category: "external", summary: "SUSE Bug 1060364 for CVE-2017-14492", url: "https://bugzilla.suse.com/1060364", }, { category: "external", summary: "SUSE Bug 1063832 for CVE-2017-14492", url: "https://bugzilla.suse.com/1063832", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:dnsmasq-2.86-1.1.aarch64", "openSUSE Tumbleweed:dnsmasq-2.86-1.1.ppc64le", "openSUSE Tumbleweed:dnsmasq-2.86-1.1.s390x", "openSUSE Tumbleweed:dnsmasq-2.86-1.1.x86_64", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.aarch64", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.ppc64le", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.s390x", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:dnsmasq-2.86-1.1.aarch64", "openSUSE Tumbleweed:dnsmasq-2.86-1.1.ppc64le", "openSUSE Tumbleweed:dnsmasq-2.86-1.1.s390x", "openSUSE Tumbleweed:dnsmasq-2.86-1.1.x86_64", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.aarch64", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.ppc64le", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.s390x", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-14492", }, { cve: "CVE-2017-14493", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-14493", }, ], notes: [ { category: "general", text: "Stack-based buffer overflow in dnsmasq before 2.78 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted DHCPv6 request.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:dnsmasq-2.86-1.1.aarch64", "openSUSE Tumbleweed:dnsmasq-2.86-1.1.ppc64le", "openSUSE Tumbleweed:dnsmasq-2.86-1.1.s390x", "openSUSE Tumbleweed:dnsmasq-2.86-1.1.x86_64", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.aarch64", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.ppc64le", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.s390x", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-14493", url: "https://www.suse.com/security/cve/CVE-2017-14493", }, { category: "external", summary: "SUSE Bug 1060360 for CVE-2017-14493", url: "https://bugzilla.suse.com/1060360", }, { category: "external", summary: "SUSE Bug 1060361 for CVE-2017-14493", url: "https://bugzilla.suse.com/1060361", }, { category: "external", summary: "SUSE Bug 1060362 for CVE-2017-14493", url: "https://bugzilla.suse.com/1060362", }, { category: "external", summary: "SUSE Bug 1060364 for CVE-2017-14493", url: "https://bugzilla.suse.com/1060364", }, { category: "external", summary: "SUSE Bug 1063832 for CVE-2017-14493", url: "https://bugzilla.suse.com/1063832", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:dnsmasq-2.86-1.1.aarch64", "openSUSE Tumbleweed:dnsmasq-2.86-1.1.ppc64le", "openSUSE Tumbleweed:dnsmasq-2.86-1.1.s390x", "openSUSE Tumbleweed:dnsmasq-2.86-1.1.x86_64", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.aarch64", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.ppc64le", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.s390x", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:dnsmasq-2.86-1.1.aarch64", "openSUSE Tumbleweed:dnsmasq-2.86-1.1.ppc64le", "openSUSE Tumbleweed:dnsmasq-2.86-1.1.s390x", "openSUSE Tumbleweed:dnsmasq-2.86-1.1.x86_64", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.aarch64", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.ppc64le", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.s390x", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-14493", }, { cve: "CVE-2017-14494", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-14494", }, ], notes: [ { category: "general", text: "dnsmasq before 2.78, when configured as a relay, allows remote attackers to obtain sensitive memory information via vectors involving handling DHCPv6 forwarded requests.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:dnsmasq-2.86-1.1.aarch64", "openSUSE Tumbleweed:dnsmasq-2.86-1.1.ppc64le", "openSUSE Tumbleweed:dnsmasq-2.86-1.1.s390x", "openSUSE Tumbleweed:dnsmasq-2.86-1.1.x86_64", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.aarch64", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.ppc64le", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.s390x", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-14494", url: "https://www.suse.com/security/cve/CVE-2017-14494", }, { category: "external", summary: "SUSE Bug 1060360 for CVE-2017-14494", url: "https://bugzilla.suse.com/1060360", }, { category: "external", summary: "SUSE Bug 1060361 for CVE-2017-14494", url: "https://bugzilla.suse.com/1060361", }, { category: "external", summary: "SUSE Bug 1060362 for CVE-2017-14494", url: "https://bugzilla.suse.com/1060362", }, { category: "external", summary: "SUSE Bug 1060364 for CVE-2017-14494", url: "https://bugzilla.suse.com/1060364", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:dnsmasq-2.86-1.1.aarch64", "openSUSE Tumbleweed:dnsmasq-2.86-1.1.ppc64le", "openSUSE Tumbleweed:dnsmasq-2.86-1.1.s390x", "openSUSE Tumbleweed:dnsmasq-2.86-1.1.x86_64", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.aarch64", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.ppc64le", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.s390x", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.0", }, products: [ "openSUSE Tumbleweed:dnsmasq-2.86-1.1.aarch64", "openSUSE Tumbleweed:dnsmasq-2.86-1.1.ppc64le", "openSUSE Tumbleweed:dnsmasq-2.86-1.1.s390x", "openSUSE Tumbleweed:dnsmasq-2.86-1.1.x86_64", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.aarch64", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.ppc64le", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.s390x", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-14494", }, { cve: "CVE-2017-14495", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-14495", }, ], notes: [ { category: "general", text: "Memory leak in dnsmasq before 2.78, when the --add-mac, --add-cpe-id or --add-subnet option is specified, allows remote attackers to cause a denial of service (memory consumption) via vectors involving DNS response creation.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:dnsmasq-2.86-1.1.aarch64", "openSUSE Tumbleweed:dnsmasq-2.86-1.1.ppc64le", "openSUSE Tumbleweed:dnsmasq-2.86-1.1.s390x", "openSUSE Tumbleweed:dnsmasq-2.86-1.1.x86_64", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.aarch64", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.ppc64le", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.s390x", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-14495", url: "https://www.suse.com/security/cve/CVE-2017-14495", }, { category: "external", summary: "SUSE Bug 1060360 for CVE-2017-14495", url: "https://bugzilla.suse.com/1060360", }, { category: "external", summary: "SUSE Bug 1060361 for CVE-2017-14495", url: "https://bugzilla.suse.com/1060361", }, { category: "external", summary: "SUSE Bug 1060362 for CVE-2017-14495", url: "https://bugzilla.suse.com/1060362", }, { category: "external", summary: "SUSE Bug 1060364 for CVE-2017-14495", url: "https://bugzilla.suse.com/1060364", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:dnsmasq-2.86-1.1.aarch64", "openSUSE Tumbleweed:dnsmasq-2.86-1.1.ppc64le", "openSUSE Tumbleweed:dnsmasq-2.86-1.1.s390x", "openSUSE Tumbleweed:dnsmasq-2.86-1.1.x86_64", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.aarch64", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.ppc64le", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.s390x", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:dnsmasq-2.86-1.1.aarch64", "openSUSE Tumbleweed:dnsmasq-2.86-1.1.ppc64le", "openSUSE Tumbleweed:dnsmasq-2.86-1.1.s390x", "openSUSE Tumbleweed:dnsmasq-2.86-1.1.x86_64", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.aarch64", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.ppc64le", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.s390x", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2017-14495", }, { cve: "CVE-2017-14496", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-14496", }, ], notes: [ { category: "general", text: "Integer underflow in the add_pseudoheader function in dnsmasq before 2.78 , when the --add-mac, --add-cpe-id or --add-subnet option is specified, allows remote attackers to cause a denial of service via a crafted DNS request.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:dnsmasq-2.86-1.1.aarch64", "openSUSE Tumbleweed:dnsmasq-2.86-1.1.ppc64le", "openSUSE Tumbleweed:dnsmasq-2.86-1.1.s390x", "openSUSE Tumbleweed:dnsmasq-2.86-1.1.x86_64", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.aarch64", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.ppc64le", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.s390x", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-14496", url: "https://www.suse.com/security/cve/CVE-2017-14496", }, { category: "external", summary: "SUSE Bug 1060360 for CVE-2017-14496", url: "https://bugzilla.suse.com/1060360", }, { category: "external", summary: "SUSE Bug 1060361 for CVE-2017-14496", url: "https://bugzilla.suse.com/1060361", }, { category: "external", summary: "SUSE Bug 1060362 for CVE-2017-14496", url: "https://bugzilla.suse.com/1060362", }, { category: "external", summary: "SUSE Bug 1060364 for CVE-2017-14496", url: "https://bugzilla.suse.com/1060364", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:dnsmasq-2.86-1.1.aarch64", "openSUSE Tumbleweed:dnsmasq-2.86-1.1.ppc64le", "openSUSE