dnsmasq-2.79-13.el8.1

エラータID: AXSA:2021-1363:03

Release date: 
Tuesday, February 2, 2021 - 10:41
Subject: 
dnsmasq-2.79-13.el8.1
Affected Channels: 
Asianux Server 8 for x86_64
Severity: 
High
Description: 

The dnsmasq packages contain Dnsmasq, a lightweight DNS (Domain Name Server) forwarder and DHCP (Dynamic Host Configuration Protocol) server.

Security Fix(es):

* dnsmasq: heap-based buffer overflow in sort_rrset() when DNSSEC is enabled (CVE-2020-25681)

* dnsmasq: buffer overflow in extract_name() due to missing length check when DNSSEC is enabled (CVE-2020-25682)

* dnsmasq: heap-based buffer overflow with large memcpy in get_rdata() when DNSSEC is enabled (CVE-2020-25683)

* dnsmasq: loose address/port check in reply_query() makes forging replies easier for an off-path attacker (CVE-2020-25684)

* dnsmasq: loose query name check in reply_query() makes forging replies easier for an off-path attacker (CVE-2020-25685)

* dnsmasq: multiple queries forwarded for the same name makes forging replies easier for an off-path attacker (CVE-2020-25686)

* dnsmasq: heap-based buffer overflow with large memcpy in sort_rrset() when DNSSEC is enabled (CVE-2020-25687)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

CVE-2020-25681
** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
CVE-2020-25682
** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
CVE-2020-25683
** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
CVE-2020-25684
** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
CVE-2020-25685
** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
CVE-2020-25686
** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
CVE-2020-25687
** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.

Solution: 

Update packages.

Additional Info: 

N/A

Download: 

SRPMS
  1. dnsmasq-2.79-13.el8.1.src.rpm
    MD5: 16ec628cbd50173671fcb1ccacd8cd16
    SHA-256: eb2961cf8034fccc5fb3dcb91c4907ba2b812a8814009d47cce4e460ce1858c3
    Size: 570.58 kB

Asianux Server 8 for x86_64
  1. dnsmasq-2.79-13.el8.1.x86_64.rpm
    MD5: dd15573540270d4b525cb44bd6d282e8
    SHA-256: 6db11da1985d157c157d87531fa140f06319aa488f9f7ef4a74689026eeb4ea5
    Size: 317.34 kB
  2. dnsmasq-utils-2.79-13.el8.1.x86_64.rpm
    MD5: 031e4ac7ea58e910111428bf4697bc45
    SHA-256: d5bbbae6408e7cb821480491cf2813eac16e77ff2b6b047275063f536167e6c2
    Size: 53.97 kB