Action not permitted
Modal body text goes here.
cve-2017-14495
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T19:27:40.779Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1039474", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1039474" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.synology.com/support/security/Synology_SA_17_59_Dnsmasq" }, { "name": "DSA-3989", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2017/dsa-3989" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://access.redhat.com/security/vulnerabilities/3199382" }, { "name": "101085", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/101085" }, { "name": "USN-3430-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-3430-1" }, { "name": "101977", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/101977" }, { "name": "VU#973527", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "https://www.kb.cert.org/vuls/id/973527" }, { "name": "GLSA-201710-27", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201710-27" }, { "name": "USN-3430-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-3430-2" }, { "name": "[dnsmasq-discuss] 20171002 Announce: dnsmasq-2.78.", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://www.mail-archive.com/dnsmasq-discuss%40lists.thekelleys.org.uk/msg11665.html" }, { "name": "RHSA-2017:2836", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2017:2836" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4561" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-005.txt" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://thekelleys.org.uk/gitweb/?p=dnsmasq.git%3Ba=commit%3Bh=51eadb692a5123b9838e5a68ecace3ac579a3a45" }, { "name": "42945", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/42945/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://thekelleys.org.uk/dnsmasq/CHANGELOG" }, { "name": "openSUSE-SU-2017:2633", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00006.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html" }, { "name": "[dnsmasq-discuss] 20171002 IMPORTANT SECURITY INFORMATION.", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://www.mail-archive.com/dnsmasq-discuss%40lists.thekelleys.org.uk/msg11664.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-689071.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2017-10-02T00:00:00", "descriptions": [ { "lang": "en", "value": "Memory leak in dnsmasq before 2.78, when the --add-mac, --add-cpe-id or --add-subnet option is specified, allows remote attackers to cause a denial of service (memory consumption) via vectors involving DNS response creation." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-05-10T09:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "1039474", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1039474" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.synology.com/support/security/Synology_SA_17_59_Dnsmasq" }, { "name": "DSA-3989", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2017/dsa-3989" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://access.redhat.com/security/vulnerabilities/3199382" }, { "name": "101085", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/101085" }, { "name": "USN-3430-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-3430-1" }, { "name": "101977", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/101977" }, { "name": "VU#973527", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "https://www.kb.cert.org/vuls/id/973527" }, { "name": "GLSA-201710-27", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201710-27" }, { "name": "USN-3430-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-3430-2" }, { "name": "[dnsmasq-discuss] 20171002 Announce: dnsmasq-2.78.", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://www.mail-archive.com/dnsmasq-discuss%40lists.thekelleys.org.uk/msg11665.html" }, { "name": "RHSA-2017:2836", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2017:2836" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4561" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-005.txt" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://thekelleys.org.uk/gitweb/?p=dnsmasq.git%3Ba=commit%3Bh=51eadb692a5123b9838e5a68ecace3ac579a3a45" }, { "name": "42945", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/42945/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://thekelleys.org.uk/dnsmasq/CHANGELOG" }, { "name": "openSUSE-SU-2017:2633", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00006.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html" }, { "name": "[dnsmasq-discuss] 20171002 IMPORTANT SECURITY INFORMATION.", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://www.mail-archive.com/dnsmasq-discuss%40lists.thekelleys.org.uk/msg11664.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-689071.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2017-14495", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Memory leak in dnsmasq before 2.78, when the --add-mac, --add-cpe-id or --add-subnet option is specified, allows remote attackers to cause a denial of service (memory consumption) via vectors involving DNS response creation." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1039474", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1039474" }, { "name": "https://www.synology.com/support/security/Synology_SA_17_59_Dnsmasq", "refsource": "CONFIRM", "url": "https://www.synology.com/support/security/Synology_SA_17_59_Dnsmasq" }, { "name": "DSA-3989", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2017/dsa-3989" }, { "name": "https://access.redhat.com/security/vulnerabilities/3199382", "refsource": "CONFIRM", "url": "https://access.redhat.com/security/vulnerabilities/3199382" }, { "name": "101085", "refsource": "BID", "url": "http://www.securityfocus.com/bid/101085" }, { "name": "USN-3430-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-3430-1" }, { "name": "101977", "refsource": "BID", "url": "http://www.securityfocus.com/bid/101977" }, { "name": "VU#973527", "refsource": "CERT-VN", "url": "https://www.kb.cert.org/vuls/id/973527" }, { "name": "GLSA-201710-27", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201710-27" }, { "name": "USN-3430-2", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-3430-2" }, { "name": "[dnsmasq-discuss] 20171002 Announce: dnsmasq-2.78.", "refsource": "MLIST", "url": "https://www.mail-archive.com/dnsmasq-discuss@lists.thekelleys.org.uk/msg11665.html" }, { "name": "RHSA-2017:2836", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2017:2836" }, { "name": "http://nvidia.custhelp.com/app/answers/detail/a_id/4561", "refsource": "CONFIRM", "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4561" }, { "name": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-005.txt", "refsource": "CONFIRM", "url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-005.txt" }, { "name": "http://thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=commit;h=51eadb692a5123b9838e5a68ecace3ac579a3a45", "refsource": "CONFIRM", "url": "http://thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=commit;h=51eadb692a5123b9838e5a68ecace3ac579a3a45" }, { "name": "42945", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/42945/" }, { "name": "http://thekelleys.org.uk/dnsmasq/CHANGELOG", "refsource": "CONFIRM", "url": "http://thekelleys.org.uk/dnsmasq/CHANGELOG" }, { "name": "openSUSE-SU-2017:2633", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00006.html" }, { "name": "https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html", "refsource": "MISC", "url": "https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html" }, { "name": "[dnsmasq-discuss] 20171002 IMPORTANT SECURITY INFORMATION.", "refsource": "MLIST", "url": "https://www.mail-archive.com/dnsmasq-discuss@lists.thekelleys.org.uk/msg11664.html" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-689071.pdf", "refsource": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-689071.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2017-14495", "datePublished": "2017-10-02T21:00:00", "dateReserved": "2017-09-15T00:00:00", "dateUpdated": "2024-08-05T19:27:40.779Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2017-14495\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2017-10-03T01:29:02.153\",\"lastModified\":\"2023-11-07T02:39:01.690\",\"vulnStatus\":\"Modified\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"Memory leak in dnsmasq before 2.78, when the --add-mac, --add-cpe-id or --add-subnet option is specified, allows remote attackers to cause a denial of service (memory consumption) via vectors involving DNS response creation.\"},{\"lang\":\"es\",\"value\":\"Una fuga de memoria en las versiones anteriores a la 2.78 de dnsmasq, cuando est\u00e1n especificadas las opciones --add-mac, --add-cpe-id o --add-subnet, permite que los atacantes remotos provoquen una denegaci\u00f3n de servicio (consumo de memoria) mediante vectores relacionados con la creaci\u00f3n de respuestas DNS.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:P\",\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\",\"baseScore\":5.0},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-772\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"B5A6F2F3-4894-4392-8296-3B8DD2679084\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:17.04:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"588D4F37-0A56-47A4-B710-4D5F3D214FB9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"16F59A04-14CF-49E2-9973-645477EA09DA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:7.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7B21E9A8-CE63-42C2-A11A-94D977A96DF1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEECE5FC-CACF-4496-A3E7-164736409252\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:novell:leap:42.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A64AAD2D-38ED-4BA2-A27A-A2716F28D43A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:novell:leap:42.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"76221AE4-1A3C-48EC-AFC2-1819BE4D3DC5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"33C068A4-3780-4EAB-A937-6082DF847564\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"51EF4996-72F4-4FA4-814F-F5991E7A8318\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"825ECE2D-E232-46E0-A047-074B34DB1E97\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:thekelleys:dnsmasq:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.77\",\"matchCriteriaId\":\"B85D7A28-8CBA-4D77-AD30-DB3CA49F2F98\"}]}]}],\"references\":[{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00006.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Issue Tracking\",\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://nvidia.custhelp.com/app/answers/detail/a_id/4561\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://thekelleys.org.uk/dnsmasq/CHANGELOG\",\"source\":\"cve@mitre.org\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"http://thekelleys.org.uk/gitweb/?p=dnsmasq.git%3Ba=commit%3Bh=51eadb692a5123b9838e5a68ecace3ac579a3a45\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-005.txt\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.debian.org/security/2017/dsa-3989\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/101085\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securityfocus.com/bid/101977\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securitytracker.com/id/1039474\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-3430-1\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-3430-2\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:2836\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/security/vulnerabilities/3199382\",\"source\":\"cve@mitre.org\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://cert-portal.siemens.com/productcert/pdf/ssa-689071.pdf\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://security.gentoo.org/glsa/201710-27\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.exploit-db.com/exploits/42945/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://www.kb.cert.org/vuls/id/973527\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"https://www.mail-archive.com/dnsmasq-discuss%40lists.thekelleys.org.uk/msg11664.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://www.mail-archive.com/dnsmasq-discuss%40lists.thekelleys.org.uk/msg11665.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://www.synology.com/support/security/Synology_SA_17_59_Dnsmasq\",\"source\":\"cve@mitre.org\"}]}}" } }
icsa-17-332-01
Vulnerability from csaf_cisa
Notes
{ "document": { "acknowledgments": [ { "organization": "Siemens Product CERT", "summary": "reporting these vulnerabilities to CISA" } ], "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited", "tlp": { "label": "WHITE", "url": "https://us-cert.cisa.gov/tlp/" } }, "lang": "en-US", "notes": [ { "category": "general", "text": "This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov", "title": "CISA Disclaimer" }, { "category": "legal_disclaimer", "text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.", "title": "Legal Notice" }, { "category": "summary", "text": "Successful exploitation of these vulnerabilities could allow a remote attacker to crash the DNS service or execute arbitrary code by crafting malicious DNS responses.", "title": "Risk evaluation" }, { "category": "other", "text": "Chemical, Energy, Food and Agriculture, Healthcare and Public Health, Transportation Systems, and Water and Wastewater Systems", "title": "Critical infrastructure sectors" }, { "category": "other", "text": "Worldwide", "title": "Countries/areas deployed" }, { "category": "other", "text": "Germany", "title": "Company headquarters location" }, { "category": "general", "text": "CISA recommends users take defensive measures to minimize the risk of exploitation of this vulnerability. Specifically, users should:", "title": "Recommended Practices" }, { "category": "general", "text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.\nCISA also provides a section for control systems security recommended practices on the ICS webpage onus-cert.gov. Several recommended practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "Additional mitigation guidance and recommended practices are publicly available on the ICS webpage on us-cert.gov in the Technical Information Paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.\nOrganizations observing any suspected malicious activity should follow their established internal procedures and report their findings to CISA for tracking and correlation against other incidents.", "title": "Recommended Practices" }, { "category": "general", "text": "For further inquiries on security vulnerabilities in Siemens products and \nsolutions, please contact the Siemens ProductCERT:\n\nhttps://www.siemens.com/cert/advisories", "title": "Additional Resources" }, { "category": "general", "text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories", "title": "Additional Resources" }, { "category": "other", "text": "No known public exploits specifically target these vulnerabilities.", "title": "Exploitability" } ], "publisher": { "category": "coordinator", "contact_details": "Email: CISAservicedesk@cisa.dhs.gov;\n Toll Free: 1-888-282-0870", "name": "CISA", "namespace": "https://www.cisa.gov/" }, "references": [ { "category": "self", "summary": "ICS Advisory ICSA-17-332-01 JSON", "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2017/icsa-17-332-01.json" }, { "category": "self", "summary": "ICS Advisory ICSA-17-332-01 Web Version", "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-17-332-01" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.us-cert.gov/ics/alerts/ICS-ALERT-10-301-01" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.us-cert.