Security update for dnsmasq

SUSE Security Update: Security update for dnsmasq
Announcement ID: SUSE-SU-2015:1015-1
Rating: moderate
References: #923144 #928867
Affected Products:
  • SUSE Linux Enterprise Server 11 SP3 for VMware
  • SUSE Linux Enterprise Server 11 SP3
  • SUSE Linux Enterprise Desktop 11 SP3

  • An update that solves one vulnerability and has one errata is now available. It includes one version update.

    Description:

    The DNS server dnsmasq was updated to fix one security issue and one non-security bug:

    • CVE-2015-3294: A remote unauthenticated attacker could have caused a denial of service (DoS) or read memory from the heap, potentially disclosing information such as performed DNS queries or encryption keys. (bsc#928867)
    • bsc#923144: When answer to an upstream query is a CNAME pointing to an A/AAAA record which is present locally (/etc/hosts), allow caching when the upstream and local A/AAAA records have the same value.

    Security Issues:

    Patch Instructions:

    To install this SUSE Security Update use YaST online_update.
    Alternatively you can run the command listed for your product:

    • SUSE Linux Enterprise Server 11 SP3 for VMware:
      zypper in -t patch slessp3-dnsmasq=10650
    • SUSE Linux Enterprise Server 11 SP3:
      zypper in -t patch slessp3-dnsmasq=10650
    • SUSE Linux Enterprise Desktop 11 SP3:
      zypper in -t patch sledsp3-dnsmasq=10650

    To bring your system up-to-date, use "zypper patch".

    Package List:

    • SUSE Linux Enterprise Server 11 SP3 for VMware (i586 x86_64) [New Version: 2.71]:
      • dnsmasq-2.71-0.12.13.1
    • SUSE Linux Enterprise Server 11 SP3 (i586 ia64 ppc64 s390x x86_64) [New Version: 2.71]:
      • dnsmasq-2.71-0.12.13.1
    • SUSE Linux Enterprise Desktop 11 SP3 (i586 x86_64) [New Version: 2.71]:
      • dnsmasq-2.71-0.12.13.1

    References: