ALT-BU-2017-3405-1
Branch p8 update bulletin.
Package thunderbird updated to version 52.4.0-alt0.M80P.1 for branch p8 in task 190492.
Closed vulnerabilities
BDU:2018-00155
Уязвимость интерфейса Fetch API браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2018-00156
Уязвимость браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с использованием памяти после освобождения, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2018-00157
Уязвимость браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с использованием памяти после освобождения, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2018-00158
Уязвимость графической библиотеки ANGLE браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2018-00160
Уязвимость реализации функции защиты от вредоносных сайтов и фишинга Phishing and Malware Protection браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю проводить фишинг-атаки
BDU:2018-00161
Уязвимость реализации механизма CSP браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю осуществлять межсайтовые сценарные атаки
BDU:2018-00162
Уязвимость браузеров Mozilla Firefox и Firefox ESR, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю выполнить произвольный код
Modified: 2024-11-21
CVE-2017-7793
A use-after-free vulnerability can occur in the Fetch API when the worker or the associated window are freed when still in use, resulting in a potentially exploitable crash. This vulnerability affects Firefox < 56, Firefox ESR < 52.4, and Thunderbird < 52.4.
- 101055
- 101055
- 1039465
- 1039465
- RHSA-2017:2831
- RHSA-2017:2831
- RHSA-2017:2885
- RHSA-2017:2885
- https://bugzilla.mozilla.org/show_bug.cgi?id=1371889
- https://bugzilla.mozilla.org/show_bug.cgi?id=1371889
- [debian-lts-announce] 20171101 [SECURITY] [DLA 1153-1] icedove/thunderbird security update
- [debian-lts-announce] 20171101 [SECURITY] [DLA 1153-1] icedove/thunderbird security update
- GLSA-201803-14
- GLSA-201803-14
- DSA-3987
- DSA-3987
- DSA-4014
- DSA-4014
- https://www.mozilla.org/security/advisories/mfsa2017-21/
- https://www.mozilla.org/security/advisories/mfsa2017-21/
- https://www.mozilla.org/security/advisories/mfsa2017-22/
- https://www.mozilla.org/security/advisories/mfsa2017-22/
- https://www.mozilla.org/security/advisories/mfsa2017-23/
- https://www.mozilla.org/security/advisories/mfsa2017-23/
Modified: 2024-11-21
CVE-2017-7810
Memory safety bugs were reported in Firefox 55 and Firefox ESR 52.3. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox < 56, Firefox ESR < 52.4, and Thunderbird < 52.4.
- 101054
- 101054
- 1039465
- 1039465
- RHSA-2017:2831
- RHSA-2017:2831
- RHSA-2017:2885
- RHSA-2017:2885
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1386787%2C1389974%2C1371657%2C1360334%2C1390550%2C1380824%2C1387918%2C1395598
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1386787%2C1389974%2C1371657%2C1360334%2C1390550%2C1380824%2C1387918%2C1395598
- [debian-lts-announce] 20171101 [SECURITY] [DLA 1153-1] icedove/thunderbird security update
- [debian-lts-announce] 20171101 [SECURITY] [DLA 1153-1] icedove/thunderbird security update
- GLSA-201803-14
- GLSA-201803-14
- USN-3688-1
- USN-3688-1
- DSA-3987
- DSA-3987
- DSA-4014
- DSA-4014
- https://www.mozilla.org/security/advisories/mfsa2017-21/
- https://www.mozilla.org/security/advisories/mfsa2017-21/
- https://www.mozilla.org/security/advisories/mfsa2017-22/
- https://www.mozilla.org/security/advisories/mfsa2017-22/
- https://www.mozilla.org/security/advisories/mfsa2017-23/
- https://www.mozilla.org/security/advisories/mfsa2017-23/
Modified: 2024-11-21
CVE-2017-7814
File downloads encoded with "blob:" and "data:" URL elements bypassed normal file download checks though the Phishing and Malware Protection feature and its block lists of suspicious sites and files. This would allow malicious sites to lure users into downloading executables that would otherwise be detected as suspicious. This vulnerability affects Firefox < 56, Firefox ESR < 52.4, and Thunderbird < 52.4.
