Bug 1495415 (CVE-2017-14495)
| Summary: | CVE-2017-14495 dnsmasq: memory exhaustion vulnerability in the EDNS0 code | ||||||
|---|---|---|---|---|---|---|---|
| Product: | [Other] Security Response | Reporter: | Fabio Olive Leite <fleite> | ||||
| Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> | ||||
| Status: | CLOSED ERRATA | QA Contact: | |||||
| Severity: | high | Docs Contact: | |||||
| Priority: | high | ||||||
| Version: | unspecified | CC: | apevec, chrisw, code, dukaitian, gmollett, itamar, jjoyce, jschluet, kbasil, laine, lhh, lpeer, markmc, mburns, p, pemensik, rbryant, sclewis, security-response-team, slinaber, srevivo, tdecacqu, thozza, veillard | ||||
| Target Milestone: | --- | Keywords: | Security | ||||
| Target Release: | --- | ||||||
| Hardware: | All | ||||||
| OS: | Linux | ||||||
| Whiteboard: | |||||||
| Fixed In Version: | dnsmasq 2.78 | Doc Type: | If docs needed, set a value | ||||
| Doc Text: |
A memory exhaustion flaw was found in dnsmasq in the EDNS0 code. An attacker could send crafted DNS packets which would trigger memory allocations which would never be freed, leading to unbounded memory consumption and eventually a crash. This issue only affected configurations using one of the options: add-mac, add-cpe-id, or add-subnet.
|
Story Points: | --- | ||||
| Clone Of: | Environment: | ||||||
| Last Closed: | 2017-10-02 18:15:29 UTC | Type: | --- | ||||
| Regression: | --- | Mount Type: | --- | ||||
| Documentation: | --- | CRM: | |||||
| Verified Versions: | Category: | --- | |||||
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |||||
| Cloudforms Team: | --- | Target Upstream Version: | |||||
| Embargoed: | |||||||
| Bug Depends On: | 1495516, 1495517, 1497691 | ||||||
| Bug Blocks: | 1495418 | ||||||
| Attachments: |
|
||||||
|
Description
Fabio Olive Leite
2017-09-26 02:00:42 UTC
Acknowledgments: Name: Felix Wilhelm (Google Security Team), Fermin J. Serna (Google Security Team), Gabriel Campana (Google Security Team), Kevin Hamacher (Google Security Team), Ron Bowes (Google Security Team) Versions of dnsmasq shipped with Red Hat Enterprise Linux 6 and 5 do not include the EDNS0 code which includes this flaw. Further details from the 2.78 pre-release CHANGELOG:
Fix out-of-memory Dos vulnerability. An attacker which can
send malicious DNS queries to dnsmasq can trigger memory
allocations in the add_pseudoheader function
The allocated memory is never freed which leads to a DoS
through memory exhaustion. dnsmasq is vulnerable only
if one of the following option is specified:
--add-mac, --add-cpe-id or --add-subnet.
CVE-2017-14495 applies.
Credit to Felix Wilhelm, Fermin J. Serna, Gabriel Campana
and Kevin Hamacher of the Google Security Team for
finding this.
Created attachment 1330994 [details]
Upstream commit
Relevant memory allocation that was not freed properly was added in this commit: http://thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=commitdiff;h=5bb88f096363e66ac08e31761f850a1d5aa22244 The first upstream version including this change is 2.76. External References: https://access.redhat.com/security/vulnerabilities/3199382 https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html Created dnsmasq tracking bugs for this issue: Affects: fedora-all [bug 1497691] Upstream commit: http://thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=commitdiff;h=51eadb692a5123b9838e5a68ecace3ac579a3a45 Google Security Team's repository with test cases: https://github.com/google/security-research-pocs/tree/master/vulnerabilities/dnsmasq This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2017:2836 https://access.redhat.com/errata/RHSA-2017:2836 Statement: Red Hat OpenStack Platform includes the dnsmasq-utils RPM which does not contain this flaw's affected code-paths; Red Hat OpenStack Platform is therefore listed as not affected. However, because all versions of Red Hat OpenStack Platform are based on Red Hat Enterprise Linux, all Red Hat OpenStack Platform users should absolutely upgrade the dnsmasq RPM from Red Hat Enterprise Linux as a matter of urgency using standard update mechanisms (such as 'yum update' or 'openstack overcloud update'). |