Bug 1764425 (CVE-2019-14834)
Summary: | CVE-2019-14834 dnsmasq: memory leak in the create_helper() function in /src/helper.c | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Dhananjay Arunesh <darunesh> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | low | Docs Contact: | |
Priority: | low | ||
Version: | unspecified | CC: | code, dbecker, dominik.mierzejewski, dougsland, itamar, jima, jjoyce, jschluet, kbasil, laine, lhh, lpeer, mburns, p, pemensik, psampaio, ravpatil, sclewis, security-response-team, slinaber, thozza, veillard |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | If docs needed, set a value | |
Doc Text: |
A flaw was found in the Dnsmasq application where a remote attacker can trigger a memory leak by sending specially crafted DHCP responses to the server. A successful attack is dependent on a specific configuration regarding the domain name set into the dnsmasq.conf file. Over time, the memory leak may cause the process to run out of memory and terminate, causing a denial of service.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2020-04-28 16:34:27 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1764426, 1795369, 1795370 | ||
Bug Blocks: | 1748230 |
Description
Dhananjay Arunesh
2019-10-23 04:13:39 UTC
Created dnsmasq tracking bugs for this issue: Affects: fedora-all [bug 1764426] Statement: In Red Hat OpenStack Platform, which currently supports Red Hat Enterprise Linux 7.7, the dnsmasq package is pulled directly from the rhel-7-server-rpms channel. Red Hat OpenStack Platform's version is therefore unused, please ensure that the underlying Red Hat Enterprise Linux dnsmasq package is current. There's a flaw on dnsmasq which allows an attacker to cause DoS by sending specially crafted DHCP responses. The malicious responses triggers a memory leak on create_helper() function under certain conditions leading the process to run out of memory. The availability impact is considered High as it denies the service for all users/systems depending on the affected dnsmasq instance, however the Attack Complexity can be considered High as a successful attack depends on a specific configuration. Acknowledgments: Name: Xu Mingjie (varas@IIE) Hi. Do we have a reproducer? We don't have a reproducer; making a reliable one for QE would be a lot of work when the patch is so straightforward :). This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2020:1715 https://access.redhat.com/errata/RHSA-2020:1715 This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2019-14834 This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2020:3878 https://access.redhat.com/errata/RHSA-2020:3878 |