- 101059
- 101059
- 1039465
- 1039465
- RHSA-2017:2831
- RHSA-2017:2831
- RHSA-2017:2885
- RHSA-2017:2885
- https://bugzilla.mozilla.org/show_bug.cgi?id=1376036
- https://bugzilla.mozilla.org/show_bug.cgi?id=1376036
- [debian-lts-announce] 20171101 [SECURITY] [DLA 1153-1] icedove/thunderbird security update
- [debian-lts-announce] 20171101 [SECURITY] [DLA 1153-1] icedove/thunderbird security update
- GLSA-201803-14
- GLSA-201803-14
- DSA-3987
- DSA-3987
- DSA-4014
- DSA-4014
- https://www.mozilla.org/security/advisories/mfsa2017-21/
- https://www.mozilla.org/security/advisories/mfsa2017-21/
- https://www.mozilla.org/security/advisories/mfsa2017-22/
- https://www.mozilla.org/security/advisories/mfsa2017-22/
- https://www.mozilla.org/security/advisories/mfsa2017-23/
- https://www.mozilla.org/security/advisories/mfsa2017-23/
Modified: 2024-11-21
CVE-2017-7818
A use-after-free vulnerability can occur when manipulating arrays of Accessible Rich Internet Applications (ARIA) elements within containers through the DOM. This results in a potentially exploitable crash. This vulnerability affects Firefox < 56, Firefox ESR < 52.4, and Thunderbird < 52.4.
- 101055
- 101055
- 1039465
- 1039465
- RHSA-2017:2831
- RHSA-2017:2831
- RHSA-2017:2885
- RHSA-2017:2885
- https://bugzilla.mozilla.org/show_bug.cgi?id=1363723
- https://bugzilla.mozilla.org/show_bug.cgi?id=1363723
- [debian-lts-announce] 20171101 [SECURITY] [DLA 1153-1] icedove/thunderbird security update
- [debian-lts-announce] 20171101 [SECURITY] [DLA 1153-1] icedove/thunderbird security update
- GLSA-201803-14
- GLSA-201803-14
- DSA-3987
- DSA-3987
- DSA-4014
- DSA-4014
- https://www.mozilla.org/security/advisories/mfsa2017-21/
- https://www.mozilla.org/security/advisories/mfsa2017-21/
- https://www.mozilla.org/security/advisories/mfsa2017-22/
- https://www.mozilla.org/security/advisories/mfsa2017-22/
- https://www.mozilla.org/security/advisories/mfsa2017-23/
- https://www.mozilla.org/security/advisories/mfsa2017-23/
Modified: 2024-11-21
CVE-2017-7819
A use-after-free vulnerability can occur in design mode when image objects are resized if objects referenced during the resizing have been freed from memory. This results in a potentially exploitable crash. This vulnerability affects Firefox < 56, Firefox ESR < 52.4, and Thunderbird < 52.4.
- 101055
- 101055
- 1039465
- 1039465
- RHSA-2017:2831
- RHSA-2017:2831
- RHSA-2017:2885
- RHSA-2017:2885
- https://bugzilla.mozilla.org/show_bug.cgi?id=1380292
- https://bugzilla.mozilla.org/show_bug.cgi?id=1380292
- [debian-lts-announce] 20171101 [SECURITY] [DLA 1153-1] icedove/thunderbird security update
- [debian-lts-announce] 20171101 [SECURITY] [DLA 1153-1] icedove/thunderbird security update
- GLSA-201803-14
- GLSA-201803-14
- DSA-3987
- DSA-3987
- DSA-4014
- DSA-4014
- https://www.mozilla.org/security/advisories/mfsa2017-21/
- https://www.mozilla.org/security/advisories/mfsa2017-21/
- https://www.mozilla.org/security/advisories/mfsa2017-22/
- https://www.mozilla.org/security/advisories/mfsa2017-22/
- https://www.mozilla.org/security/advisories/mfsa2017-23/
- https://www.mozilla.org/security/advisories/mfsa2017-23/
Modified: 2024-11-21
CVE-2017-7823
The content security policy (CSP) "sandbox" directive did not create a unique origin for the document, causing it to behave as if the "allow-same-origin" keyword were always specified. This could allow a Cross-Site Scripting (XSS) attack to be launched from unsafe content. This vulnerability affects Firefox < 56, Firefox ESR < 52.4, and Thunderbird < 52.4.