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.us-cert.gov/ics/tips/ICS-TIP-12-146-01B" }, { "category": "external", "summary": "SSA-496604: SSA-689071: DNSMasq Vulnerabilities in SCALANCE W1750D, SCALANCE M-800 / S615 and RUGGEDCOM RM1224 - TXT Version", "url": "https://cert-portal.siemens.com/productcert/txt/SSA-689071.txt" } ], "title": "Siemens SCALANCE W1750D, M800, S615, and RUGGEDCOM RM1224 (Update C)", "tracking": { "current_release_date": "2020-10-13T00:00:00.000000Z", "generator": { "engine": { "name": "CISA CSAF Generator", "version": "1.0.0" } }, "id": "ICSA-17-332-01", "initial_release_date": "2017-11-28T00:00:00.000000Z", "revision_history": [ { "date": "2017-11-28T00:00:00.000000Z", "legacy_version": "Initial", "number": "1", "summary": "ICSA-17-332-01 Siemens SCALANCE W1750D, M800, and S615" }, { "date": "2018-04-05T00:00:00.000000Z", "legacy_version": "A", "number": "2", "summary": "ICSA-17-332-01 Siemens SIMATIC SCALANCE W1750D, M800, and S615 (Update A)" }, { "date": "2018-05-10T00:00:00.000000Z", "legacy_version": "B", "number": "3", "summary": "ICSA-17-332-01 Siemens SCALANCE W1750D, M800, and S615 (Update B)" }, { "date": "2020-10-13T00:00:00.000000Z", "legacy_version": "C", "number": "4", "summary": "ICSA-17-332-01 Siemens SCALANCE W1750D, M800, S615, and RUGGEDCOM RM1224 (Update C)" } ], "status": "final", "version": "4" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "All versions \u003c V5.0", "product": { "name": "RUGGEDCOM RM1224: All versions \u003c V5.0", "product_id": "CSAFPID-0001" } } ], "category": "product_name", "name": "RUGGEDCOM RM1224" }, { "branches": [ { "category": "product_version_range", "name": "All versions \u003c V5.0", "product": { "name": "SCALANCE M-800 / S615: All versions \u003c V5.0", "product_id": "CSAFPID-0002" } } ], "category": "product_name", "name": "SCALANCE M-800 / S615" }, { "branches": [ { "category": "product_version_range", "name": "All versions \u003c V6.5.1.5", "product": { "name": "SCALANCE W1750D: All versions \u003c V6.5.1.5", "product_id": "CSAFPID-0003" } } ], "category": "product_name", "name": "SCALANCE W1750D" } ], "category": "vendor", "name": "Siemens" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-13704", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "summary", "text": "An attacker could cause a crash of the DNSmasq process by sending specially crafted request messages to the service on port 53/udp.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "references": [ { "category": "external", "summary": "https://support.industry.siemens.com/cs/ww/en/view/109778052", "url": "https://support.industry.siemens.com/cs/ww/en/view/109778052" }, { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-13704" }, { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-14495" }, { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-14496" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "remediations": [ { "category": "vendor_fix", "details": "SCALANCE M-800 / S615 and RUGGEDCOM RM1224: Disable DNS proxy in the\ndevice configuration (System - DNS - DNS Proxy - Disable Checkbox\n\u201eEnable DNS Proxy\"), and configure the connected devices in the internal\nnetwork to use a different DNS server", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, { "category": "vendor_fix", "details": "SCALANCE W1750D: If \"OpenDNS\", \"Captive Portal\" or \"URL redirection\"\nfunctionality is not used, deploy firewall rules in the device\nconfiguration to block incoming access to port 53/UDP", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, { "category": "vendor_fix", "details": "Update to V5.0 or later version - Download: https://support.industry.siemens.com/cs/ww/en/view/109757544 ", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109757544" }, { "category": "vendor_fix", "details": "Update to V5.0 or later version - Download: https://support.industry.siemens.com/cs/ww/en/view/109757544 ", "product_ids": [ "CSAFPID-0002" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109757544" }, { "category": "vendor_fix", "details": "Update to V6.5.1.5 or later version - Download: https://support.industry.siemens.com/cs/ww/en/view/109778052 ", "product_ids": [ "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109778052" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals. Additional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ] }, { "cve": "CVE-2017-14491", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "summary", "text": "An attacker could cause a crash or potentially execute arbitrary code by sending specially crafted DNS responses to the DNSmasq process. In order to exploit this vulnerability, an attacker must be able to trigger DNS requests from the device, and must be in a privileged position to inject malicious DNS responses.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "references": [ { "category": "external", "summary": "https://support.industry.siemens.com/cs/ww/en/view/109778052", "url": "https://support.industry.siemens.com/cs/ww/en/view/109778052" } ], "remediations": [ { "category": "vendor_fix", "details": "SCALANCE M-800 / S615 and RUGGEDCOM RM1224: Disable DNS proxy in the\ndevice configuration (System - DNS - DNS Proxy - Disable Checkbox\n\u201eEnable DNS Proxy\"), and configure the connected devices in the internal\nnetwork to use a different DNS server", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, { "category": "vendor_fix", "details": "SCALANCE W1750D: If \"OpenDNS\", \"Captive Portal\" or \"URL redirection\"\nfunctionality is not used, deploy firewall rules in the device\nconfiguration to block incoming access to port 53/UDP", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, { "category": "vendor_fix", "details": "Update to V5.0 or later version - Download: https://support.industry.siemens.com/cs/ww/en/view/109757544 ", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109757544" }, { "category": "vendor_fix", "details": "Update to V5.0 or later version - Download: https://support.industry.siemens.com/cs/ww/en/view/109757544 ", "product_ids": [ "CSAFPID-0002" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109757544" }, { "category": "vendor_fix", "details": "Update to V6.5.1.5 or later version - Download: https://support.industry.siemens.com/cs/ww/en/view/109778052 ", "product_ids": [ "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109778052" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals. Additional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ] }, { "cve": "CVE-2017-14495", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "summary", "text": "An attacker could cause a crash of the DNSmasq process by sending specially crafted request messages to the service on port 53/udp.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "references": [ { "category": "external", "summary": "https://support.industry.siemens.com/cs/ww/en/view/109778052", "url": "https://support.industry.siemens.com/cs/ww/en/view/109778052" }, { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-14491" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "vendor_fix", "details": "SCALANCE M-800 / S615 and RUGGEDCOM RM1224: Disable DNS proxy in the\ndevice configuration (System - DNS - DNS Proxy - Disable Checkbox\n\u201eEnable DNS Proxy\"), and configure the connected devices in the internal\nnetwork to use a different DNS server", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, { "category": "vendor_fix", "details": "SCALANCE W1750D: If \"OpenDNS\", \"Captive Portal\" or \"URL redirection\"\nfunctionality is not used, deploy firewall rules in the device\nconfiguration to block incoming access to port 53/UDP", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, { "category": "vendor_fix", "details": "Update to V5.0 or later version - Download: https://support.industry.siemens.com/cs/ww/en/view/109757544 ", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109757544" }, { "category": "vendor_fix", "details": "Update to V5.0 or later version - Download: https://support.industry.siemens.com/cs/ww/en/view/109757544 ", "product_ids": [ "CSAFPID-0002" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109757544" }, { "category": "vendor_fix", "details": "Update to V6.5.1.5 or later version - Download: https://support.industry.siemens.com/cs/ww/en/view/109778052 ", "product_ids": [ "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109778052" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals. Additional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ] }, { "cve": "CVE-2017-14496", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "summary", "text": "An attacker could cause a crash of the DNSmasq process by sending specially crafted request messages to the service on port 53/udp.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, "references": [ { "category": "external", "summary": "https://support.industry.siemens.com/cs/ww/en/view/109778052", "url": "https://support.industry.siemens.com/cs/ww/en/view/109778052" } ], "remediations": [ { "category": "vendor_fix", "details": "SCALANCE M-800 / S615 and RUGGEDCOM RM1224: Disable DNS proxy in the\ndevice configuration (System - DNS - DNS Proxy - Disable Checkbox\n\u201eEnable DNS Proxy\"), and configure the connected devices in the internal\nnetwork to use a different DNS server", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, { "category": "vendor_fix", "details": "SCALANCE W1750D: If \"OpenDNS\", \"Captive Portal\" or \"URL redirection\"\nfunctionality is not used, deploy firewall rules in the device\nconfiguration to block incoming access to port 53/UDP", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] }, { "category": "vendor_fix", "details": "Update to V5.0 or later version - Download: https://support.industry.siemens.com/cs/ww/en/view/109757544 ", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109757544" }, { "category": "vendor_fix", "details": "Update to V5.0 or later version - Download: https://support.industry.siemens.com/cs/ww/en/view/109757544 ", "product_ids": [ "CSAFPID-0002" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109757544" }, { "category": "vendor_fix", "details": "Update to V6.5.1.5 or later version - Download: https://support.industry.siemens.com/cs/ww/en/view/109778052 ", "product_ids": [ "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109778052" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals. Additional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003" ] } ] } ] }
var-201710-0451
Vulnerability from variot
Memory leak in dnsmasq before 2.78, when the --add-mac, --add-cpe-id or --add-subnet option is specified, allows remote attackers to cause a denial of service (memory consumption) via vectors involving DNS response creation. Dnsmasq versions 2.77 and earlier contains multiple vulnerabilities. dnsmasq Contains a resource management vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. Multiple Siemens SCALANCE Products are prone to the following security vulnerabilities: 1. A buffer-overflow vulnerability 2. Multiple denial-of-service vulnerabilities Attackers can exploit these issues to execute arbitrary code within the context of affected device or cause a denial-of-service condition. This BID is being retired as a duplicate of BID 101085 Dnsmasq VU#973527 Multiple Security Vulnerabilities. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
===================================================================== Red Hat Security Advisory
Synopsis: Critical: dnsmasq security update Advisory ID: RHSA-2017:2836-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2017:2836 Issue date: 2017-10-02 CVE Names: CVE-2017-14491 CVE-2017-14492 CVE-2017-14493 CVE-2017-14494 CVE-2017-14495 CVE-2017-14496 =====================================================================
- Summary:
An update for dnsmasq is now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
- Relevant releases/architectures:
Red Hat Enterprise Linux Client (v. 7) - x86_64 Red Hat Enterprise Linux Client Optional (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64 Red Hat Enterprise Linux Server (v. 7) - aarch64, ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 7) - aarch64, ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - x86_64 Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64
- Description:
The dnsmasq packages contain Dnsmasq, a lightweight DNS (Domain Name Server) forwarder and DHCP (Dynamic Host Configuration Protocol) server.
Security Fix(es):
-
A heap buffer overflow was found in dnsmasq in the code responsible for building DNS replies. An attacker could send crafted DNS packets to dnsmasq which would cause it to crash or, potentially, execute arbitrary code. (CVE-2017-14491)
-
A heap buffer overflow was discovered in dnsmasq in the IPv6 router advertisement (RA) handling code. This issue only affected configurations using one of these options: enable-ra, ra-only, slaac, ra-names, ra-advrouter, or ra-stateless. (CVE-2017-14492)
-
A stack buffer overflow was found in dnsmasq in the DHCPv6 code. (CVE-2017-14493)
-
An information leak was found in dnsmasq in the DHCPv6 relay code. An attacker on the local network could send crafted DHCPv6 packets to dnsmasq causing it to forward the contents of process memory, potentially leaking sensitive data. (CVE-2017-14494)
-
A memory exhaustion flaw was found in dnsmasq in the EDNS0 code. An attacker could send crafted DNS packets which would trigger memory allocations which would never be freed, leading to unbounded memory consumption and eventually a crash. This issue only affected configurations using one of the options: add-mac, add-cpe-id, or add-subnet. (CVE-2017-14495)
-
An integer underflow flaw leading to a buffer over-read was found in dnsmasq in the EDNS0 code. An attacker could send crafted DNS packets to dnsmasq which would cause it to crash. This issue only affected configurations using one of the options: add-mac, add-cpe-id, or add-subnet. (CVE-2017-14496)
Red Hat would like to thank Felix Wilhelm (Google Security Team), Fermin J. Serna (Google Security Team), Gabriel Campana (Google Security Team), Kevin Hamacher (Google Security Team), and Ron Bowes (Google Security Team) for reporting these issues.
- Solution:
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
- Bugs fixed (https://bugzilla.redhat.com/):
1495409 - CVE-2017-14491 dnsmasq: heap overflow in the code responsible for building DNS replies 1495410 - CVE-2017-14492 dnsmasq: heap overflow in the IPv6 router advertisement code 1495411 - CVE-2017-14493 dnsmasq: stack buffer overflow in the DHCPv6 code 1495412 - CVE-2017-14494 dnsmasq: information leak in the DHCPv6 relay code 1495415 - CVE-2017-14495 dnsmasq: memory exhaustion vulnerability in the EDNS0 code 1495416 - CVE-2017-14496 dnsmasq: integer underflow leading to buffer over-read in the EDNS0 code
- Package List:
Red Hat Enterprise Linux Client (v. 7):
Source: dnsmasq-2.76-2.el7_4.2.src.rpm
x86_64: dnsmasq-2.76-2.el7_4.2.x86_64.rpm dnsmasq-debuginfo-2.76-2.el7_4.2.x86_64.rpm
Red Hat Enterprise Linux Client Optional (v. 7):
x86_64: dnsmasq-debuginfo-2.76-2.el7_4.2.x86_64.rpm dnsmasq-utils-2.76-2.el7_4.2.x86_64.rpm
Red Hat Enterprise Linux ComputeNode (v. 7):
Source: dnsmasq-2.76-2.el7_4.2.src.rpm
x86_64: dnsmasq-2.76-2.el7_4.2.x86_64.rpm dnsmasq-debuginfo-2.76-2.el7_4.2.x86_64.rpm
Red Hat Enterprise Linux ComputeNode Optional (v. 7):
x86_64: dnsmasq-debuginfo-2.76-2.el7_4.2.x86_64.rpm dnsmasq-utils-2.76-2.el7_4.2.x86_64.rpm
Red Hat Enterprise Linux Server (v. 7):
Source: dnsmasq-2.76-2.el7_4.2.src.rpm
aarch64: dnsmasq-2.76-2.el7_4.2.aarch64.rpm dnsmasq-debuginfo-2.76-2.el7_4.2.aarch64.rpm
ppc64: dnsmasq-2.76-2.el7_4.2.ppc64.rpm dnsmasq-debuginfo-2.76-2.el7_4.2.ppc64.rpm
ppc64le: dnsmasq-2.76-2.el7_4.2.ppc64le.rpm dnsmasq-debuginfo-2.76-2.el7_4.2.ppc64le.rpm
s390x: dnsmasq-2.76-2.el7_4.2.s390x.rpm dnsmasq-debuginfo-2.76-2.el7_4.2.s390x.rpm
x86_64: dnsmasq-2.76-2.el7_4.2.x86_64.rpm dnsmasq-debuginfo-2.76-2.el7_4.2.x86_64.rpm
Red Hat Enterprise Linux Server Optional (v. 7):
aarch64: dnsmasq-debuginfo-2.76-2.el7_4.2.aarch64.rpm dnsmasq-utils-2.76-2.el7_4.2.aarch64.rpm
ppc64: dnsmasq-debuginfo-2.76-2.el7_4.2.ppc64.rpm dnsmasq-utils-2.76-2.el7_4.2.ppc64.rpm
ppc64le: dnsmasq-debuginfo-2.76-2.el7_4.2.ppc64le.rpm dnsmasq-utils-2.76-2.el7_4.2.ppc64le.rpm
s390x: dnsmasq-debuginfo-2.76-2.el7_4.2.s390x.rpm dnsmasq-utils-2.76-2.el7_4.2.s390x.rpm
x86_64: dnsmasq-debuginfo-2.76-2.el7_4.2.x86_64.rpm dnsmasq-utils-2.76-2.el7_4.2.x86_64.rpm
Red Hat Enterprise Linux Workstation (v. 7):
Source: dnsmasq-2.76-2.el7_4.2.src.rpm
x86_64: dnsmasq-2.76-2.el7_4.2.x86_64.rpm dnsmasq-debuginfo-2.76-2.el7_4.2.x86_64.rpm
Red Hat Enterprise Linux Workstation Optional (v. 7):
x86_64: dnsmasq-debuginfo-2.76-2.el7_4.2.x86_64.rpm dnsmasq-utils-2.76-2.el7_4.2.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/
- References:
https://access.redhat.com/security/cve/CVE-2017-14491 https://access.redhat.com/security/cve/CVE-2017-14492 https://access.redhat.com/security/cve/CVE-2017-14493 https://access.redhat.com/security/cve/CVE-2017-14494 https://access.redhat.com/security/cve/CVE-2017-14495 https://access.redhat.com/security/cve/CVE-2017-14496 https://access.redhat.com/security/updates/classification/#critical https://access.redhat.com/security/vulnerabilities/3199382
- Contact:
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/
Copyright 2017 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1
iD8DBQFZ0opYXlSAg2UNWIIRAr0dAJ9rIL1FgNTJUf2I9jjKFFlfkCd/kwCfV+bX SfoCV7+qG2nwqlHKLZOlhIU= =iWfU -----END PGP SIGNATURE-----
-- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce . =========================================================================== Ubuntu Security Notice USN-3430-3 January 04, 2018
dnsmasq regression
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 12.04 ESM
Summary:
USN-3430-2 introduced regression in Dnsmasq.
