Bug 1495409 (CVE-2017-14491)
| Summary: | CVE-2017-14491 dnsmasq: heap overflow in the code responsible for building DNS replies | ||||||||
|---|---|---|---|---|---|---|---|---|---|
| Product: | [Other] Security Response | Reporter: | Fabio Olive Leite <fleite> | ||||||
| Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> | ||||||
| Status: | CLOSED ERRATA | QA Contact: | |||||||
| Severity: | urgent | Docs Contact: | |||||||
| Priority: | urgent | ||||||||
| Version: | unspecified | CC: | apevec, chrisw, code, dmoppert, gmollett, itamar, jjoyce, jschluet, kbasil, laine, lhh, lpeer, markmc, mburns, p, pemensik, rbryant, sclewis, security-response-team, slinaber, srevivo, tdecacqu, thozza, veillard | ||||||
| Target Milestone: | --- | Keywords: | Security | ||||||
| Target Release: | --- | ||||||||
| Hardware: | All | ||||||||
| OS: | Linux | ||||||||
| Whiteboard: | |||||||||
| Fixed In Version: | dnsmasq 2.78 | Doc Type: | If docs needed, set a value | ||||||
| Doc Text: |
A heap buffer overflow was found in dnsmasq in the code responsible for building DNS replies. An attacker could send crafted DNS packets to dnsmasq which would cause it to crash or, potentially, execute arbitrary code.
|
Story Points: | --- | ||||||
| Clone Of: | Environment: | ||||||||
| Last Closed: | 2017-10-02 18:15:40 UTC | Type: | --- | ||||||
| Regression: | --- | Mount Type: | --- | ||||||
| Documentation: | --- | CRM: | |||||||
| Verified Versions: | Category: | --- | |||||||
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |||||||
| Cloudforms Team: | --- | Target Upstream Version: | |||||||
| Embargoed: | |||||||||
| Bug Depends On: | 1495516, 1495517, 1496264, 1496265, 1496277, 1496278, 1496310, 1496311, 1496312, 1496313, 1496314, 1496315, 1496316, 1497691 | ||||||||
| Bug Blocks: | 1495418, 1496355 | ||||||||
| Attachments: |
|
||||||||
|
Description
Fabio Olive Leite
2017-09-26 01:42:21 UTC
Acknowledgments: Name: Felix Wilhelm (Google Security Team), Fermin J. Serna (Google Security Team), Gabriel Campana (Google Security Team), Kevin Hamacher (Google Security Team), Ron Bowes (Google Security Team) Further details from the 2.78 pre-release CHANGELOG:
Fix heap overflow in DNS code. This is a potentially serious
security hole. It allows an attacker who can make DNS
requests to dnsmasq, and who controls the contents of
a domain, which is thereby queried, to overflow
(by 2 bytes) a heap buffer and either crash, or
even take control of, dnsmasq.
CVE-2017-14491 applies.
Credit to Felix Wilhelm, Fermin J. Serna, Gabriel Campana
and Kevin Hamacher of the Google Security Team for
finding this.
Created attachment 1330989 [details]
Upstream commit
Created attachment 1331241 [details] Follow-up patch from upstream This corrects issues in the original patch as noted in comment 8. External References: https://access.redhat.com/security/vulnerabilities/3199382 https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html Created dnsmasq tracking bugs for this issue: Affects: fedora-all [bug 1497691] Upstream commits: http://thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=commitdiff;h=0549c73b7ea6b22a3c49beb4d432f185a81efcbc http://thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=commitdiff;h=62cb936cb7ad5f219715515ae7d32dd281a5aa1f Google Security Team's repository with test cases: https://github.com/google/security-research-pocs/tree/master/vulnerabilities/dnsmasq This issue has been addressed in the following products: Red Hat Enterprise Linux 5 Extended Lifecycle Support Via RHSA-2017:2840 https://access.redhat.com/errata/RHSA-2017:2840 This issue has been addressed in the following products: Red Hat Enterprise Linux 5.9 Long Life Via RHSA-2017:2841 https://access.redhat.com/errata/RHSA-2017:2841 This issue has been addressed in the following products: Red Hat Enterprise Linux 7.2 Extended Update Support Red Hat Enterprise Linux 7.3 Extended Update Support Via RHSA-2017:2837 https://access.redhat.com/errata/RHSA-2017:2837 This issue has been addressed in the following products: Red Hat Enterprise Linux 6 Via RHSA-2017:2838 https://access.redhat.com/errata/RHSA-2017:2838 This issue has been addressed in the following products: Red Hat Enterprise Linux 6.4 Advanced Update Support Red Hat Enterprise Linux 6.5 Advanced Update Support Red Hat Enterprise Linux 6.5 Telco Extended Update Support Red Hat Enterprise Linux 6.6 Advanced Update Support Red Hat Enterprise Linux 6.6 Telco Extended Update Support Red Hat Enterprise Linux 6.7 Extended Update Support Red Hat Enterprise Linux 6.2 Advanced Update Support Via RHSA-2017:2839 https://access.redhat.com/errata/RHSA-2017:2839 This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2017:2836 https://access.redhat.com/errata/RHSA-2017:2836 Statement: Red Hat OpenStack Platform includes the dnsmasq-utils RPM which does not contain this flaw's affected code-paths; Red Hat OpenStack Platform is therefore listed as not affected. However, because all versions of Red Hat OpenStack Platform are based on Red Hat Enterprise Linux, all Red Hat OpenStack Platform users should absolutely upgrade the dnsmasq RPM from Red Hat Enterprise Linux as a matter of urgency using standard update mechanisms (such as 'yum update' or 'openstack overcloud update'). |