- 101059
- 101059
- 1039465
- 1039465
- RHSA-2017:2831
- RHSA-2017:2831
- RHSA-2017:2885
- RHSA-2017:2885
- https://bugzilla.mozilla.org/show_bug.cgi?id=1396320
- https://bugzilla.mozilla.org/show_bug.cgi?id=1396320
- [debian-lts-announce] 20171101 [SECURITY] [DLA 1153-1] icedove/thunderbird security update
- [debian-lts-announce] 20171101 [SECURITY] [DLA 1153-1] icedove/thunderbird security update
- GLSA-201803-14
- GLSA-201803-14
- DSA-3987
- DSA-3987
- DSA-4014
- DSA-4014
- https://www.mozilla.org/security/advisories/mfsa2017-21/
- https://www.mozilla.org/security/advisories/mfsa2017-21/
- https://www.mozilla.org/security/advisories/mfsa2017-22/
- https://www.mozilla.org/security/advisories/mfsa2017-22/
- https://www.mozilla.org/security/advisories/mfsa2017-23/
- https://www.mozilla.org/security/advisories/mfsa2017-23/
Modified: 2024-11-21
CVE-2017-7824
A buffer overflow occurs when drawing and validating elements with the ANGLE graphics library, used for WebGL content. This is due to an incorrect value being passed within the library during checks and results in a potentially exploitable crash. This vulnerability affects Firefox < 56, Firefox ESR < 52.4, and Thunderbird < 52.4.
- 101053
- 101053
- 1039465
- 1039465
- RHSA-2017:2831
- RHSA-2017:2831
- RHSA-2017:2885
- RHSA-2017:2885
- https://bugzilla.mozilla.org/show_bug.cgi?id=1398381
- https://bugzilla.mozilla.org/show_bug.cgi?id=1398381
- [debian-lts-announce] 20171101 [SECURITY] [DLA 1153-1] icedove/thunderbird security update
- [debian-lts-announce] 20171101 [SECURITY] [DLA 1153-1] icedove/thunderbird security update
- GLSA-201803-14
- GLSA-201803-14
- DSA-3987
- DSA-3987
- DSA-4014
- DSA-4014
- https://www.mozilla.org/security/advisories/mfsa2017-21/
- https://www.mozilla.org/security/advisories/mfsa2017-21/
- https://www.mozilla.org/security/advisories/mfsa2017-22/
- https://www.mozilla.org/security/advisories/mfsa2017-22/
- https://www.mozilla.org/security/advisories/mfsa2017-23/
- https://www.mozilla.org/security/advisories/mfsa2017-23/
Closed vulnerabilities
BDU:2017-02357
Уязвимость функции add_pseudoheader DNS-сервера Dnsmasq, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2017-02358
Уязвимость DNS-сервера Dnsmasq, вызванная переполнением буфера на стеке, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код
BDU:2017-02359
Уязвимость DNS-сервера Dnsmasq, вызванная переполнением буфера в динамической памяти, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код
BDU:2017-02360
Уязвимость DNS-сервера Dnsmasq, связанная с переполнением буфера, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код
BDU:2018-00110
Уязвимость DNS-сервера dnsmasq, связанная с недостатками обработки перенаправленных DHCPv6-запросов, позволяющая нарушителю раскрыть защищаемую информацию
BDU:2022-07423
Уязвимость функции memset() DNS-сервера Dnsmasq, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2017-13704
In dnsmasq before 2.78, if the DNS packet size does not match the expected size, the size parameter in a memset call gets a negative value. As it is an unsigned value, memset ends up writing up to 0xffffffff zero's (0xffffffffffffffff in 64 bit platforms), making dnsmasq crash.
- http://thekelleys.org.uk/dnsmasq/CHANGELOG
- http://thekelleys.org.uk/dnsmasq/CHANGELOG
- http://thekelleys.org.uk/gitweb/?p=dnsmasq.git%3Ba=commit%3Bh=63437ffbb58837b214b4b92cb1c54bc5f3279928
- http://thekelleys.org.uk/gitweb/?p=dnsmasq.git%3Ba=commit%3Bh=63437ffbb58837b214b4b92cb1c54bc5f3279928
- 101085
- 101085
- 101977
- 101977
- 1039474
- 1039474
- https://access.redhat.com/security/vulnerabilities/3199382
- https://access.redhat.com/security/vulnerabilities/3199382
- https://cert-portal.siemens.com/productcert/pdf/ssa-689071.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-689071.pdf
- FEDORA-2017-274d763ed8
- FEDORA-2017-274d763ed8
- https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html
- https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html
- [dnsmasq-discuss] 20171002 IMPORTANT SECURITY INFORMATION.
- [dnsmasq-discuss] 20171002 IMPORTANT SECURITY INFORMATION.
- [dnsmasq-discuss] 20171002 Announce: dnsmasq-2.78.
- [dnsmasq-discuss] 20171002 Announce: dnsmasq-2.78.
- https://www.synology.com/support/security/Synology_SA_17_59_Dnsmasq
- https://www.synology.com/support/security/Synology_SA_17_59_Dnsmasq
Modified: 2025-01-14
CVE-2017-14491
Heap-based buffer overflow in dnsmasq before 2.78 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted DNS response.
- SUSE-SU-2017:2616
- SUSE-SU-2017:2616
- SUSE-SU-2017:2617
- SUSE-SU-2017:2617
- SUSE-SU-2017:2619
- SUSE-SU-2017:2619
- openSUSE-SU-2017:2633
- openSUSE-SU-2017:2633
- http://nvidia.custhelp.com/app/answers/detail/a_id/4560
- http://nvidia.custhelp.com/app/answers/detail/a_id/4560
- http://nvidia.custhelp.com/app/answers/detail/a_id/4561
- http://nvidia.custhelp.com/app/answers/detail/a_id/4561
- http://packetstormsecurity.com/files/144480/Dnsmasq-2-Byte-Heap-Based-Overflow.html
- http://packetstormsecurity.com/files/144480/Dnsmasq-2-Byte-Heap-Based-Overflow.html
- http://thekelleys.org.uk/dnsmasq/CHANGELOG
- http://thekelleys.org.uk/dnsmasq/CHANGELOG
- http://thekelleys.org.uk/gitweb/?p=dnsmasq.git%3Ba=commit%3Bh=0549c73b7ea6b22a3c49beb4d432f185a81efcbc
- http://thekelleys.org.uk/gitweb/?p=dnsmasq.git%3Ba=commit%3Bh=0549c73b7ea6b22a3c49beb4d432f185a81efcbc
- http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-005.txt
- http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-005.txt
- DSA-3989
- DSA-3989
- http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171103-01-dnsmasq-en
- http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171103-01-dnsmasq-en
- 101085
- 101085
- 101977
- 101977
- 1039474
- 1039474
- USN-3430-1
- USN-3430-1
- USN-3430-2
- USN-3430-2
- USN-3430-3
- USN-3430-3
- RHSA-2017:2836
- RHSA-2017:2836
- RHSA-2017:2837
- RHSA-2017:2837
- RHSA-2017:2838
- RHSA-2017:2838
- RHSA-2017:2839
- RHSA-2017:2839
- RHSA-2017:2840
- RHSA-2017:2840
- RHSA-2017:2841
- RHSA-2017:2841
- https://access.redhat.com/security/vulnerabilities/3199382
- https://access.redhat.com/security/vulnerabilities/3199382
- https://cert-portal.siemens.com/productcert/pdf/ssa-689071.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-689071.pdf
- FEDORA-2017-7106a157f5
- FEDORA-2017-7106a157f5
- FEDORA-2017-515264ae24
- FEDORA-2017-515264ae24
- FEDORA-2017-24f067299e
- FEDORA-2017-24f067299e
- GLSA-201710-27
- GLSA-201710-27
- https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html
- https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html
- https://www.arista.com/en/support/advisories-notices/security-advisories/3577-security-advisory-30
- https://www.arista.com/en/support/advisories-notices/security-advisories/3577-security-advisory-30
- https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2017-449
- https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2017-449
- https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2017-449/
- https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2017-449/
- DSA-3989
- DSA-3989
- 42941
- 42941
- VU#973527
- VU#973527
- [dnsmasq-discuss] 20171002 IMPORTANT SECURITY INFORMATION.
- [dnsmasq-discuss] 20171002 IMPORTANT SECURITY INFORMATION.
- [dnsmasq-discuss] 20171002 Announce: dnsmasq-2.78.
- [dnsmasq-discuss] 20171002 Announce: dnsmasq-2.78.
- https://www.synology.com/support/security/Synology_SA_17_59_Dnsmasq
- https://www.synology.com/support/security/Synology_SA_17_59_Dnsmasq
Modified: 2024-11-21
CVE-2017-14492
Heap-based buffer overflow in dnsmasq before 2.78 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted IPv6 router advertisement request.
- openSUSE-SU-2017:2633
- openSUSE-SU-2017:2633
- http://nvidia.custhelp.com/app/answers/detail/a_id/4561
- http://nvidia.custhelp.com/app/answers/detail/a_id/4561
- http://thekelleys.org.uk/dnsmasq/CHANGELOG
- http://thekelleys.org.uk/dnsmasq/CHANGELOG
- http://thekelleys.org.uk/gitweb/?p=dnsmasq.git%3Ba=commit%3Bh=24036ea507862c7b7898b68289c8130f85599c10
- http://thekelleys.org.uk/gitweb/?p=dnsmasq.git%3Ba=commit%3Bh=24036ea507862c7b7898b68289c8130f85599c10
- http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-005.txt
- http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-005.txt
- DSA-3989
- DSA-3989
- 101085
- 101085
- 1039474
- 1039474
- USN-3430-1
- USN-3430-1
- USN-3430-2
- USN-3430-2
- RHSA-2017:2836
- RHSA-2017:2836
- RHSA-2017:2837
- RHSA-2017:2837
- https://access.redhat.com/security/vulnerabilities/3199382
- https://access.redhat.com/security/vulnerabilities/3199382
- GLSA-201710-27
- GLSA-201710-27
- https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html
- https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html
- 42942
- 42942
- VU#973527
- VU#973527
- [dnsmasq-discuss] 20171002 IMPORTANT SECURITY INFORMATION.
- [dnsmasq-discuss] 20171002 IMPORTANT SECURITY INFORMATION.
- [dnsmasq-discuss] 20171002 Announce: dnsmasq-2.78.
- [dnsmasq-discuss] 20171002 Announce: dnsmasq-2.78.
- https://www.synology.com/support/security/Synology_SA_17_59_Dnsmasq
- https://www.synology.com/support/security/Synology_SA_17_59_Dnsmasq
Modified: 2024-11-21
CVE-2017-14493
Stack-based buffer overflow in dnsmasq before 2.78 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted DHCPv6 request.