Software Description: - dnsmasq: Small caching DNS proxy and DHCP/TFTP server
Details:
USN-3430-2 fixed several vulnerabilities. The update introduced a new regression that breaks DNS resolution. This update addresses the problem.
We apologize for the inconvenience.
Original advisory details:
Felix Wilhelm, Fermin J. Serna, Gabriel Campana and Kevin Hamacher discovered that Dnsmasq incorrectly handled DNS requests. (CVE-2017-14491)
Felix Wilhelm, Fermin J. (CVE-2017-14492)
Felix Wilhelm, Fermin J. Serna, Gabriel Campana and Kevin Hamacher discovered that Dnsmasq incorrectly handled DHCPv6 requests. (CVE-2017-14493)
Felix Wilhelm, Fermin J. Serna, Gabriel Campana and Kevin Hamacher discovered that Dnsmasq incorrectly handled DHCPv6 packets. (CVE-2017-14494)
Felix Wilhelm, Fermin J. Serna, Gabriel Campana and Kevin Hamacher discovered that Dnsmasq incorrectly handled DNS requests. (CVE-2017-14495)
Felix Wilhelm, Fermin J. Serna, Gabriel Campana and Kevin Hamacher discovered that Dnsmasq incorrectly handled DNS requests. A remote attacker could use this issue to cause Dnsmasq to crash, resulting in a denial of service. (CVE-2017-14496)
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 12.04 ESM: dnsmasq=C2=A02.59-4ubuntu0.4 dnsmasq-base2.59-4ubuntu0.4 dnsmasq-utils2.59-4ubuntu0.4
After a standard system update you need to reboot your computer to make all the necessary changes.
Affected packages
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 net-dns/dnsmasq < 2.78 >= 2.78
Description
Multiple vulnerabilities have been discovered in Dnsmasq.
Workaround
There is no known workaround at this time.
Resolution
All Dnsmasq users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=net-dns/dnsmasq-2.78"
References
[ 1 ] CVE-2017-14491 https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-14491 [ 2 ] CVE-2017-14492 https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-14492 [ 3 ] CVE-2017-14493 https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-14493 [ 4 ] CVE-2017-14494 https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-14494 [ 5 ] CVE-2017-14495 https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-14495 [ 6 ] CVE-2017-14496 https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-14496
Availability
This GLSA and any updates to it are available for viewing at the Gentoo Security Website:
https://security.gentoo.org/glsa/201710-27
Concerns?
Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.
License
Copyright 2017 Gentoo Foundation, Inc; referenced text belongs to its owner(s).
The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201710-0451", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "enterprise linux server", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.0" }, { "model": "ubuntu linux", "scope": "eq", "trust": 1.0, "vendor": "canonical", "version": "16.04" }, { "model": "linux", "scope": "eq", "trust": 1.0, "vendor": "debian", "version": "7.0" }, { "model": "ubuntu linux", "scope": "eq", "trust": 1.0, "vendor": "canonical", "version": "17.04" }, { "model": "linux", "scope": "eq", "trust": 1.0, "vendor": "debian", "version": "7.1" }, { "model": "enterprise linux workstation", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.0" }, { "model": "linux", "scope": "eq", "trust": 1.0, "vendor": "debian", "version": "9.0" }, { "model": "dnsmasq", "scope": "lte", "trust": 1.0, "vendor": "thekelleys", "version": "2.77" }, { "model": "ubuntu linux", "scope": "eq", "trust": 1.0, "vendor": "canonical", "version": "14.04" }, { "model": "enterprise linux desktop", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.0" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.9, "vendor": "thekelleys", "version": "2.77" }, { "model": null, "scope": null, "trust": 0.8, "vendor": "ruckus", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "technicolor", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "dnsmasq", "version": null }, { "model": "ubuntu", "scope": null, "trust": 0.8, "vendor": "canonical", "version": null }, { "model": "gnu/linux", "scope": null, "trust": 0.8, "vendor": "debian", "version": null }, { "model": "leap", "scope": null, "trust": 0.8, "vendor": "opensuse", "version": null }, { "model": "dnsmasq", "scope": "lt", "trust": 0.8, "vendor": "thekelleys", "version": "2.78" }, { "model": "enterprise linux desktop", "scope": null, "trust": 0.8, "vendor": "red hat", "version": null }, { "model": "enterprise linux server", "scope": null, "trust": 0.8, "vendor": "red hat", "version": null }, { "model": "enterprise linux workstation", "scope": null, "trust": 0.8, "vendor": "red hat", "version": null }, { "model": "enterprise linux server year extended update support", "scope": "eq", "trust": 0.6, "vendor": "redhat", "version": "-47.4" }, { "model": "scalance w1750d", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "0" }, { "model": "scalance s615", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "0" }, { "model": "scalance m800", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "0" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "17.04" }, { "model": "linux lts", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "16.04" }, { "model": "linux lts", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "14.04" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "1.2.2" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.75" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.72" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.71" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.70" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.7" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.65" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.64" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.63" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.62" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.61" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.60" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.6" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.59" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.58" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.57" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.56" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.55" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.54" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.53" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.52" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.51" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.50" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.49" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.48" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.47" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.46" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.45" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.44" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.43" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.42" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.41" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.40" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.4" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.38" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.37" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.36" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.35" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.34" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.33" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.30" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.29" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.28" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.27" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.26" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.25" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.24" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.23" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.22" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.21" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.20" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.2" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.19" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.18" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.17" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.16" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.15" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.14" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.13" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.12" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.11" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.10" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "1.9" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "1.8" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "1.6" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "1.5" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "1.4" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "1.3" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "1.18" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "1.17" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "1.16" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "1.15" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "1.14" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "1.13" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "1.12" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "1.11" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "1.10" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "1.0" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "0.996" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "0.992" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "0.98" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "0.96" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "0.95" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "0.7" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "0.6" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "0.5" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "0.4" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "14.2" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "14.1" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "14.0" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "13.37" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "13.1" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "13.0" }, { "model": "enterprise linux workstation optional", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "7" }, { "model": "enterprise linux workstation optional", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "enterprise linux workstation", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "7" }, { "model": "enterprise linux workstation", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "enterprise linux server tus", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6.6" }, { "model": "enterprise linux server tus", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6.5" }, { "model": "enterprise linux server optional eus", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "7.3" }, { "model": "enterprise linux server optional eus", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "7.2" }, { "model": "enterprise linux server optional eus", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6.5" }, { "model": "enterprise linux server optional aus", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6.6" }, { "model": "enterprise linux server optional aus", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6.5" }, { "model": "enterprise linux server optional aus", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6.4" }, { "model": "enterprise linux server optional", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "7" }, { "model": "enterprise linux server optional", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "enterprise linux server for arm", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "7" }, { "model": "enterprise linux server eus", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "7.3" }, { "model": "enterprise linux server eus", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "7.2" }, { "model": "enterprise linux server aus", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6.6" }, { "model": "enterprise linux server aus", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6.5" }, { "model": "enterprise linux server aus", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6.4" }, { "model": "enterprise linux server aus", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6.2" }, { "model": "enterprise linux server tus", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "-7.4" }, { "model": "enterprise linux server tus", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "-7.3" }, { "model": "enterprise linux server tus", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "-7.2" }, { "model": "enterprise linux server extended update support", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "-7.4" }, { "model": "enterprise linux server extended update support", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "-7.2" }, { "model": "enterprise linux server extended update suppor", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "-7.3" }, { "model": "enterprise linux server aus", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "-7.4" }, { "model": "enterprise linux server aus", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "-7.3" }, { "model": "enterprise linux server aus", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "-7.2" }, { "model": "enterprise linux server year extended update support", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "-47.2" }, { "model": "enterprise linux server year extended upd", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "-47.3" }, { "model": "enterprise linux server", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "7" }, { "model": "enterprise linux server", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "enterprise linux server", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "5" }, { "model": "enterprise linux long life server", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "5.9" }, { "model": "enterprise linux hpc node optional", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "enterprise linux hpc node", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "enterprise linux for scientific computing", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "7" }, { "model": "enterprise linux for power little endian extended update supp", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "-7.4" }, { "model": "enterprise linux for power little