Security update for dnsmasq
SUSE Security Update: Security update for dnsmasq
Announcement ID: | SUSE-SU-2015:1015-1 |
Rating: | moderate |
References: | #923144 #928867 |
Affected Products: |
An update that solves one vulnerability and has one errata is now available. It includes one version update.
Description:
The DNS server dnsmasq was updated to fix one security issue and one non-security bug:
- CVE-2015-3294: A remote unauthenticated attacker could have caused a denial of service (DoS) or read memory from the heap, potentially disclosing information such as performed DNS queries or encryption keys. (bsc#928867)
- bsc#923144: When answer to an upstream query is a CNAME pointing to an A/AAAA record which is present locally (/etc/hosts), allow caching when the upstream and local A/AAAA records have the same value.
Security Issues:
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Server 11 SP3 for VMware:
zypper in -t patch slessp3-dnsmasq=10650
- SUSE Linux Enterprise Server 11 SP3:
zypper in -t patch slessp3-dnsmasq=10650
- SUSE Linux Enterprise Desktop 11 SP3:
zypper in -t patch sledsp3-dnsmasq=10650
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Server 11 SP3 for VMware (i586 x86_64) [New Version: 2.71]:
- dnsmasq-2.71-0.12.13.1
- SUSE Linux Enterprise Server 11 SP3 (i586 ia64 ppc64 s390x x86_64) [New Version: 2.71]:
- dnsmasq-2.71-0.12.13.1
- SUSE Linux Enterprise Desktop 11 SP3 (i586 x86_64) [New Version: 2.71]:
- dnsmasq-2.71-0.12.13.1