- openSUSE-SU-2017:2633
- openSUSE-SU-2017:2633
- http://nvidia.custhelp.com/app/answers/detail/a_id/4561
- http://nvidia.custhelp.com/app/answers/detail/a_id/4561
- http://thekelleys.org.uk/dnsmasq/CHANGELOG
- http://thekelleys.org.uk/dnsmasq/CHANGELOG
- http://thekelleys.org.uk/gitweb/?p=dnsmasq.git%3Ba=commit%3Bh=3d4ff1ba8419546490b464418223132529514033
- http://thekelleys.org.uk/gitweb/?p=dnsmasq.git%3Ba=commit%3Bh=3d4ff1ba8419546490b464418223132529514033
- http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-005.txt
- http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-005.txt
- DSA-3989
- DSA-3989
- 101085
- 101085
- 1039474
- 1039474
- USN-3430-1
- USN-3430-1
- USN-3430-2
- USN-3430-2
- RHSA-2017:2836
- RHSA-2017:2836
- RHSA-2017:2837
- RHSA-2017:2837
- https://access.redhat.com/security/vulnerabilities/3199382
- https://access.redhat.com/security/vulnerabilities/3199382
- GLSA-201710-27
- GLSA-201710-27
- https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html
- https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html
- 42943
- 42943
- VU#973527
- VU#973527
- [dnsmasq-discuss] 20171002 IMPORTANT SECURITY INFORMATION.
- [dnsmasq-discuss] 20171002 IMPORTANT SECURITY INFORMATION.
- [dnsmasq-discuss] 20171002 Announce: dnsmasq-2.78.
- [dnsmasq-discuss] 20171002 Announce: dnsmasq-2.78.
- https://www.synology.com/support/security/Synology_SA_17_59_Dnsmasq
- https://www.synology.com/support/security/Synology_SA_17_59_Dnsmasq
Modified: 2024-11-21
CVE-2017-14494
dnsmasq before 2.78, when configured as a relay, allows remote attackers to obtain sensitive memory information via vectors involving handling DHCPv6 forwarded requests.
- openSUSE-SU-2017:2633
- openSUSE-SU-2017:2633
- http://nvidia.custhelp.com/app/answers/detail/a_id/4561
- http://nvidia.custhelp.com/app/answers/detail/a_id/4561
- http://thekelleys.org.uk/dnsmasq/CHANGELOG
- http://thekelleys.org.uk/dnsmasq/CHANGELOG
- http://thekelleys.org.uk/gitweb/?p=dnsmasq.git%3Ba=commit%3Bh=33e3f1029c9ec6c63e430ff51063a6301d4b2262
- http://thekelleys.org.uk/gitweb/?p=dnsmasq.git%3Ba=commit%3Bh=33e3f1029c9ec6c63e430ff51063a6301d4b2262
- http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-005.txt
- http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-005.txt
- DSA-3989
- DSA-3989
- 101085
- 101085
- 1039474
- 1039474
- USN-3430-1
- USN-3430-1
- USN-3430-2
- USN-3430-2
- RHSA-2017:2836
- RHSA-2017:2836
- RHSA-2017:2837
- RHSA-2017:2837
- https://access.redhat.com/security/vulnerabilities/3199382
- https://access.redhat.com/security/vulnerabilities/3199382
- GLSA-201710-27
- GLSA-201710-27
- https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html
- https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html
- 42944
- 42944
- VU#973527
- VU#973527
- [dnsmasq-discuss] 20171002 IMPORTANT SECURITY INFORMATION.
- [dnsmasq-discuss] 20171002 IMPORTANT SECURITY INFORMATION.
- [dnsmasq-discuss] 20171002 Announce: dnsmasq-2.78.
- [dnsmasq-discuss] 20171002 Announce: dnsmasq-2.78.
- https://www.synology.com/support/security/Synology_SA_17_59_Dnsmasq
- https://www.synology.com/support/security/Synology_SA_17_59_Dnsmasq
Modified: 2024-11-21
CVE-2017-14495
Memory leak in dnsmasq before 2.78, when the --add-mac, --add-cpe-id or --add-subnet option is specified, allows remote attackers to cause a denial of service (memory consumption) via vectors involving DNS response creation.