endian", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "7" }, { "model": "enterprise linux for power big endian extended update support", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "-7.4" }, { "model": "enterprise linux for power big endian", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "7" }, { "model": "enterprise linux for power little endian extended update suppo", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "-7.3" }, { "model": "enterprise linux for power little endian extended update suppo", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "-7.2" }, { "model": "enterprise linux for power big endian extended update support", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "-7.3" }, { "model": "enterprise linux for power big endian extended update support", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "-7.2" }, { "model": "enterprise linux for ibm z systems extended update support", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "-7.4" }, { "model": "enterprise linux for ibm z systems extended update support", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "-7.3" }, { "model": "enterprise linux for ibm z systems extended update support", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "-7.2" }, { "model": "enterprise linux for ibm z systems", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "7" }, { "model": "enterprise linux eus compute node", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "7.4" }, { "model": "enterprise linux eus compute node", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "7.3" }, { "model": "enterprise linux eus compute node", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "7.2" }, { "model": "enterprise linux desktop optional", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "enterprise linux desktop", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "7" }, { "model": "enterprise linux desktop", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "enterprise linux computenode optional eus", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "7.3" }, { "model": "enterprise linux computenode optional eus", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "7.2" }, { "model": "enterprise linux computenode optional", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "7" }, { "model": "enterprise linux computenode eus", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "7.3" }, { "model": "enterprise linux computenode eus", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "7.2" }, { "model": "enterprise linux computenode", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "7" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "7" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "6" }, { "model": "leap", "scope": "eq", "trust": 0.3, "vendor": "opensuse", "version": "42.3" }, { "model": "leap", "scope": "eq", "trust": 0.3, "vendor": "opensuse", "version": "42.2" }, { "model": "kubernetes", "scope": "eq", "trust": 0.3, "vendor": "kubernetes", "version": "1.7.6" }, { "model": "kubernetes", "scope": "eq", "trust": 0.3, "vendor": "kubernetes", "version": "1.7" }, { "model": "kubernetes", "scope": "eq", "trust": 0.3, "vendor": "kubernetes", "version": "1.6.10" }, { "model": "kubernetes", "scope": "eq", "trust": 0.3, "vendor": "kubernetes", "version": "1.6" }, { "model": "kubernetes", "scope": "eq", "trust": 0.3, "vendor": "kubernetes", "version": "1.5.7" }, { "model": "kubernetes", "scope": "eq", "trust": 0.3, "vendor": "kubernetes", "version": "1.5" }, { "model": "kubernetes", "scope": "eq", "trust": 0.3, "vendor": "kubernetes", "version": "1.2" }, { "model": "android", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.1.1" }, { "model": "android", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.1" }, { "model": "android", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.1.1" }, { "model": "android", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.2" }, { "model": "android", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.4.4" }, { "model": "android", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0" }, { "model": "android", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.1.2" }, { "model": "android", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0" }, { "model": "android", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0" }, { "model": "fedora", "scope": "eq", "trust": 0.3, "vendor": "fedoraproject", "version": "27" }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "linux s/390", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "linux mips", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "linux ia-64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "linux ia-32", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "linux ia-30", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "linux arm", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "centos", "scope": "eq", "trust": 0.3, "vendor": "centos", "version": "7" }, { "model": "centos", "scope": "eq", "trust": 0.3, "vendor": "centos", "version": "6" }, { "model": "dnsmasq", "scope": "ne", "trust": 0.3, "vendor": "thekelleys", "version": "2.78" }, { "model": "kubernetes", "scope": "ne", "trust": 0.3, "vendor": "kubernetes", "version": "1.8" }, { "model": "kubernetes", "scope": "ne", "trust": 0.3, "vendor": "kubernetes", "version": "1.7.7" }, { "model": "kubernetes", "scope": "ne", "trust": 0.3, "vendor": "kubernetes", "version": "1.6.11" }, { "model": "kubernetes", "scope": "ne", "trust": 0.3, "vendor": "kubernetes", "version": "1.5.8" } ], "sources": [ { "db": "CERT/CC", "id": "VU#973527" }, { "db": "BID", "id": "101977" }, { "db": "BID", "id": "101085" }, { "db": "JVNDB", "id": "JVNDB-2017-008622" }, { "db": "NVD", "id": "CVE-2017-14495" }, { "db": "CNNVD", "id": "CNNVD-201709-743" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:7.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:novell:leap:42.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:17.04:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:novell:leap:42.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:thekelleys:dnsmasq:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.77", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2017-14495" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Gabriel Campana, Kevin Hamacher and Ron Bowes of the Google Security Team,Felix Wilhelm, Fermin J. Serna", "sources": [ { "db": "CNNVD", "id": "CNNVD-201709-743" } ], "trust": 0.6 }, "cve": "CVE-2017-14495", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2017-14495", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2017-14495", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2017-14495", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201709-743", "trust": 0.6, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2017-14495", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULMON", "id": "CVE-2017-14495" }, { "db": "JVNDB", "id": "JVNDB-2017-008622" }, { "db": "NVD", "id": "CVE-2017-14495" }, { "db": "CNNVD", "id": "CNNVD-201709-743" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Memory leak in dnsmasq before 2.78, when the --add-mac, --add-cpe-id or --add-subnet option is specified, allows remote attackers to cause a denial of service (memory consumption) via vectors involving DNS response creation. Dnsmasq versions 2.77 and earlier contains multiple vulnerabilities. dnsmasq Contains a resource management vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. Multiple Siemens SCALANCE Products are prone to the following security vulnerabilities:\n1. A buffer-overflow vulnerability\n2. Multiple denial-of-service vulnerabilities\nAttackers can exploit these issues to execute arbitrary code within the context of affected device or cause a denial-of-service condition. \nThis BID is being retired as a duplicate of BID 101085 Dnsmasq VU#973527 Multiple Security Vulnerabilities. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n=====================================================================\n Red Hat Security Advisory\n\nSynopsis: Critical: dnsmasq security update\nAdvisory ID: RHSA-2017:2836-01\nProduct: Red Hat Enterprise Linux\nAdvisory URL: https://access.redhat.com/errata/RHSA-2017:2836\nIssue date: 2017-10-02\nCVE Names: CVE-2017-14491 CVE-2017-14492 CVE-2017-14493 \n CVE-2017-14494 CVE-2017-14495 CVE-2017-14496 \n=====================================================================\n\n1. Summary:\n\nAn update for dnsmasq is now available for Red Hat Enterprise Linux 7. \n\nRed Hat Product Security has rated this update as having a security impact\nof Critical. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available for each vulnerability from\nthe CVE link(s) in the References section. \n\n2. Relevant releases/architectures:\n\nRed Hat Enterprise Linux Client (v. 7) - x86_64\nRed Hat Enterprise Linux Client Optional (v. 7) - x86_64\nRed Hat Enterprise Linux ComputeNode (v. 7) - x86_64\nRed Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64\nRed Hat Enterprise Linux Server (v. 7) - aarch64, ppc64, ppc64le, s390x, x86_64\nRed Hat Enterprise Linux Server Optional (v. 7) - aarch64, ppc64, ppc64le, s390x, x86_64\nRed Hat Enterprise Linux Workstation (v. 7) - x86_64\nRed Hat Enterprise Linux Workstation Optional (v. 7) - x86_64\n\n3. Description:\n\nThe dnsmasq packages contain Dnsmasq, a lightweight DNS (Domain Name\nServer) forwarder and DHCP (Dynamic Host Configuration Protocol) server. \n\nSecurity Fix(es):\n\n* A heap buffer overflow was found in dnsmasq in the code responsible for\nbuilding DNS replies. An attacker could send crafted DNS packets to dnsmasq\nwhich would cause it to crash or, potentially, execute arbitrary code. \n(CVE-2017-14491)\n\n* A heap buffer overflow was discovered in dnsmasq in the IPv6 router\nadvertisement (RA) handling code. This issue only affected\nconfigurations using one of these options: enable-ra, ra-only, slaac,\nra-names, ra-advrouter, or ra-stateless. (CVE-2017-14492)\n\n* A stack buffer overflow was found in dnsmasq in the DHCPv6 code. (CVE-2017-14493)\n\n* An information leak was found in dnsmasq in the DHCPv6 relay code. An\nattacker on the local network could send crafted DHCPv6 packets to dnsmasq\ncausing it to forward the contents of process memory, potentially leaking\nsensitive data. (CVE-2017-14494)\n\n* A memory exhaustion flaw was found in dnsmasq in the EDNS0 code. An\nattacker could send crafted DNS packets which would trigger memory\nallocations which would never be freed, leading to unbounded memory\nconsumption and eventually a crash. This issue only affected configurations\nusing one of the options: add-mac, add-cpe-id, or add-subnet. \n(CVE-2017-14495)\n\n* An integer underflow flaw leading to a buffer over-read was found in\ndnsmasq in the EDNS0 code. An attacker could send crafted DNS packets to\ndnsmasq which would cause it to crash. This issue only affected\nconfigurations using one of the options: add-mac, add-cpe-id, or\nadd-subnet. (CVE-2017-14496)\n\nRed Hat would like to thank Felix Wilhelm (Google Security Team), Fermin J. \nSerna (Google Security Team), Gabriel Campana (Google Security Team), Kevin\nHamacher (Google Security Team), and Ron Bowes (Google Security Team) for\nreporting these issues. \n\n4. Solution:\n\nFor details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\n5. Bugs fixed (https://bugzilla.redhat.com/):\n\n1495409 - CVE-2017-14491 dnsmasq: heap overflow in the code responsible for building DNS replies\n1495410 - CVE-2017-14492 dnsmasq: heap overflow in the IPv6 router advertisement code\n1495411 - CVE-2017-14493 dnsmasq: stack buffer overflow in the DHCPv6 code\n1495412 - CVE-2017-14494 dnsmasq: information leak in the DHCPv6 relay code\n1495415 - CVE-2017-14495 dnsmasq: memory exhaustion vulnerability in the EDNS0 code\n1495416 - CVE-2017-14496 dnsmasq: integer underflow leading to buffer over-read in the EDNS0 code\n\n6. Package List:\n\nRed Hat Enterprise Linux Client (v. 7):\n\nSource:\ndnsmasq-2.76-2.el7_4.2.src.rpm\n\nx86_64:\ndnsmasq-2.76-2.el7_4.2.x86_64.rpm\ndnsmasq-debuginfo-2.76-2.el7_4.2.x86_64.rpm\n\nRed Hat Enterprise Linux Client Optional (v. 7):\n\nx86_64:\ndnsmasq-debuginfo-2.76-2.el7_4.2.x86_64.rpm\ndnsmasq-utils-2.76-2.el7_4.2.x86_64.rpm\n\nRed Hat Enterprise Linux ComputeNode (v. 7):\n\nSource:\ndnsmasq-2.76-2.el7_4.2.src.rpm\n\nx86_64:\ndnsmasq-2.76-2.el7_4.2.x86_64.rpm\ndnsmasq-debuginfo-2.76-2.el7_4.2.x86_64.rpm\n\nRed Hat Enterprise Linux ComputeNode Optional (v. 7):\n\nx86_64:\ndnsmasq-debuginfo-2.76-2.el7_4.2.x86_64.rpm\ndnsmasq-utils-2.76-2.el7_4.2.x86_64.rpm\n\nRed Hat Enterprise Linux Server (v. 7):\n\nSource:\ndnsmasq-2.76-2.el7_4.2.src.rpm\n\naarch64:\ndnsmasq-2.76-2.el7_4.2.aarch64.rpm\ndnsmasq-debuginfo-2.76-2.el7_4.2.aarch64.rpm\n\nppc64:\ndnsmasq-2.76-2.el7_4.2.ppc64.rpm\ndnsmasq-debuginfo-2.76-2.el7_4.2.ppc64.rpm\n\nppc64le:\ndnsmasq-2.76-2.el7_4.2.ppc64le.rpm\ndnsmasq-debuginfo-2.76-2.el7_4.2.ppc64le.rpm\n\ns390x:\ndnsmasq-2.76-2.el7_4.2.s390x.rpm\ndnsmasq-debuginfo-2.76-2.el7_4.2.s390x.rpm\n\nx86_64:\ndnsmasq-2.76-2.el7_4.2.x86_64.rpm\ndnsmasq-debuginfo-2.76-2.el7_4.2.x86_64.rpm\n\nRed Hat Enterprise Linux Server Optional (v. 7):\n\naarch64:\ndnsmasq-debuginfo-2.76-2.el7_4.2.aarch64.rpm\ndnsmasq-utils-2.76-2.el7_4.2.aarch64.rpm\n\nppc64:\ndnsmasq-debuginfo-2.76-2.el7_4.2.ppc64.rpm\ndnsmasq-utils-2.76-2.el7_4.2.ppc64.rpm\n\nppc64le:\ndnsmasq-debuginfo-2.76-2.el7_4.2.ppc64le.rpm\ndnsmasq-utils-2.76-2.el7_4.2.ppc64le.rpm\n\ns390x:\ndnsmasq-debuginfo-2.76-2.el7_4.2.s390x.rpm\ndnsmasq-utils-2.76-2.el7_4.2.s390x.rpm\n\nx86_64:\ndnsmasq-debuginfo-2.76-2.el7_4.2.x86_64.rpm\ndnsmasq-utils-2.76-2.el7_4.2.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation (v. 7):\n\nSource:\ndnsmasq-2.76-2.el7_4.2.src.rpm\n\nx86_64:\ndnsmasq-2.76-2.el7_4.2.x86_64.rpm\ndnsmasq-debuginfo-2.76-2.el7_4.2.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation Optional (v. 7):\n\nx86_64:\ndnsmasq-debuginfo-2.76-2.el7_4.2.x86_64.rpm\ndnsmasq-utils-2.76-2.el7_4.2.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security. Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/\n\n7. References:\n\nhttps://access.redhat.com/security/cve/CVE-2017-14491\nhttps://access.redhat.com/security/cve/CVE-2017-14492\nhttps://access.redhat.com/security/cve/CVE-2017-14493\nhttps://access.redhat.com/security/cve/CVE-2017-14494\nhttps://access.redhat.com/security/cve/CVE-2017-14495\nhttps://access.redhat.com/security/cve/CVE-2017-14496\nhttps://access.redhat.com/security/updates/classification/#critical\nhttps://access.redhat.com/security/vulnerabilities/3199382\n\n8. Contact:\n\nThe Red Hat security contact is \u003csecalert@redhat.com\u003e. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2017 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1\n\niD8DBQFZ0opYXlSAg2UNWIIRAr0dAJ9rIL1FgNTJUf2I9jjKFFlfkCd/kwCfV+bX\nSfoCV7+qG2nwqlHKLZOlhIU=\n=iWfU\n-----END PGP SIGNATURE-----\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://www.redhat.com/mailman/listinfo/rhsa-announce\n. \n===========================================================================\nUbuntu Security Notice USN-3430-3\nJanuary 04, 2018\n\ndnsmasq regression\n===========================================================================\n\nA security issue affects these releases of Ubuntu and its derivatives:\n\n- Ubuntu 12.04 ESM\n\nSummary:\n\nUSN-3430-2 introduced regression in Dnsmasq. \n\nSoftware Description:\n- dnsmasq: Small caching DNS proxy and DHCP/TFTP server\n\nDetails:\n\nUSN-3430-2 fixed several vulnerabilities. The update introduced a new\nregression that breaks DNS resolution. This update addresses the\nproblem. \n\nWe apologize for the inconvenience. \n\nOriginal advisory details:\n\nFelix Wilhelm, Fermin J. Serna, Gabriel Campana and Kevin Hamacher\ndiscovered that Dnsmasq incorrectly handled DNS requests. \n(CVE-2017-14491)\n\nFelix Wilhelm, Fermin J. (CVE-2017-14492)\n\nFelix Wilhelm, Fermin J. Serna, Gabriel Campana and Kevin Hamacher\ndiscovered that Dnsmasq incorrectly handled DHCPv6 requests. \n(CVE-2017-14493)\n\nFelix Wilhelm, Fermin J. Serna, Gabriel Campana and Kevin Hamacher\ndiscovered that Dnsmasq incorrectly handled DHCPv6 packets. (CVE-2017-14494)\n\nFelix Wilhelm, Fermin J. Serna, Gabriel Campana and Kevin Hamacher\ndiscovered that Dnsmasq incorrectly handled DNS requests. (CVE-2017-14495)\n\nFelix Wilhelm, Fermin J. Serna, Gabriel Campana and Kevin Hamacher\ndiscovered that Dnsmasq incorrectly handled DNS requests. A remote\nattacker could use this issue to cause Dnsmasq to crash, resulting in\na denial of service. (CVE-2017-14496)\n\nUpdate instructions:\n\nThe problem can be corrected by updating your system to the following\npackage versions:\n\nUbuntu 12.04 ESM:\n dnsmasq=C2=A02.59-4ubuntu0.4\n dnsmasq-base2.59-4ubuntu0.4\n dnsmasq-utils2.59-4ubuntu0.4\n\nAfter a standard system update you need to reboot your computer to make\nall the necessary changes. \n\nAffected packages\n=================\n\n -------------------------------------------------------------------\n Package / Vulnerable / Unaffected\n -------------------------------------------------------------------\n 1 net-dns/dnsmasq \u003c 2.78 \u003e= 2.78 \n\nDescription\n===========\n\nMultiple vulnerabilities have been discovered in Dnsmasq. \n\nWorkaround\n==========\n\nThere is no known workaround at this time. \n\nResolution\n==========\n\nAll Dnsmasq users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose \"\u003e=net-dns/dnsmasq-2.78\"\n\nReferences\n==========\n\n[ 1 ] CVE-2017-14491\n https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-14491\n[ 2 ] CVE-2017-14492\n https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-14492\n[ 3 ] CVE-2017-14493\n https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-14493\n[ 4 ] CVE-2017-14494\n https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-14494\n[ 5 ] CVE-2017-14495\n https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-14495\n[ 6 ] CVE-2017-14496\n https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-14496\n\nAvailability\n============\n\nThis GLSA and any updates to it are available for viewing at\nthe Gentoo Security Website:\n\n https://security.gentoo.org/glsa/201710-27\n\nConcerns?\n=========\n\nSecurity is a primary focus of Gentoo Linux and ensuring the\nconfidentiality and security of our users\u0027 machines is of utmost\nimportance to us. Any security concerns should be addressed to\nsecurity@gentoo.org or alternatively, you may file a bug at\nhttps://bugs.gentoo.org. \n\nLicense\n=======\n\nCopyright 2017 Gentoo Foundation, Inc; referenced text\nbelongs to its owner(s). \n\nThe contents of this document are licensed under the\nCreative Commons - Attribution / Share Alike license. \n\nhttp://creativecommons.org/licenses/by-sa/2.5\n", "sources": [ { "db": "NVD", "id": "CVE-2017-14495" }, { "db": "CERT/CC", "id": "VU#973527" }, { "db": "JVNDB", "id": "JVNDB-2017-008622" }, { "db": "BID", "id": "101977" }, { "db": "BID", "id": "101085" }, { "db": "VULMON", "id": "CVE-2017-14495" }, { "db": "PACKETSTORM", "id": "144490" }, { "db": "PACKETSTORM", "id": "144484" }, { "db": "PACKETSTORM", "id": "145652" }, { "db": "PACKETSTORM", "id": "144469" }, { "db": "PACKETSTORM", "id": "144706" } ], "trust": 3.42 }, "exploit_availability": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "reference": "https://vulmon.com/exploitdetails?qidtp=exploitdb\u0026qid=42945", "trust": 0.1, "type": "exploit" } ], "sources": [ { "db": "VULMON", "id": "CVE-2017-14495" } ] }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "CERT/CC", "id": "VU#973527", "trust": 3.6 }, { "db": "NVD", "id": "CVE-2017-14495", "trust": 3.6 }, { "db": "BID", "id": "101085", "trust": 2.0 }, { "db": "BID", "id": "101977", "trust": 2.0 }, { "db": "ICS CERT", "id": "ICSA-17-332-01", "trust": 2.0 }, { "db": "EXPLOIT-DB", "id": "42945", "trust": 1.7 }, { "db": "SECTRACK", "id": "1039474", "trust": 1.7 }, { "db": "SIEMENS", "id": "SSA-689071", "trust": 1.7 }, { "db": "JVN", "id": "JVNVU93453933", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2017-008622", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201709-743", "trust": 0.6 }, { "db": "VULMON", "id": "CVE-2017-14495", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "144490", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "144484", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "145652", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "144469", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "144706", "trust": 0.1 } ], "sources": [ { "db": "CERT/CC", "id": "VU#973527" }, { "db": "VULMON", "id": "CVE-2017-14495" }, { "db": "BID", "id": "101977" }, { "db": "BID", "id": "101085" }, { "db": "JVNDB", "id": "JVNDB-2017-008622" }, { "db": "PACKETSTORM", "id": "144490" }, { "db": "PACKETSTORM", "id": "144484" }, { "db": "PACKETSTORM", "id": "145652" }, { "db": "PACKETSTORM", "id": "144469" }, { "db": "PACKETSTORM", "id": "144706" }, { "db": "NVD", "id": "CVE-2017-14495" }, { "db": "CNNVD", "id": "CNNVD-201709-743" } ] }, "id": "VAR-201710-0451", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.24812031 }, "last_update_date": "2023-12-26T00:11:30.541000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "DSA-3989", "trust": 0.8, "url": "https://www.debian.org/security/2017/dsa-3989" }, { "title": "Security Bulletin: NVIDIA Tegra Jetson L4T contains multiple vulnerabilities; updates for \u201cBlueBorne\u201d and \u201cDnsmasq\u201d.", "trust": 0.8, "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4561" }, { "title": "openSUSE-SU-2017:2633", "trust": 0.8, "url": "https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00006.html" }, { "title": "RHSA-2017:2836", "trust": 0.8, "url": "https://access.redhat.com/errata/rhsa-2017:2836" }, { "title": "CHANGELOG", "trust": 0.8, "url": "http://thekelleys.org.uk/dnsmasq/changelog" }, { "title": "Security fix, CVE-2017-14495, OOM in DNS response creation.", "trust": 0.8, "url": "http://thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=commit;h=51eadb692a5123b9838e5a68ecace3ac579a3a45" }, { "title": "USN-3430-2", "trust": 0.8, "url": "https://usn.ubuntu.com/usn/usn-3430-2/" }, { "title": "USN-3430-1", "trust": 0.8, "url": "https://usn.ubuntu.com/usn/usn-3430-1/" }, { "title": "dnsmasq: Multiple Critical and Important vulnerabilities", "trust": 0.8, "url": "https://access.redhat.com/security/vulnerabilities/3199382" }, { "title": "Dnsmasq Remediation of resource management error vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=92839" }, { "title": "Red Hat: Critical: dnsmasq security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=rhsa-20172836 - security advisory" }, { "title": "Arch Linux Issues: ", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=arch_linux_issues\u0026qid=cve-2017-14495" }, { "title": "Ubuntu Security Notice: dnsmasq vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=usn-3430-2" }, { "title": "Ubuntu Security Notice: dnsmasq regression", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=usn-3430-3" }, { "title": "Ubuntu Security Notice: dnsmasq vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=usn-3430-1" }, { "title": "Debian Security Advisories: DSA-3989-1 dnsmasq -- security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories\u0026qid=5c18698ecfe74c7de381531f8ed44dcf" }, { "title": "Siemens Security Advisories: Siemens Security Advisory", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories\u0026qid=7f490a104360d6f65bee18ec7bfa18a3" }, { "title": "Amazon Linux 2: ALAS2-2019-1251", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux2\u0026qid=alas2-2019-1251" }, { "title": "Amazon Linux AMI: ALAS-2017-907", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami\u0026qid=alas-2017-907" }, { "title": "Arch Linux Advisories: [ASA-201710-1] dnsmasq: multiple issues", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=arch_linux_advisories\u0026qid=asa-201710-1" }, { "title": "Oracle Solaris Third Party Bulletins: Oracle Solaris Third Party Bulletin - October 2017", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=oracle_solaris_third_party_bulletins\u0026qid=6283337cd31f81f24d445925f2138c0e" }, { "title": "Oracle Linux Bulletins: Oracle Linux Bulletin - October 2017", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=oracle_linux_bulletins\u0026qid=7251d5e5f2b1771951980ad7cfde50ba" }, { "title": "Awesome CVE PoC", "trust": 0.1, "url": "https://github.com/lnick2023/nicenice " }, { "title": "Awesome CVE PoC", "trust": 0.1, "url": "https://github.com/xbl3/awesome-cve-poc_qazbnm456 " }, { "title": "Awesome CVE PoC", "trust": 0.1, "url": "https://github.com/qazbnm456/awesome-cve-poc " }, { "title": "Threatpost", "trust": 0.1, "url": "https://threatpost.com/google-warns-of-dos-and-rce-bugs-in-dnsmasq/128238/" } ], "sources": [ { "db": "VULMON", "id": "CVE-2017-14495" }, { "db": "JVNDB", "id": "JVNDB-2017-008622" }, { "db": "CNNVD", "id": "CNNVD-201709-743" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-772", "trust": 1.0 }, { "problemtype": "CWE-400", "trust": 0.8 }, { "problemtype": "CWE-399", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-008622" }, { "db": "NVD", "id": "CVE-2017-14495" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.5, "url": "https://www.kb.cert.org/vuls/id/973527" }, { "trust": 2.9, "url": "http://www.securityfocus.com/bid/101085" }, { "trust": 2.8, "url": "https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html" }, { "trust": 2.1, "url": "https://access.redhat.com/errata/rhsa-2017:2836" }, { "trust": 2.0, "url": "http://www.ubuntu.com/usn/usn-3430-1" }, { "trust": 2.0, "url": "http://www.debian.org/security/2017/dsa-3989" }, { "trust": 2.0, "url": "https://ics-cert.us-cert.gov/advisories/icsa-17-332-01" }, { "trust": 1.8, "url": "https://www.exploit-db.com/exploits/42945/" }, { "trust": 1.8, "url": "https://access.redhat.com/security/vulnerabilities/3199382" }, { "trust": 1.8, "url": "http://www.ubuntu.com/usn/usn-3430-2" }, { "trust": 1.8, "url": "https://security.gentoo.org/glsa/201710-27" }, { "trust": 1.7, "url": "http://www.thekelleys.org.uk/dnsmasq/doc.html" }, { "trust": 1.7, "url": "http://www.securitytracker.com/id/1039474" }, { "trust": 1.7, "url": "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00006.html" }, { "trust": 1.7, "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4561" }, { "trust": 1.7, "url": "http://www.securityfocus.com/bid/101977" }, { "trust": 1.7, "url": "https://www.synology.com/support/security/synology_sa_17_59_dnsmasq" }, { "trust": 1.7, "url": "http://www.arubanetworks.com/assets/alert/aruba-psa-2017-005.txt" }, { "trust": 1.7, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-689071.pdf" }, { "trust": 1.7, "url": "http://thekelleys.org.uk/dnsmasq/changelog" }, { "trust": 1.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-14495" }, { "trust": 1.1, "url": "https://www.mail-archive.com/dnsmasq-discuss%40lists.thekelleys.org.uk/msg11665.html" }, { "trust": 1.1, "url": "http://thekelleys.org.uk/gitweb/?p=dnsmasq.git%3ba=commit%3bh=51eadb692a5123b9838e5a68ecace3ac579a3a45" }, { "trust": 1.1, "url": "https://www.mail-archive.com/dnsmasq-discuss%40lists.thekelleys.org.uk/msg11664.html" }, { "trust": 1.0, "url": "https://access.redhat.com/security/cve/cve-2017-14491" }, { "trust": 1.0, "url": "https://access.redhat.com/security/cve/cve-2017-14492" }, { "trust": 1.0, "url": "https://access.redhat.com/security/cve/cve-2017-14493" }, { "trust": 1.0, "url": "https://access.redhat.com/security/cve/cve-2017-14494" }, { "trust": 1.0, "url": "https://access.redhat.com/security/cve/cve-2017-14495" }, { "trust": 1.0, "url": "https://access.redhat.com/security/cve/cve-2017-14496" }, { "trust": 0.9, "url": "http://www.thekelleys.org.uk/dnsmasq/changelog" }, { "trust": 0.9, "url": "https://github.com/google/security-research-pocs/blob/master/vulnerabilities/dnsmasq/cve-2017-14491.py" }, { "trust": 0.9, "url": "https://github.com/google/security-research-pocs/blob/master/vulnerabilities/dnsmasq/cve-2017-14492.py" }, { "trust": 0.9, "url": "https://github.com/google/security-research-pocs/blob/master/vulnerabilities/dnsmasq/cve-2017-14493.py" }, { "trust": 0.9, "url": "https://github.com/google/security-research-pocs/blob/master/vulnerabilities/dnsmasq/cve-2017-14494.py" }, { "trust": 0.9, "url": "https://github.com/google/security-research-pocs/blob/master/vulnerabilities/dnsmasq/cve-2017-14495.py" }, { "trust": 0.9, "url": "https://github.com/kubernetes/kubernetes/blob/master/changelog.md" }, { "trust": 0.9, "url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2017\u0026m=slackware-security.601472" }, { "trust": 0.9, "url": "https://source.android.com/security/bulletin/2017-10-01" }, { "trust": 0.9, "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1495410" }, { "trust": 0.9, "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1495411" }, { "trust": 0.9, "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1495412" }, { "trust": 0.9, "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1495415" }, { "trust": 0.9, "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1495416" }, { "trust": 0.9, "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1495510" }, { "trust": 0.9, "url": "https://access.redhat.com/security/cve/cve-2017-13704" }, { "trust": 0.9, "url": "https://github.com/google/security-research-pocs/blob/master/vulnerabilities/dnsmasq/cve-2017-14496.py" }, { "trust": 0.9, "url": "https://access.redhat.com/errata/rhsa-2017:2837" }, { "trust": 0.8, "url": "https://www.ruckuswireless.com/security" }, { "trust": 0.8, "url": "https://www.zyxel.com/support/announcement_dnsmasq_vulnerabilities.shtml" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-14495" }, { "trust": 