Tumbleweed:dnsmasq-2.86-1.1.s390x", "openSUSE Tumbleweed:dnsmasq-2.86-1.1.x86_64", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.aarch64", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.ppc64le", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.s390x", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:dnsmasq-2.86-1.1.aarch64", "openSUSE Tumbleweed:dnsmasq-2.86-1.1.ppc64le", "openSUSE Tumbleweed:dnsmasq-2.86-1.1.s390x", "openSUSE Tumbleweed:dnsmasq-2.86-1.1.x86_64", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.aarch64", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.ppc64le", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.s390x", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2017-14496", }, { cve: "CVE-2017-15107", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-15107", }, ], notes: [ { category: "general", text: "A vulnerability was found in the implementation of DNSSEC in Dnsmasq up to and including 2.78. Wildcard synthesized NSEC records could be improperly interpreted to prove the non-existence of hostnames that actually exist.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:dnsmasq-2.86-1.1.aarch64", "openSUSE Tumbleweed:dnsmasq-2.86-1.1.ppc64le", "openSUSE Tumbleweed:dnsmasq-2.86-1.1.s390x", "openSUSE Tumbleweed:dnsmasq-2.86-1.1.x86_64", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.aarch64", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.ppc64le", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.s390x", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-15107", url: "https://www.suse.com/security/cve/CVE-2017-15107", }, { category: "external", summary: "SUSE Bug 1076958 for CVE-2017-15107", url: "https://bugzilla.suse.com/1076958", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:dnsmasq-2.86-1.1.aarch64", "openSUSE Tumbleweed:dnsmasq-2.86-1.1.ppc64le", "openSUSE Tumbleweed:dnsmasq-2.86-1.1.s390x", "openSUSE Tumbleweed:dnsmasq-2.86-1.1.x86_64", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.aarch64", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.ppc64le", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.s390x", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:dnsmasq-2.86-1.1.aarch64", "openSUSE Tumbleweed:dnsmasq-2.86-1.1.ppc64le", "openSUSE Tumbleweed:dnsmasq-2.86-1.1.s390x", "openSUSE Tumbleweed:dnsmasq-2.86-1.1.x86_64", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.aarch64", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.ppc64le", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.s390x", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-15107", }, { cve: "CVE-2019-14834", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-14834", }, ], notes: [ { category: "general", text: "A vulnerability was found in dnsmasq before version 2.81, where the memory leak allows remote attackers to cause a denial of service (memory consumption) via vectors involving DHCP response creation.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:dnsmasq-2.86-1.1.aarch64", "openSUSE Tumbleweed:dnsmasq-2.86-1.1.ppc64le", "openSUSE Tumbleweed:dnsmasq-2.86-1.1.s390x", "openSUSE Tumbleweed:dnsmasq-2.86-1.1.x86_64", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.aarch64", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.ppc64le", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.s390x", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-14834", url: "https://www.suse.com/security/cve/CVE-2019-14834", }, { category: "external", summary: "SUSE Bug 1154849 for CVE-2019-14834", url: "https://bugzilla.suse.com/1154849", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:dnsmasq-2.86-1.1.aarch64", "openSUSE Tumbleweed:dnsmasq-2.86-1.1.ppc64le", "openSUSE Tumbleweed:dnsmasq-2.86-1.1.s390x", "openSUSE Tumbleweed:dnsmasq-2.86-1.1.x86_64", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.aarch64", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.ppc64le", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.s390x", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:dnsmasq-2.86-1.1.aarch64", "openSUSE Tumbleweed:dnsmasq-2.86-1.1.ppc64le", "openSUSE Tumbleweed:dnsmasq-2.86-1.1.s390x", "openSUSE Tumbleweed:dnsmasq-2.86-1.1.x86_64", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.aarch64", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.ppc64le", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.s390x", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-14834", }, { cve: "CVE-2020-25681", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-25681", }, ], notes: [ { category: "general", text: "A flaw was found in dnsmasq before version 2.83. A heap-based buffer overflow was discovered in the way RRSets are sorted before validating with DNSSEC data. An attacker on the network, who can forge DNS replies such as that they are accepted as valid, could use this flaw to cause a buffer overflow with arbitrary data in a heap memory segment, possibly executing code on the machine. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:dnsmasq-2.86-1.1.aarch64", "openSUSE Tumbleweed:dnsmasq-2.86-1.1.ppc64le", "openSUSE Tumbleweed:dnsmasq-2.86-1.1.s390x", "openSUSE Tumbleweed:dnsmasq-2.86-1.1.x86_64", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.aarch64", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.ppc64le", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.s390x", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-25681", url: "https://www.suse.com/security/cve/CVE-2020-25681", }, { category: "external", summary: "SUSE Bug 1177077 for CVE-2020-25681", url: "https://bugzilla.suse.com/1177077", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:dnsmasq-2.86-1.1.aarch64", "openSUSE Tumbleweed:dnsmasq-2.86-1.1.ppc64le", "openSUSE Tumbleweed:dnsmasq-2.86-1.1.s390x", "openSUSE Tumbleweed:dnsmasq-2.86-1.1.x86_64", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.aarch64", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.ppc64le", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.s390x", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:dnsmasq-2.86-1.1.aarch64", "openSUSE Tumbleweed:dnsmasq-2.86-1.1.ppc64le", "openSUSE Tumbleweed:dnsmasq-2.86-1.1.s390x", "openSUSE Tumbleweed:dnsmasq-2.86-1.1.x86_64", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.aarch64", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.ppc64le", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.s390x", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2020-25681", }, { cve: "CVE-2020-25683", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-25683", }, ], notes: [ { category: "general", text: "A flaw was found in dnsmasq before version 2.83. A heap-based buffer overflow was discovered in dnsmasq when DNSSEC is enabled and before it validates the received DNS entries. A remote attacker, who can create valid DNS replies, could use this flaw to cause an overflow in a heap-allocated memory. This flaw is caused by the lack of length checks in rfc1035.c:extract_name(), which could be abused to make the code execute memcpy() with a negative size in get_rdata() and cause a crash in dnsmasq, resulting in a denial of service. The highest threat from this vulnerability is to system availability.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:dnsmasq-2.86-1.1.aarch64", "openSUSE Tumbleweed:dnsmasq-2.86-1.1.ppc64le", "openSUSE Tumbleweed:dnsmasq-2.86-1.1.s390x", "openSUSE Tumbleweed:dnsmasq-2.86-1.1.x86_64", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.aarch64", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.ppc64le", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.s390x", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-25683", url: "https://www.suse.com/security/cve/CVE-2020-25683", }, { category: "external", summary: "SUSE Bug 1177077 for CVE-2020-25683", url: "https://bugzilla.suse.com/1177077", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:dnsmasq-2.86-1.1.aarch64", "openSUSE Tumbleweed:dnsmasq-2.86-1.1.ppc64le", "openSUSE Tumbleweed:dnsmasq-2.86-1.1.s390x", "openSUSE Tumbleweed:dnsmasq-2.86-1.1.x86_64", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.aarch64", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.ppc64le", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.s390x", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:dnsmasq-2.86-1.1.aarch64", "openSUSE Tumbleweed:dnsmasq-2.86-1.1.ppc64le", "openSUSE Tumbleweed:dnsmasq-2.86-1.1.s390x", "openSUSE Tumbleweed:dnsmasq-2.86-1.1.x86_64", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.aarch64", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.ppc64le", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.s390x", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2020-25683", }, { cve: "CVE-2020-25684", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-25684", }, ], notes: [ { category: "general", text: "A flaw was found in dnsmasq before version 2.83. When getting a reply from a forwarded query, dnsmasq checks in the forward.c:reply_query() if the reply destination address/port is used by the pending forwarded queries. However, it does not use the address/port to retrieve the exact forwarded query, substantially reducing the number of attempts an attacker on the network would have to perform to forge a reply and get it accepted by dnsmasq. This issue contrasts with RFC5452, which specifies a query's attributes that all must be used to match a reply. This flaw allows an attacker to perform a DNS Cache Poisoning attack. If chained with CVE-2020-25685 or CVE-2020-25686, the attack complexity of a successful attack is reduced. The highest threat from this vulnerability is to data integrity.