- openSUSE-SU-2017:2633
- openSUSE-SU-2017:2633
- http://nvidia.custhelp.com/app/answers/detail/a_id/4561
- http://nvidia.custhelp.com/app/answers/detail/a_id/4561
- http://thekelleys.org.uk/dnsmasq/CHANGELOG
- http://thekelleys.org.uk/dnsmasq/CHANGELOG
- http://thekelleys.org.uk/gitweb/?p=dnsmasq.git%3Ba=commit%3Bh=51eadb692a5123b9838e5a68ecace3ac579a3a45
- http://thekelleys.org.uk/gitweb/?p=dnsmasq.git%3Ba=commit%3Bh=51eadb692a5123b9838e5a68ecace3ac579a3a45
- http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-005.txt
- http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-005.txt
- DSA-3989
- DSA-3989
- 101085
- 101085
- 101977
- 101977
- 1039474
- 1039474
- USN-3430-1
- USN-3430-1
- USN-3430-2
- USN-3430-2
- RHSA-2017:2836
- RHSA-2017:2836
- https://access.redhat.com/security/vulnerabilities/3199382
- https://access.redhat.com/security/vulnerabilities/3199382
- https://cert-portal.siemens.com/productcert/pdf/ssa-689071.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-689071.pdf
- GLSA-201710-27
- GLSA-201710-27
- https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html
- https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html
- 42945
- 42945
- VU#973527
- VU#973527
- [dnsmasq-discuss] 20171002 IMPORTANT SECURITY INFORMATION.
- [dnsmasq-discuss] 20171002 IMPORTANT SECURITY INFORMATION.
- [dnsmasq-discuss] 20171002 Announce: dnsmasq-2.78.
- [dnsmasq-discuss] 20171002 Announce: dnsmasq-2.78.
- https://www.synology.com/support/security/Synology_SA_17_59_Dnsmasq
- https://www.synology.com/support/security/Synology_SA_17_59_Dnsmasq
Modified: 2024-11-21
CVE-2017-14496
Integer underflow in the add_pseudoheader function in dnsmasq before 2.78 , when the --add-mac, --add-cpe-id or --add-subnet option is specified, allows remote attackers to cause a denial of service via a crafted DNS request.
- openSUSE-SU-2017:2633
- openSUSE-SU-2017:2633
- http://nvidia.custhelp.com/app/answers/detail/a_id/4561
- http://nvidia.custhelp.com/app/answers/detail/a_id/4561
- http://thekelleys.org.uk/dnsmasq/CHANGELOG
- http://thekelleys.org.uk/dnsmasq/CHANGELOG
- http://thekelleys.org.uk/gitweb/?p=dnsmasq.git%3Ba=commit%3Bh=897c113fda0886a28a986cc6ba17bb93bd6cb1c7
- http://thekelleys.org.uk/gitweb/?p=dnsmasq.git%3Ba=commit%3Bh=897c113fda0886a28a986cc6ba17bb93bd6cb1c7
- http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-005.txt
- http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-005.txt
- DSA-3989
- DSA-3989
- 101085
- 101085
- 101977
- 101977
- 1039474
- 1039474
- USN-3430-1
- USN-3430-1
- USN-3430-2
- USN-3430-2
- RHSA-2017:2836
- RHSA-2017:2836
- https://access.redhat.com/security/vulnerabilities/3199382
- https://access.redhat.com/security/vulnerabilities/3199382
- https://cert-portal.siemens.com/productcert/pdf/ssa-689071.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-689071.pdf
- GLSA-201710-27
- GLSA-201710-27
- https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html
- https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html
- https://source.android.com/security/bulletin/2017-10-01
- https://source.android.com/security/bulletin/2017-10-01
- 42946
- 42946
- VU#973527
- VU#973527
- [dnsmasq-discuss] 20171002 IMPORTANT SECURITY INFORMATION.
- [dnsmasq-discuss] 20171002 IMPORTANT SECURITY INFORMATION.
- [dnsmasq-discuss] 20171002 Announce: dnsmasq-2.78.
- [dnsmasq-discuss] 20171002 Announce: dnsmasq-2.78.
- https://www.synology.com/support/security/Synology_SA_17_59_Dnsmasq
- https://www.synology.com/support/security/Synology_SA_17_59_Dnsmasq