0.8, "url": "http://jvn.jp/vu/jvnvu93453933/index.html" }, { "trust": 0.6, "url": "https://www.mail-archive.com/dnsmasq-discuss@lists.thekelleys.org.uk/msg11664.html" }, { "trust": 0.6, "url": "http://thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=commit;h=51eadb692a5123b9838e5a68ecace3ac579a3a45" }, { "trust": 0.6, "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1495409bug1495409" }, { "trust": 0.6, "url": "https://www.mail-archive.com/dnsmasq-discuss@lists.thekelleys.org.uk/msg11665.html" }, { "trust": 0.6, "url": "https://us-cert.cisa.gov/ics/advisories/icsa-17-332-01" }, { "trust": 0.5, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-14496" }, { "trust": 0.5, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-14491" }, { "trust": 0.5, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-14494" }, { "trust": 0.5, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-14492" }, { "trust": 0.5, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-14493" }, { "trust": 0.3, "url": "http://subscriber.communications.siemens.com/" }, { "trust": 0.3, "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1495409 bug 1495409" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/772.html" }, { "trust": 0.1, "url": "https://tools.cisco.com/security/center/viewalert.x?alertid=55498" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://usn.ubuntu.com/3430-2/" }, { "trust": 0.1, "url": "https://access.redhat.com/security/updates/classification/#critical" }, { "trust": 0.1, "url": "https://access.redhat.com/articles/11258" }, { "trust": 0.1, "url": "https://access.redhat.com/security/team/contact/" }, { "trust": 0.1, "url": "https://www.redhat.com/mailman/listinfo/rhsa-announce" }, { "trust": 0.1, "url": "https://bugzilla.redhat.com/):" }, { "trust": 0.1, "url": "https://access.redhat.com/security/team/key/" }, { "trust": 0.1, "url": "https://launchpad.net/bugs/1741262" }, { "trust": 0.1, "url": "https://www.ubuntu.com/usn/usn-3430-3" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/dnsmasq/2.76-5ubuntu0.1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/dnsmasq/2.75-1ubuntu0.16.04.3" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/dnsmasq/2.68-1ubuntu0.2" }, { "trust": 0.1, "url": "https://nvd.nist.gov/nvd.cfm?cvename=cve-2017-14495" }, { "trust": 0.1, "url": "http://creativecommons.org/licenses/by-sa/2.5" }, { "trust": 0.1, "url": "https://nvd.nist.gov/nvd.cfm?cvename=cve-2017-14493" }, { "trust": 0.1, "url": "https://nvd.nist.gov/nvd.cfm?cvename=cve-2017-14492" }, { "trust": 0.1, "url": "https://nvd.nist.gov/nvd.cfm?cvename=cve-2017-14491" }, { "trust": 0.1, "url": "https://security.gentoo.org/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/nvd.cfm?cvename=cve-2017-14496" }, { "trust": 0.1, "url": "https://bugs.gentoo.org." }, { "trust": 0.1, "url": "https://nvd.nist.gov/nvd.cfm?cvename=cve-2017-14494" } ], "sources": [ { "db": "CERT/CC", "id": "VU#973527" }, { "db": "VULMON", "id": "CVE-2017-14495" }, { "db": "BID", "id": "101977" }, { "db": "BID", "id": "101085" }, { "db": "JVNDB", "id": "JVNDB-2017-008622" }, { "db": "PACKETSTORM", "id": "144490" }, { "db": "PACKETSTORM", "id": "144484" }, { "db": "PACKETSTORM", "id": "145652" }, { "db": "PACKETSTORM", "id": "144469" }, { "db": "PACKETSTORM", "id": "144706" }, { "db": "NVD", "id": "CVE-2017-14495" }, { "db": "CNNVD", "id": "CNNVD-201709-743" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CERT/CC", "id": "VU#973527" }, { "db": "VULMON", "id": "CVE-2017-14495" }, { "db": "BID", "id": "101977" }, { "db": "BID", "id": "101085" }, { "db": "JVNDB", "id": "JVNDB-2017-008622" }, { "db": "PACKETSTORM", "id": "144490" }, { "db": "PACKETSTORM", "id": "144484" }, { "db": "PACKETSTORM", "id": "145652" }, { "db": "PACKETSTORM", "id": "144469" }, { "db": "PACKETSTORM", "id": "144706" }, { "db": "NVD", "id": "CVE-2017-14495" }, { "db": "CNNVD", "id": "CNNVD-201709-743" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-10-02T00:00:00", "db": "CERT/CC", "id": "VU#973527" }, { "date": "2017-10-03T00:00:00", "db": "VULMON", "id": "CVE-2017-14495" }, { "date": "2017-11-28T00:00:00", "db": "BID", "id": "101977" }, { "date": "2017-10-02T00:00:00", "db": "BID", "id": "101085" }, { "date": "2017-10-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2017-008622" }, { "date": "2017-10-03T20:21:00", "db": "PACKETSTORM", "id": "144490" }, { "date": "2017-10-03T05:19:24", "db": "PACKETSTORM", "id": "144484" }, { "date": "2018-01-04T17:50:40", "db": "PACKETSTORM", "id": "145652" }, { "date": "2017-10-02T13:13:00", "db": "PACKETSTORM", "id": "144469" }, { "date": "2017-10-23T13:54:05", "db": "PACKETSTORM", "id": "144706" }, { "date": "2017-10-03T01:29:02.153000", "db": "NVD", "id": "CVE-2017-14495" }, { "date": "2017-09-18T00:00:00", "db": "CNNVD", "id": "CNNVD-201709-743" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-02-02T00:00:00", "db": "CERT/CC", "id": "VU#973527" }, { "date": "2023-11-07T00:00:00", "db": "VULMON", "id": "CVE-2017-14495" }, { "date": "2019-05-15T17:00:00", "db": "BID", "id": "101977" }, { "date": "2017-10-02T00:00:00", "db": "BID", "id": "101085" }, { "date": "2017-11-29T00:00:00", "db": "JVNDB", "id": "JVNDB-2017-008622" }, { "date": "2023-11-07T02:39:01.690000", "db": "NVD", "id": "CVE-2017-14495" }, { "date": "2020-10-14T00:00:00", "db": "CNNVD", "id": "CNNVD-201709-743" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "PACKETSTORM", "id": "144490" }, { "db": "PACKETSTORM", "id": "145652" }, { "db": "PACKETSTORM", "id": "144469" }, { "db": "PACKETSTORM", "id": "144706" }, { "db": "CNNVD", "id": "CNNVD-201709-743" } ], "trust": 1.0 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Dnsmasq contains multiple vulnerabilities", "sources": [ { "db": "CERT/CC", "id": "VU#973527" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "resource management error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201709-743" } ], "trust": 0.6 } }
gsd-2017-14495
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2017-14495", "description": "Memory leak in dnsmasq before 2.78, when the --add-mac, --add-cpe-id or --add-subnet option is specified, allows remote attackers to cause a denial of service (memory consumption) via vectors involving DNS response creation.", "id": "GSD-2017-14495", "references": [ "https://www.suse.com/security/cve/CVE-2017-14495.html", "https://www.debian.org/security/2017/dsa-3989", "https://access.redhat.com/errata/RHSA-2017:2836", "https://ubuntu.com/security/CVE-2017-14495", "https://advisories.mageia.org/CVE-2017-14495.html", "https://security.archlinux.org/CVE-2017-14495", "https://alas.aws.amazon.com/cve/html/CVE-2017-14495.html", "https://linux.oracle.com/cve/CVE-2017-14495.html", "https://packetstormsecurity.com/files/cve/CVE-2017-14495" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2017-14495" ], "details": "Memory leak in dnsmasq before 2.78, when the --add-mac, --add-cpe-id or --add-subnet option is specified, allows remote attackers to cause a denial of service (memory consumption) via vectors involving DNS response creation.", "id": "GSD-2017-14495", "modified": "2023-12-13T01:21:12.580674Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2017-14495", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Memory leak in dnsmasq before 2.78, when the --add-mac, --add-cpe-id or --add-subnet option is specified, allows remote attackers to cause a denial of service (memory consumption) via vectors involving DNS response creation." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1039474", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1039474" }, { "name": "https://www.synology.com/support/security/Synology_SA_17_59_Dnsmasq", "refsource": "CONFIRM", "url": "https://www.synology.com/support/security/Synology_SA_17_59_Dnsmasq" }, { "name": "DSA-3989", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2017/dsa-3989" }, { "name": "https://access.redhat.com/security/vulnerabilities/3199382", "refsource": "CONFIRM", "url": "https://access.redhat.com/security/vulnerabilities/3199382" }, { "name": "101085", "refsource": "BID", "url": "http://www.securityfocus.com/bid/101085" }, { "name": "USN-3430-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-3430-1" }, { "name": "101977", "refsource": "BID", "url": "http://www.securityfocus.com/bid/101977" }, { "name": "VU#973527", "refsource": "CERT-VN", "url": "https://www.kb.cert.org/vuls/id/973527" }, { "name": "GLSA-201710-27", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201710-27" }, { "name": "USN-3430-2", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-3430-2" }, { "name": "[dnsmasq-discuss] 20171002 Announce: dnsmasq-2.78.", "refsource": "MLIST", "url": "https://www.mail-archive.com/dnsmasq-discuss@lists.thekelleys.org.uk/msg11665.html" }, { "name": "RHSA-2017:2836", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2017:2836" }, { "name": "http://nvidia.custhelp.com/app/answers/detail/a_id/4561", "refsource": "CONFIRM", "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4561" }, { "name": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-005.txt", "refsource": "CONFIRM", "url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-005.txt" }, { "name": "http://thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=commit;h=51eadb692a5123b9838e5a68ecace3ac579a3a45", "refsource": "CONFIRM", "url": "http://thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=commit;h=51eadb692a5123b9838e5a68ecace3ac579a3a45" }, { "name": "42945", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/42945/" }, { "name": "http://thekelleys.org.uk/dnsmasq/CHANGELOG", "refsource": "CONFIRM", "url": "http://thekelleys.org.uk/dnsmasq/CHANGELOG" }, { "name": "openSUSE-SU-2017:2633", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00006.html" }, { "name": "https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html", "refsource": "MISC", "url": "https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html" }, { "name": "[dnsmasq-discuss] 20171002 IMPORTANT SECURITY INFORMATION.", "refsource": "MLIST", "url": "https://www.mail-archive.com/dnsmasq-discuss@lists.thekelleys.org.uk/msg11664.html" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-689071.pdf", "refsource": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-689071.pdf" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:7.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:novell:leap:42.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:17.04:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:novell:leap:42.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:thekelleys:dnsmasq:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.77", "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2017-14495" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "Memory leak in dnsmasq before 2.78, when the --add-mac, --add-cpe-id or --add-subnet option is specified, allows remote attackers to cause a denial of service (memory consumption) via vectors involving DNS response creation." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-772" } ] } ] }, "references": { "reference_data": [ { "name": "[dnsmasq-discuss] 20171002 Announce: dnsmasq-2.78.", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://www.mail-archive.com/dnsmasq-discuss@lists.thekelleys.org.uk/msg11665.html" }, { "name": "[dnsmasq-discuss] 20171002 IMPORTANT SECURITY INFORMATION.", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://www.mail-archive.com/dnsmasq-discuss@lists.thekelleys.org.uk/msg11664.html" }, { "name": "https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html", "refsource": "MISC", "tags": [ "Third Party Advisory" ], "url": "https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html" }, { "name": "http://thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=commit;h=51eadb692a5123b9838e5a68ecace3ac579a3a45", "refsource": "CONFIRM", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=commit;h=51eadb692a5123b9838e5a68ecace3ac579a3a45" }, { "name": "http://thekelleys.org.uk/dnsmasq/CHANGELOG", "refsource": "CONFIRM", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "http://thekelleys.org.uk/dnsmasq/CHANGELOG" }, { "name": "1039474", "refsource": "SECTRACK", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1039474" }, { "name": "42945", "refsource": "EXPLOIT-DB", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://www.exploit-db.com/exploits/42945/" }, { "name": "101085", "refsource": "BID", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/101085" }, { "name": "VU#973527", "refsource": "CERT-VN", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://www.kb.cert.org/vuls/id/973527" }, { "name": "https://access.redhat.com/security/vulnerabilities/3199382", "refsource": "CONFIRM", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://access.redhat.com/security/vulnerabilities/3199382" }, { "name": "RHSA-2017:2836", "refsource": "REDHAT", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2017:2836" }, { "name": "USN-3430-2", "refsource": "UBUNTU", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-3430-2" }, { "name": "USN-3430-1", "refsource": "UBUNTU", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-3430-1" }, { "name": "DSA-3989", "refsource": "DEBIAN", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2017/dsa-3989" }, { "name": "openSUSE-SU-2017:2633", "refsource": "SUSE", "tags": [ "Issue Tracking", "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00006.html" }, { "name": "http://nvidia.custhelp.com/app/answers/detail/a_id/4561", "refsource": "CONFIRM", "tags": [], "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4561" }, { "name": "GLSA-201710-27", "refsource": "GENTOO", "tags": [], "url": "https://security.gentoo.org/glsa/201710-27" }, { "name": "101977", "refsource": "BID", "tags": [], "url": "http://www.securityfocus.com/bid/101977" }, { "name": "https://www.synology.com/support/security/Synology_SA_17_59_Dnsmasq", "refsource": "CONFIRM", "tags": [], "url": "https://www.synology.com/support/security/Synology_SA_17_59_Dnsmasq" }, { "name": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-005.txt", "refsource": "CONFIRM", "tags": [], "url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-005.txt" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-689071.pdf", "refsource": "CONFIRM", "tags": [], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-689071.pdf" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.6 } }, "lastModifiedDate": "2019-10-03T00:03Z", "publishedDate": "2017-10-03T01:29Z" } } }
ghsa-rcfc-xq5g-7phm
Vulnerability from github
Memory leak in dnsmasq before 2.78, when the --add-mac, --add-cpe-id or --add-subnet option is specified, allows remote attackers to cause a denial of service (memory consumption) via vectors involving DNS response creation.
