SUSE-SU-2015:0979-1

Source
https://www.suse.com/support/update/announcement/2015/suse-su-20150979-1/
Import Source
https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2015:0979-1.json
JSON Data
https://api.osv.dev/v1/vulns/SUSE-SU-2015:0979-1
Related
Published
2015-04-28T15:39:11Z
Modified
2015-04-28T15:39:11Z
Summary
Security update for dnsmasq
Details

The DNS server dnsmasq was updated to fix one security issue and one non-security bug.

The following vulnerability was fixed:

  • CVE-2015-3294: A remote unauthenticated attacker could have caused a denial of service (DoS) or read heap memory, potentially disclosing information such as performed DNS queries or encryption keys. (bsc#928867)

The following bug was fixed:

  • bsc#923144: When answer to an upstream query is a CNAME pointing to an A/AAAA record which is present locally (/etc/hosts), allow caching when the upstream and local A/AAAA records have the same value.
References

Affected packages

SUSE:Linux Enterprise Desktop 12 / dnsmasq

Package

Name
dnsmasq
Purl
pkg:rpm/suse/dnsmasq&distro=SUSE%20Linux%20Enterprise%20Desktop%2012

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.71-4.1

Ecosystem specific

{
    "binaries": [
        {
            "dnsmasq": "2.71-4.1"
        }
    ]
}

SUSE:Linux Enterprise Server 12 / dnsmasq

Package

Name
dnsmasq
Purl
pkg:rpm/suse/dnsmasq&distro=SUSE%20Linux%20Enterprise%20Server%2012

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.71-4.1

Ecosystem specific

{
    "binaries": [
        {
            "dnsmasq": "2.71-4.1"
        }
    ]
}

SUSE:Linux Enterprise Server for SAP Applications 12 / dnsmasq

Package

Name
dnsmasq
Purl
pkg:rpm/suse/dnsmasq&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.71-4.1

Ecosystem specific

{
    "binaries": [
        {
            "dnsmasq": "2.71-4.1"
        }
    ]
}