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:dnsmasq-2.86-1.1.aarch64", "openSUSE Tumbleweed:dnsmasq-2.86-1.1.ppc64le", "openSUSE Tumbleweed:dnsmasq-2.86-1.1.s390x", "openSUSE Tumbleweed:dnsmasq-2.86-1.1.x86_64", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.aarch64", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.ppc64le", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.s390x", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-25684", url: "https://www.suse.com/security/cve/CVE-2020-25684", }, { category: "external", summary: "SUSE Bug 1177077 for CVE-2020-25684", url: "https://bugzilla.suse.com/1177077", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:dnsmasq-2.86-1.1.aarch64", "openSUSE Tumbleweed:dnsmasq-2.86-1.1.ppc64le", "openSUSE Tumbleweed:dnsmasq-2.86-1.1.s390x", "openSUSE Tumbleweed:dnsmasq-2.86-1.1.x86_64", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.aarch64", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.ppc64le", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.s390x", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:dnsmasq-2.86-1.1.aarch64", "openSUSE Tumbleweed:dnsmasq-2.86-1.1.ppc64le", "openSUSE Tumbleweed:dnsmasq-2.86-1.1.s390x", "openSUSE Tumbleweed:dnsmasq-2.86-1.1.x86_64", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.aarch64", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.ppc64le", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.s390x", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2020-25684", }, { cve: "CVE-2020-25685", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-25685", }, ], notes: [ { category: "general", text: "A flaw was found in dnsmasq before version 2.83. When getting a reply from a forwarded query, dnsmasq checks in forward.c:reply_query(), which is the forwarded query that matches the reply, by only using a weak hash of the query name. Due to the weak hash (CRC32 when dnsmasq is compiled without DNSSEC, SHA-1 when it is) this flaw allows an off-path attacker to find several different domains all having the same hash, substantially reducing the number of attempts they would have to perform to forge a reply and get it accepted by dnsmasq. This is in contrast with RFC5452, which specifies that the query name is one of the attributes of a query that must be used to match a reply. This flaw could be abused to perform a DNS Cache Poisoning attack. If chained with CVE-2020-25684 the attack complexity of a successful attack is reduced. The highest threat from this vulnerability is to data integrity.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:dnsmasq-2.86-1.1.aarch64", "openSUSE Tumbleweed:dnsmasq-2.86-1.1.ppc64le", "openSUSE Tumbleweed:dnsmasq-2.86-1.1.s390x", "openSUSE Tumbleweed:dnsmasq-2.86-1.1.x86_64", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.aarch64", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.ppc64le", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.s390x", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-25685", url: "https://www.suse.com/security/cve/CVE-2020-25685", }, { category: "external", summary: "SUSE Bug 1177077 for CVE-2020-25685", url: "https://bugzilla.suse.com/1177077", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:dnsmasq-2.86-1.1.aarch64", "openSUSE Tumbleweed:dnsmasq-2.86-1.1.ppc64le", "openSUSE Tumbleweed:dnsmasq-2.86-1.1.s390x", "openSUSE Tumbleweed:dnsmasq-2.86-1.1.x86_64", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.aarch64", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.ppc64le", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.s390x", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:dnsmasq-2.86-1.1.aarch64", "openSUSE Tumbleweed:dnsmasq-2.86-1.1.ppc64le", "openSUSE Tumbleweed:dnsmasq-2.86-1.1.s390x", "openSUSE Tumbleweed:dnsmasq-2.86-1.1.x86_64", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.aarch64", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.ppc64le", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.s390x", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2020-25685", }, { cve: "CVE-2020-25686", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-25686", }, ], notes: [ { category: "general", text: "A flaw was found in dnsmasq before version 2.83. When receiving a query, dnsmasq does not check for an existing pending request for the same name and forwards a new request. By default, a maximum of 150 pending queries can be sent to upstream servers, so there can be at most 150 queries for the same name. This flaw allows an off-path attacker on the network to substantially reduce the number of attempts that it would have to perform to forge a reply and have it accepted by dnsmasq. This issue is mentioned in the \"Birthday Attacks\" section of RFC5452. If chained with CVE-2020-25684, the attack complexity of a successful attack is reduced. The highest threat from this vulnerability is to data integrity.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:dnsmasq-2.86-1.1.aarch64", "openSUSE Tumbleweed:dnsmasq-2.86-1.1.ppc64le", "openSUSE Tumbleweed:dnsmasq-2.86-1.1.s390x", "openSUSE Tumbleweed:dnsmasq-2.86-1.1.x86_64", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.aarch64", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.ppc64le", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.s390x", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-25686", url: "https://www.suse.com/security/cve/CVE-2020-25686", }, { category: "external", summary: "SUSE Bug 1177077 for CVE-2020-25686", url: "https://bugzilla.suse.com/1177077", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:dnsmasq-2.86-1.1.aarch64", "openSUSE Tumbleweed:dnsmasq-2.86-1.1.ppc64le", "openSUSE Tumbleweed:dnsmasq-2.86-1.1.s390x", "openSUSE Tumbleweed:dnsmasq-2.86-1.1.x86_64", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.aarch64", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.ppc64le", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.s390x", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:dnsmasq-2.86-1.1.aarch64", "openSUSE Tumbleweed:dnsmasq-2.86-1.1.ppc64le", "openSUSE Tumbleweed:dnsmasq-2.86-1.1.s390x", "openSUSE Tumbleweed:dnsmasq-2.86-1.1.x86_64", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.aarch64", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.ppc64le", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.s390x", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2020-25686", }, { cve: "CVE-2021-3448", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-3448", }, ], notes: [ { category: "general", text: "A flaw was found in dnsmasq in versions before 2.85. When configured to use a specific server for a given network interface, dnsmasq uses a fixed port while forwarding queries. An attacker on the network, able to find the outgoing port used by dnsmasq, only needs to guess the random transmission ID to forge a reply and get it accepted by dnsmasq. This flaw makes a DNS Cache Poisoning attack much easier. The highest threat from this vulnerability is to data integrity.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:dnsmasq-2.86-1.1.aarch64", "openSUSE Tumbleweed:dnsmasq-2.86-1.1.ppc64le", "openSUSE Tumbleweed:dnsmasq-2.86-1.1.s390x", "openSUSE Tumbleweed:dnsmasq-2.86-1.1.x86_64", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.aarch64", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.ppc64le", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.s390x", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-3448", url: "https://www.suse.com/security/cve/CVE-2021-3448", }, { category: "external", summary: "SUSE Bug 1183709 for CVE-2021-3448", url: "https://bugzilla.suse.com/1183709", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:dnsmasq-2.86-1.1.aarch64", "openSUSE Tumbleweed:dnsmasq-2.86-1.1.ppc64le", "openSUSE Tumbleweed:dnsmasq-2.86-1.1.s390x", "openSUSE Tumbleweed:dnsmasq-2.86-1.1.x86_64", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.aarch64", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.ppc64le", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.s390x", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:dnsmasq-2.86-1.1.aarch64", "openSUSE Tumbleweed:dnsmasq-2.86-1.1.ppc64le", "openSUSE Tumbleweed:dnsmasq-2.86-1.1.s390x", "openSUSE Tumbleweed:dnsmasq-2.86-1.1.x86_64", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.aarch64", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.ppc64le", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.s390x", "openSUSE Tumbleweed:dnsmasq-utils-2.86-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2021-3448", }, ], }
Log in or create an account to share your comment.
This schema specifies the format of a comment related to a security advisory.
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.