{ "affected": [], "aliases": [ "CVE-2017-14495" ], "database_specific": { "cwe_ids": [ "CWE-772" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2017-10-03T01:29:00Z", "severity": "HIGH" }, "details": "Memory leak in dnsmasq before 2.78, when the --add-mac, --add-cpe-id or --add-subnet option is specified, allows remote attackers to cause a denial of service (memory consumption) via vectors involving DNS response creation.", "id": "GHSA-rcfc-xq5g-7phm", "modified": "2022-05-13T01:43:26Z", "published": "2022-05-13T01:43:26Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-14495" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2017:2836" }, { "type": "WEB", "url": "https://access.redhat.com/security/vulnerabilities/3199382" }, { "type": "WEB", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-689071.pdf" }, { "type": "WEB", "url": "https://security.gentoo.org/glsa/201710-27" }, { "type": "WEB", "url": "https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html" }, { "type": "WEB", "url": "https://www.exploit-db.com/exploits/42945" }, { "type": "WEB", "url": "https://www.kb.cert.org/vuls/id/973527" }, { "type": "WEB", "url": "https://www.mail-archive.com/dnsmasq-discuss@lists.thekelleys.org.uk/msg11664.html" }, { "type": "WEB", "url": "https://www.mail-archive.com/dnsmasq-discuss@lists.thekelleys.org.uk/msg11665.html" }, { "type": "WEB", "url": "https://www.synology.com/support/security/Synology_SA_17_59_Dnsmasq" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00006.html" }, { "type": "WEB", "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4561" }, { "type": "WEB", "url": "http://thekelleys.org.uk/dnsmasq/CHANGELOG" }, { "type": "WEB", "url": "http://thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=commit;h=51eadb692a5123b9838e5a68ecace3ac579a3a45" }, { "type": "WEB", "url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-005.txt" }, { "type": "WEB", "url": "http://www.debian.org/security/2017/dsa-3989" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/101085" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/101977" }, { "type": "WEB", "url": "http://www.securitytracker.com/id/1039474" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/USN-3430-1" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/USN-3430-2" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ] }
rhsa-2017_2836
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Critical" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for dnsmasq is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The dnsmasq packages contain Dnsmasq, a lightweight DNS (Domain Name Server) forwarder and DHCP (Dynamic Host Configuration Protocol) server.\n\nSecurity Fix(es):\n\n* A heap buffer overflow was found in dnsmasq in the code responsible for building DNS replies. An attacker could send crafted DNS packets to dnsmasq which would cause it to crash or, potentially, execute arbitrary code. (CVE-2017-14491)\n\n* A heap buffer overflow was discovered in dnsmasq in the IPv6 router advertisement (RA) handling code. An attacker on the local network segment could send crafted RAs to dnsmasq which would cause it to crash or, potentially, execute arbitrary code. This issue only affected configurations using one of these options: enable-ra, ra-only, slaac, ra-names, ra-advrouter, or ra-stateless. (CVE-2017-14492)\n\n* A stack buffer overflow was found in dnsmasq in the DHCPv6 code. An attacker on the local network could send a crafted DHCPv6 request to dnsmasq which would cause it to a crash or, potentially, execute arbitrary code. (CVE-2017-14493)\n\n* An information leak was found in dnsmasq in the DHCPv6 relay code. An attacker on the local network could send crafted DHCPv6 packets to dnsmasq causing it to forward the contents of process memory, potentially leaking sensitive data. (CVE-2017-14494)\n\n* A memory exhaustion flaw was found in dnsmasq in the EDNS0 code. An attacker could send crafted DNS packets which would trigger memory allocations which would never be freed, leading to unbounded memory consumption and eventually a crash. This issue only affected configurations using one of the options: add-mac, add-cpe-id, or add-subnet. (CVE-2017-14495)\n\n* An integer underflow flaw leading to a buffer over-read was found in dnsmasq in the EDNS0 code. An attacker could send crafted DNS packets to dnsmasq which would cause it to crash. This issue only affected configurations using one of the options: add-mac, add-cpe-id, or add-subnet. (CVE-2017-14496)\n\nRed Hat would like to thank Felix Wilhelm (Google Security Team), Fermin J. Serna (Google Security Team), Gabriel Campana (Google Security Team), Kevin Hamacher (Google Security Team), and Ron Bowes (Google Security Team) for reporting these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2017:2836", "url": "https://access.redhat.com/errata/RHSA-2017:2836" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#critical", "url": "https://access.redhat.com/security/updates/classification/#critical" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/3199382", "url": "https://access.redhat.com/security/vulnerabilities/3199382" }, { "category": "external", "summary": "1495409", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1495409" }, { "category": "external", "summary": "1495410", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1495410" }, { "category": "external", "summary": "1495411", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1495411" }, { "category": "external", "summary": "1495412", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1495412" }, { "category": "external", "summary": "1495415", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1495415" }, { "category": "external", "summary": "1495416", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1495416" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2017/rhsa-2017_2836.json" } ], "title": "Red Hat Security Advisory: dnsmasq security update", "tracking": { "current_release_date": "2024-11-05T20:13:15+00:00", "generator": { "date": "2024-11-05T20:13:15+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2017:2836", "initial_release_date": "2017-10-02T17:18:46+00:00", "revision_history": [ { "date": "2017-10-02T17:18:46+00:00", "number": "1", "summary": "Initial version" }, { "date": "2017-10-02T17:18:46+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-05T20:13:15+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Client (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.4.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Client Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.4.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode (v. 7)", "product": { "name": "Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.4.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.4.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "dnsmasq-0:2.76-2.el7_4.2.x86_64", "product": { "name": "dnsmasq-0:2.76-2.el7_4.2.x86_64", "product_id": "dnsmasq-0:2.76-2.el7_4.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq@2.76-2.el7_4.2?arch=x86_64" } } }, { "category": "product_version", "name": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "product": { "name": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "product_id": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-debuginfo@2.76-2.el7_4.2?arch=x86_64" } } }, { "category": "product_version", "name": "dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "product": { "name": "dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "product_id": "dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-utils@2.76-2.el7_4.2?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "dnsmasq-0:2.76-2.el7_4.2.src", "product": { "name": "dnsmasq-0:2.76-2.el7_4.2.src", "product_id": "dnsmasq-0:2.76-2.el7_4.2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq@2.76-2.el7_4.2?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "dnsmasq-0:2.76-2.el7_4.2.ppc64le", "product": { "name": "dnsmasq-0:2.76-2.el7_4.2.ppc64le", "product_id": "dnsmasq-0:2.76-2.el7_4.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq@2.76-2.el7_4.2?arch=ppc64le" } } }, { "category": "product_version", "name": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "product": { "name": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "product_id": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-debuginfo@2.76-2.el7_4.2?arch=ppc64le" } } }, { "category": "product_version", "name": "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "product": { "name": "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "product_id": "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-utils@2.76-2.el7_4.2?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "dnsmasq-0:2.76-2.el7_4.2.ppc64", "product": { "name": "dnsmasq-0:2.76-2.el7_4.2.ppc64", "product_id": "dnsmasq-0:2.76-2.el7_4.2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq@2.76-2.el7_4.2?arch=ppc64" } } }, { "category": "product_version", "name": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "product": { "name": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "product_id": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-debuginfo@2.76-2.el7_4.2?arch=ppc64" } } }, { "category": "product_version", "name": "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "product": { "name": "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "product_id": "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-utils@2.76-2.el7_4.2?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "dnsmasq-0:2.76-2.el7_4.2.s390x", "product": { "name": "dnsmasq-0:2.76-2.el7_4.2.s390x", "product_id": "dnsmasq-0:2.76-2.el7_4.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq@2.76-2.el7_4.2?arch=s390x" } } }, { "category": "product_version", "name": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "product": { "name": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "product_id": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-debuginfo@2.76-2.el7_4.2?arch=s390x" } } }, { "category": "product_version", "name": "dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "product": { "name": "dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "product_id": "dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-utils@2.76-2.el7_4.2?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "product": { "name": "dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "product_id": "dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-utils@2.76-2.el7_4.2?arch=aarch64" } } }, { "category": "product_version", "name": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "product": { "name": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "product_id": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-debuginfo@2.76-2.el7_4.2?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-2.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64" }, "product_reference": "dnsmasq-0:2.76-2.el7_4.2.ppc64", "relates_to_product_reference": "7Client-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-2.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le" }, "product_reference": "dnsmasq-0:2.76-2.el7_4.2.ppc64le", "relates_to_product_reference": "7Client-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-2.el7_4.2.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x" }, "product_reference": "dnsmasq-0:2.76-2.el7_4.2.s390x", "relates_to_product_reference": "7Client-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-2.el7_4.2.src as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src" }, "product_reference": "dnsmasq-0:2.76-2.el7_4.2.src", "relates_to_product_reference": "7Client-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-2.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64" }, "product_reference": "dnsmasq-0:2.76-2.el7_4.2.x86_64", "relates_to_product_reference": "7Client-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64" }, "product_reference": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "relates_to_product_reference": "7Client-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64" }, "product_reference": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "relates_to_product_reference": "7Client-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le" }, "product_reference": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "relates_to_product_reference": "7Client-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x" }, "product_reference": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "relates_to_product_reference": "7Client-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64" }, "product_reference": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "relates_to_product_reference": "7Client-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-2.el7_4.2.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64" }, "product_reference": "dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "relates_to_product_reference": "7Client-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64" }, "product_reference": "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "relates_to_product_reference": "7Client-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le" }, "product_reference": "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "relates_to_product_reference": "7Client-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-2.el7_4.2.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x" }, "product_reference": "dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "relates_to_product_reference": "7Client-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-2.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64" }, "product_reference": "dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "relates_to_product_reference": "7Client-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-2.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64" }, "product_reference": "dnsmasq-0:2.76-2.el7_4.2.ppc64", "relates_to_product_reference": "7Client-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-2.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le" }, "product_reference": "dnsmasq-0:2.76-2.el7_4.2.ppc64le", "relates_to_product_reference": "7Client-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-2.el7_4.2.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x" }, "product_reference": "dnsmasq-0:2.76-2.el7_4.2.s390x", "relates_to_product_reference": "7Client-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-2.el7_4.2.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src" }, "product_reference": "dnsmasq-0:2.76-2.el7_4.2.src", "relates_to_product_reference": "7Client-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-2.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64" }, "product_reference": "dnsmasq-0:2.76-2.el7_4.2.x86_64", "relates_to_product_reference": "7Client-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64" }, "product_reference": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "relates_to_product_reference": "7Client-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64" }, "product_reference": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "relates_to_product_reference": "7Client-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le" }, "product_reference": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "relates_to_product_reference": "7Client-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x" }, "product_reference": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "relates_to_product_reference": "7Client-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64" }, "product_reference": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "relates_to_product_reference": "7Client-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-2.el7_4.2.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64" }, "product_reference": "dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "relates_to_product_reference": "7Client-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64" }, "product_reference": "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "relates_to_product_reference": "7Client-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le" }, "product_reference": "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "relates_to_product_reference": "7Client-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-2.el7_4.2.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x" }, "product_reference": "dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "relates_to_product_reference": "7Client-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-2.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64" }, "product_reference": "dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "relates_to_product_reference": "7Client-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-2.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64" }, "product_reference": "dnsmasq-0:2.76-2.el7_4.2.ppc64", "relates_to_product_reference": "7ComputeNode-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-2.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le" }, "product_reference": "dnsmasq-0:2.76-2.el7_4.2.ppc64le", "relates_to_product_reference": "7ComputeNode-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-2.el7_4.2.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x" }, "product_reference": "dnsmasq-0:2.76-2.el7_4.2.s390x", "relates_to_product_reference": "7ComputeNode-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-2.el7_4.2.src as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src" }, "product_reference": "dnsmasq-0:2.76-2.el7_4.2.src", "relates_to_product_reference": "7ComputeNode-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-2.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64" }, "product_reference": "dnsmasq-0:2.76-2.el7_4.2.x86_64", "relates_to_product_reference": "7ComputeNode-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64" }, "product_reference": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "relates_to_product_reference": "7ComputeNode-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64" }, "product_reference": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "relates_to_product_reference": "7ComputeNode-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le" }, "product_reference": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "relates_to_product_reference": "7ComputeNode-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x" }, "product_reference": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "relates_to_product_reference": "7ComputeNode-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64" }, "product_reference": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "relates_to_product_reference": "7ComputeNode-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-2.el7_4.2.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64" }, "product_reference": "dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "relates_to_product_reference": "7ComputeNode-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64" }, "product_reference": "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "relates_to_product_reference": "7ComputeNode-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le" }, "product_reference": "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "relates_to_product_reference": "7ComputeNode-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-2.el7_4.2.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x" }, "product_reference": "dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "relates_to_product_reference": "7ComputeNode-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-2.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64" }, "product_reference": "dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "relates_to_product_reference": "7ComputeNode-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-2.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64" }, "product_reference": "dnsmasq-0:2.76-2.el7_4.2.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-2.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le" }, "product_reference": "dnsmasq-0:2.76-2.el7_4.2.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-2.el7_4.2.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x" }, "product_reference": "dnsmasq-0:2.76-2.el7_4.2.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-2.el7_4.2.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src" }, "product_reference": "dnsmasq-0:2.76-2.el7_4.2.src", "relates_to_product_reference": "7ComputeNode-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-2.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64" }, "product_reference": "dnsmasq-0:2.76-2.el7_4.2.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64" }, "product_reference": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "relates_to_product_reference": "7ComputeNode-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64" }, "product_reference": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le" }, "product_reference": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x" }, "product_reference": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64" }, "product_reference": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-2.el7_4.2.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64" }, "product_reference": "dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "relates_to_product_reference": "7ComputeNode-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64" }, "product_reference": "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le" }, "product_reference": "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-2.el7_4.2.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x" }, "product_reference": "dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-2.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64" }, "product_reference": "dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-2.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64" }, "product_reference": "dnsmasq-0:2.76-2.el7_4.2.ppc64", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-2.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le" }, "product_reference": "dnsmasq-0:2.76-2.el7_4.2.ppc64le", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-2.el7_4.2.