Bug 1495410 (CVE-2017-14492)
Summary: | CVE-2017-14492 dnsmasq: heap overflow in the IPv6 router advertisement code | ||||||
---|---|---|---|---|---|---|---|
Product: | [Other] Security Response | Reporter: | Fabio Olive Leite <fleite> | ||||
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> | ||||
Status: | CLOSED ERRATA | QA Contact: | |||||
Severity: | urgent | Docs Contact: | |||||
Priority: | urgent | ||||||
Version: | unspecified | CC: | apevec, chrisw, code, gmollett, itamar, jjoyce, jschluet, kbasil, laine, lhh, lpeer, markmc, mburns, p, pemensik, rbryant, sclewis, security-response-team, slinaber, srevivo, tdecacqu, thozza, veillard | ||||
Target Milestone: | --- | Keywords: | Security | ||||
Target Release: | --- | ||||||
Hardware: | All | ||||||
OS: | Linux | ||||||
Whiteboard: | |||||||
Fixed In Version: | dnsmasq 2.78 | Doc Type: | If docs needed, set a value | ||||
Doc Text: |
A heap buffer overflow was discovered in dnsmasq in the IPv6 router advertisement (RA) handling code. An attacker on the local network segment could send crafted RAs to dnsmasq which would cause it to crash or, potentially, execute arbitrary code. This issue only affected configurations using one of these options: enable-ra, ra-only, slaac, ra-names, ra-advrouter, or ra-stateless.
|
Story Points: | --- | ||||
Clone Of: | Environment: | ||||||
Last Closed: | 2017-10-02 18:15:15 UTC | Type: | --- | ||||
Regression: | --- | Mount Type: | --- | ||||
Documentation: | --- | CRM: | |||||
Verified Versions: | Category: | --- | |||||
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |||||
Cloudforms Team: | --- | Target Upstream Version: | |||||
Embargoed: | |||||||
Bug Depends On: | 1495516, 1495517, 1496264, 1496265, 1497691 | ||||||
Bug Blocks: | 1495418 | ||||||
Attachments: |
|
Description
Fabio Olive Leite
2017-09-26 01:47:17 UTC
Acknowledgments: Name: Felix Wilhelm (Google Security Team), Fermin J. Serna (Google Security Team), Gabriel Campana (Google Security Team), Kevin Hamacher (Google Security Team), Ron Bowes (Google Security Team) Versions of dnsmasq shipped with Red Hat Enterprise Linux 6 and 5 do not include the IPv6 Router Advertisement code which includes this flaw. Further details from the 2.78 pre-release CHANGELOG: Fix heap overflow in IPv6 router advertisement code. This is a potentially serious security hole, as a crafted RA request can overflow a buffer and crash or control dnsmasq. Attacker must be on the local network. CVE-2017-14492 applies. Credit to Felix Wilhelm, Fermin J. Serna, Gabriel Campana and Kevin Hamacher of the Google Security Team for finding this. Created attachment 1330990 [details]
Upstream commit
External References: https://access.redhat.com/security/vulnerabilities/3199382 https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html Created dnsmasq tracking bugs for this issue: Affects: fedora-all [bug 1497691] Upstream commit: http://thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=commitdiff;h=24036ea507862c7b7898b68289c8130f85599c10 Google Security Team's repository with test cases: https://github.com/google/security-research-pocs/tree/master/vulnerabilities/dnsmasq This issue has been addressed in the following products: Red Hat Enterprise Linux 7.2 Extended Update Support Red Hat Enterprise Linux 7.3 Extended Update Support Via RHSA-2017:2837 https://access.redhat.com/errata/RHSA-2017:2837 This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2017:2836 https://access.redhat.com/errata/RHSA-2017:2836 Statement: Red Hat OpenStack Platform includes the dnsmasq-utils RPM which does not contain this flaw's affected code-paths; Red Hat OpenStack Platform is therefore listed as not affected. However, because all versions of Red Hat OpenStack Platform are based on Red Hat Enterprise Linux, all Red Hat OpenStack Platform users should absolutely upgrade the dnsmasq RPM from Red Hat Enterprise Linux as a matter of urgency using standard update mechanisms (such as 'yum update' or 'openstack overcloud update'). |