
Serna (Google Security Team), Gabriel Campana (Google Security Team), Kevin Red Hat would like to thank Felix Wilhelm (Google Security Team), Fermin J. AnĪttacker on the local network could send crafted DHCPv6 packets to dnsmasqĬausing it to forward the contents of process memory, potentially leaking * An information leak was found in dnsmasq in the DHCPv6 relay code. AnĪttacker on the local network could send a crafted DHCPv6 request toĭnsmasq which would cause it to a crash or, potentially, execute arbitrary * A stack buffer overflow was found in dnsmasq in the DHCPv6 code. This issue only affectedĬonfigurations using one of these options: enable-ra, ra-only, slaac, An attacker on the local network segmentĬould send crafted RAs to dnsmasq which would cause it to crash or, * A heap buffer overflow was discovered in dnsmasq in the IPv6 routerĪdvertisement (RA) handling code. Which would cause it to crash or, potentially, execute arbitrary code. An attacker could send crafted DNS packets to dnsmasq
#Fix cve 2017 14491 for mac code
* A heap buffer overflow was found in dnsmasq in the code responsible forīuilding DNS replies. Server) forwarder and DHCP (Dynamic Host Configuration Protocol) server. The dnsmasq packages contain Dnsmasq, a lightweight DNS (Domain Name Red Hat Enterprise Linux Server Optional EUS (v. Red Hat Enterprise Linux ComputeNode Optional EUS (v. Red Hat Enterprise Linux ComputeNode EUS (v. The CVE link(s) in the References section. Gives a detailed severity rating, is available for each vulnerability from A Common Vulnerability Scoring System (CVSS) base score, which
#Fix cve 2017 14491 for mac update
Red Hat Product Security has rated this update as having a security impact Synopsis: Critical: dnsmasq security updateĬVE Names: CVE-2017-14491 CVE-2017-14492 CVE-2017-14493Īn update for dnsmasq is now available for Red Hat Enterprise Linux 7.2Įxtended Update Support and Red Hat Enterprise Linux 7.3 Extended Update This issue only affected configurations using one of these options: enable-ra, ra-only, slaac, ra-names, ra-advrouter, or ra-stateless.

An attacker on the local network segment could send crafted RAs to dnsmasq which would cause it to crash or, potentially, execute arbitrary code.

A heap buffer overflow was discovered in dnsmasq in the IPv6 router advertisement handling code. An attacker could send crafted DNS packets to dnsmasq which would cause it to crash or, potentially, execute arbitrary code. Security Fix: A heap buffer overflow was found in dnsmasq in the code responsible for building DNS replies. Red Hat Security Advisory 2017-2837-01 - The dnsmasq packages contain Dnsmasq, a lightweight DNS forwarder and DHCP server. Red Hat Security Advisory 2017-2837-01 Red Hat Security Advisory 2017-2837-01 Posted Authored by Red Hat | Site