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x" }, "product_reference": "dnsmasq-0:2.76-2.el7_4.2.s390x", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-2.el7_4.2.src as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src" }, "product_reference": "dnsmasq-0:2.76-2.el7_4.2.src", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-2.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64" }, "product_reference": "dnsmasq-0:2.76-2.el7_4.2.x86_64", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64" }, "product_reference": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64" }, "product_reference": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le" }, "product_reference": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x" }, "product_reference": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64" }, "product_reference": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-2.el7_4.2.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64" }, "product_reference": "dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64" }, "product_reference": "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le" }, "product_reference": "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-2.el7_4.2.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x" }, "product_reference": "dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-2.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64" }, "product_reference": "dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-2.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64" }, "product_reference": "dnsmasq-0:2.76-2.el7_4.2.ppc64", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-2.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le" }, "product_reference": "dnsmasq-0:2.76-2.el7_4.2.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-2.el7_4.2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x" }, "product_reference": "dnsmasq-0:2.76-2.el7_4.2.s390x", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-2.el7_4.2.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src" }, "product_reference": "dnsmasq-0:2.76-2.el7_4.2.src", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-2.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64" }, "product_reference": "dnsmasq-0:2.76-2.el7_4.2.x86_64", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64" }, "product_reference": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64" }, "product_reference": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le" }, "product_reference": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x" }, "product_reference": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64" }, "product_reference": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-2.el7_4.2.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64" }, "product_reference": "dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64" }, "product_reference": "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le" }, "product_reference": "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-2.el7_4.2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x" }, "product_reference": "dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-2.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64" }, "product_reference": "dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-2.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64" }, "product_reference": "dnsmasq-0:2.76-2.el7_4.2.ppc64", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-2.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le" }, "product_reference": "dnsmasq-0:2.76-2.el7_4.2.ppc64le", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-2.el7_4.2.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x" }, "product_reference": "dnsmasq-0:2.76-2.el7_4.2.s390x", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-2.el7_4.2.src as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src" }, "product_reference": "dnsmasq-0:2.76-2.el7_4.2.src", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-2.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64" }, "product_reference": "dnsmasq-0:2.76-2.el7_4.2.x86_64", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64" }, "product_reference": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64" }, "product_reference": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le" }, "product_reference": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x" }, "product_reference": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64" }, "product_reference": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-2.el7_4.2.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64" }, "product_reference": "dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64" }, "product_reference": "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le" }, "product_reference": "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-2.el7_4.2.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x" }, "product_reference": "dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-2.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64" }, "product_reference": "dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-2.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64" }, "product_reference": "dnsmasq-0:2.76-2.el7_4.2.ppc64", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-2.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le" }, "product_reference": "dnsmasq-0:2.76-2.el7_4.2.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-2.el7_4.2.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x" }, "product_reference": "dnsmasq-0:2.76-2.el7_4.2.s390x", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-2.el7_4.2.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src" }, "product_reference": "dnsmasq-0:2.76-2.el7_4.2.src", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.76-2.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64" }, "product_reference": "dnsmasq-0:2.76-2.el7_4.2.x86_64", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64" }, "product_reference": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64" }, "product_reference": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le" }, "product_reference": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x" }, "product_reference": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64" }, "product_reference": "dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-2.el7_4.2.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64" }, "product_reference": "dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64" }, "product_reference": "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le" }, "product_reference": "dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-2.el7_4.2.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x" }, "product_reference": "dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.76-2.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64" }, "product_reference": "dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "relates_to_product_reference": "7Workstation-optional-7.4.Z" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Felix Wilhelm", "Fermin J. Serna", "Gabriel Campana", "Kevin Hamacher", "Ron Bowes" ], "organization": "Google Security Team" } ], "cve": "CVE-2017-14491", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2017-09-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1495409" } ], "notes": [ { "category": "description", "text": "A heap buffer overflow was found in dnsmasq in the code responsible for building DNS replies. An attacker could send crafted DNS packets to dnsmasq which would cause it to crash or, potentially, execute arbitrary code.", "title": "Vulnerability description" }, { "category": "summary", "text": "dnsmasq: heap overflow in the code responsible for building DNS replies", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform includes the dnsmasq-utils RPM which does not contain this flaw\u0027s affected code-paths; Red Hat OpenStack Platform is therefore listed as not affected.\n\nHowever, because all versions of Red Hat OpenStack Platform are based on Red Hat Enterprise Linux, all Red Hat OpenStack Platform users should absolutely upgrade the dnsmasq RPM from Red Hat Enterprise Linux as a matter of urgency using standard update mechanisms (such as \u0027yum update\u0027 or \u0027openstack overcloud update\u0027).", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-14491" }, { "category": "external", "summary": "RHBZ#1495409", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1495409" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-14491", "url": "https://www.cve.org/CVERecord?id=CVE-2017-14491" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-14491", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-14491" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/3199382", "url": "https://access.redhat.com/security/vulnerabilities/3199382" }, { "category": "external", "summary": "https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html", "url": "https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html" } ], "release_date": "2017-10-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-10-02T17:18:46+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:2836" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "dnsmasq: heap overflow in the code responsible for building DNS replies" }, { "acknowledgments": [ { "names": [ "Felix Wilhelm", "Fermin J. Serna", "Gabriel Campana", "Kevin Hamacher", "Ron Bowes" ], "organization": "Google Security Team" } ], "cve": "CVE-2017-14492", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2017-09-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1495410" } ], "notes": [ { "category": "description", "text": "A heap buffer overflow was discovered in dnsmasq in the IPv6 router advertisement (RA) handling code. An attacker on the local network segment could send crafted RAs to dnsmasq which would cause it to crash or, potentially, execute arbitrary code. This issue only affected configurations using one of these options: enable-ra, ra-only, slaac, ra-names, ra-advrouter, or ra-stateless.", "title": "Vulnerability description" }, { "category": "summary", "text": "dnsmasq: heap overflow in the IPv6 router advertisement code", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform includes the dnsmasq-utils RPM which does not contain this flaw\u0027s affected code-paths; Red Hat OpenStack Platform is therefore listed as not affected.\n\nHowever, because all versions of Red Hat OpenStack Platform are based on Red Hat Enterprise Linux, all Red Hat OpenStack Platform users should absolutely upgrade the dnsmasq RPM from Red Hat Enterprise Linux as a matter of urgency using standard update mechanisms (such as \u0027yum update\u0027 or \u0027openstack overcloud update\u0027).", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-14492" }, { "category": "external", "summary": "RHBZ#1495410", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1495410" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-14492", "url": "https://www.cve.org/CVERecord?id=CVE-2017-14492" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-14492", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-14492" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/3199382", "url": "https://access.redhat.com/security/vulnerabilities/3199382" }, { "category": "external", "summary": "https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html", "url": "https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html" } ], "release_date": "2017-10-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-10-02T17:18:46+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:2836" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 8.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:A/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "dnsmasq: heap overflow in the IPv6 router advertisement code" }, { "acknowledgments": [ { "names": [ "Felix Wilhelm", "Fermin J. Serna", "Gabriel Campana", "Kevin Hamacher", "Ron Bowes" ], "organization": "Google Security Team" } ], "cve": "CVE-2017-14493", "cwe": { "id": "CWE-121", "name": "Stack-based Buffer Overflow" }, "discovery_date": "2017-09-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1495411" } ], "notes": [ { "category": "description", "text": "A stack buffer overflow was found in dnsmasq in the DHCPv6 code. An attacker on the local network could send a crafted DHCPv6 request to dnsmasq which would cause it to a crash or, potentially, execute arbitrary code.", "title": "Vulnerability description" }, { "category": "summary", "text": "dnsmasq: stack buffer overflow in the DHCPv6 code", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform includes the dnsmasq-utils RPM which does not contain this flaw\u0027s affected code-paths; Red Hat OpenStack Platform is therefore listed as not affected.\n\nHowever, because all versions of Red Hat OpenStack Platform are based on Red Hat Enterprise Linux, all Red Hat OpenStack Platform users should absolutely upgrade the dnsmasq RPM from Red Hat Enterprise Linux as a matter of urgency using standard update mechanisms (such as \u0027yum update\u0027 or \u0027openstack overcloud update\u0027).", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-14493" }, { "category": "external", "summary": "RHBZ#1495411", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1495411" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-14493", "url": "https://www.cve.org/CVERecord?id=CVE-2017-14493" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-14493", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-14493" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/3199382", "url": "https://access.redhat.com/security/vulnerabilities/3199382" }, { "category": "external", "summary": "https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html", "url": "https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html" } ], "release_date": "2017-10-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-10-02T17:18:46+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:2836" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 8.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:A/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "dnsmasq: stack buffer overflow in the DHCPv6 code" }, { "acknowledgments": [ { "names": [ "Felix Wilhelm", "Fermin J. Serna", "Gabriel Campana", "Kevin Hamacher", "Ron Bowes" ], "organization": "Google Security Team" } ], "cve": "CVE-2017-14494", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2017-09-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1495412" } ], "notes": [ { "category": "description", "text": "An information leak was found in dnsmasq in the DHCPv6 relay code. An attacker on the local network could send crafted DHCPv6 packets to dnsmasq causing it to forward the contents of process memory, potentially leaking sensitive data.", "title": "Vulnerability description" }, { "category": "summary", "text": "dnsmasq: information leak in the DHCPv6 relay code", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform includes the dnsmasq-utils RPM which does not contain this flaw\u0027s affected code-paths; Red Hat OpenStack Platform is therefore listed as not affected.\n\nHowever, because all versions of Red Hat OpenStack Platform are based on Red Hat Enterprise Linux, all Red Hat OpenStack Platform users should absolutely upgrade the dnsmasq RPM from Red Hat Enterprise Linux as a matter of urgency using standard update mechanisms (such as \u0027yum update\u0027 or \u0027openstack overcloud update\u0027).", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-14494" }, { "category": "external", "summary": "RHBZ#1495412", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1495412" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-14494", "url": "https://www.cve.org/CVERecord?id=CVE-2017-14494" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-14494", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-14494" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/3199382", "url": "https://access.redhat.com/security/vulnerabilities/3199382" }, { "category": "external", "summary": "https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html", "url": "https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html" } ], "release_date": "2017-10-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-10-02T17:18:46+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:2836" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 7.8, "confidentialityImpact": "COMPLETE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:N/A:N", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "dnsmasq: information leak in the DHCPv6 relay code" }, { "acknowledgments": [ { "names": [ "Felix Wilhelm", "Fermin J. Serna", "Gabriel Campana", "Kevin Hamacher", "Ron Bowes" ], "organization": "Google Security Team" } ], "cve": "CVE-2017-14495", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2017-09-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1495415" } ], "notes": [ { "category": "description", "text": "A memory exhaustion flaw was found in dnsmasq in the EDNS0 code. An attacker could send crafted DNS packets which would trigger memory allocations which would never be freed, leading to unbounded memory consumption and eventually a crash. This issue only affected configurations using one of the options: add-mac, add-cpe-id, or add-subnet.", "title": "Vulnerability description" }, { "category": "summary", "text": "dnsmasq: memory exhaustion vulnerability in the EDNS0 code", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform includes the dnsmasq-utils RPM which does not contain this flaw\u0027s affected code-paths; Red Hat OpenStack Platform is therefore listed as not affected.\n\nHowever, because all versions of Red Hat OpenStack Platform are based on Red Hat Enterprise Linux, all Red Hat OpenStack Platform users should absolutely upgrade the dnsmasq RPM from Red Hat Enterprise Linux as a matter of urgency using standard update mechanisms (such as \u0027yum update\u0027 or \u0027openstack overcloud update\u0027).", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-14495" }, { "category": "external", "summary": "RHBZ#1495415", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1495415" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-14495", "url": "https://www.cve.org/CVERecord?id=CVE-2017-14495" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-14495", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-14495" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/3199382", "url": "https://access.redhat.com/security/vulnerabilities/3199382" }, { "category": "external", "summary": "https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html", "url": "https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html" } ], "release_date": "2017-10-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-10-02T17:18:46+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:2836" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "dnsmasq: memory exhaustion vulnerability in the EDNS0 code" }, { "acknowledgments": [ { "names": [ "Felix Wilhelm", "Fermin J. Serna", "Gabriel Campana", "Kevin Hamacher", "Ron Bowes" ], "organization": "Google Security Team" } ], "cve": "CVE-2017-14496", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2017-09-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1495416" } ], "notes": [ { "category": "description", "text": "An integer underflow flaw leading to a buffer over-read was found in dnsmasq in the EDNS0 code. An attacker could send crafted DNS packets to dnsmasq which would cause it to crash. This issue only affected configurations using one of the options: add-mac, add-cpe-id, or add-subnet.", "title": "Vulnerability description" }, { "category": "summary", "text": "dnsmasq: integer underflow leading to buffer over-read in the EDNS0 code", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform includes the dnsmasq-utils RPM which does not contain this flaw\u0027s affected code-paths; Red Hat OpenStack Platform is therefore listed as not affected.\n\nHowever, because all versions of Red Hat OpenStack Platform are based on Red Hat Enterprise Linux, all Red Hat OpenStack Platform users should absolutely upgrade the dnsmasq RPM from Red Hat Enterprise Linux as a matter of urgency using standard update mechanisms (such as \u0027yum update\u0027 or \u0027openstack overcloud update\u0027).", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-14496" }, { "category": "external", "summary": "RHBZ#1495416", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1495416" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-14496", "url": "https://www.cve.org/CVERecord?id=CVE-2017-14496" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-14496", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-14496" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/3199382", "url": "https://access.redhat.com/security/vulnerabilities/3199382" }, { "category": "external", "summary": "https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html", "url": "https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html" } ], "release_date": "2017-10-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-10-02T17:18:46+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:2836" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Client-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Client-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7ComputeNode-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7ComputeNode-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Server-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Server-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.src", "7Workstation-optional-7.4.Z:dnsmasq-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-debuginfo-0:2.76-2.el7_4.2.x86_64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.aarch64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.ppc64le", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.s390x", "7Workstation-optional-7.4.Z:dnsmasq-utils-0:2.76-2.el7_4.2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "dnsmasq: integer underflow leading to buffer over-read in the EDNS0 code" } ] }
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.