Bugzilla – Bug 1154849
VUL-1: CVE-2019-14834: dnsmasq: memory leak in the create_helper() function in /src/helper.c
Last modified: 2022-05-17 11:40:10 UTC
CVE-2019-14834 A vulnerability was found in dnsmsq through version 2.90, where the memory leak allows remote attackers to cause a denial of service (memory consumption) via vectors involving DHCP response creation. Reference: http://www.thekelleys.org.uk/dnsmasq/doc.html http://thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=commit;h=69bc94779c2f035a9fffdb5327a54c3aeca73ed5 References: https://bugzilla.redhat.com/show_bug.cgi?id=1764425 http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-14834
Tracked as affected the following codestreams: SUSE:SLE-11-SP3:Update SUSE:SLE-11-SP4:Update SUSE:SLE-12-SP1:Update SUSE:SLE-15:Update SUSE:SLE-15-SP1:Update It seems that the issue introduced in version 2.60 with commit c72daea8
This is an autogenerated message for OBS integration: This bug (1154849) was mentioned in https://build.opensuse.org/request/show/748378 Factory / dnsmasq
SUSE-SU-2019:3189-1: An update that solves two vulnerabilities and has three fixes is now available. Category: security (moderate) Bug References: 1076958,1138743,1152539,1154849,1156543 CVE References: CVE-2017-15107,CVE-2019-14834 Sources used: SUSE Linux Enterprise Module for Open Buildservice Development Tools 15-SP1 (src): dnsmasq-2.78-7.3.1 SUSE Linux Enterprise Module for Basesystem 15-SP1 (src): dnsmasq-2.78-7.3.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2019:3188-1: An update that solves two vulnerabilities and has three fixes is now available. Category: security (moderate) Bug References: 1076958,1138743,1152539,1154849,1156543 CVE References: CVE-2017-15107,CVE-2019-14834 Sources used: SUSE Linux Enterprise Module for Open Buildservice Development Tools 15 (src): dnsmasq-2.78-3.8.1 SUSE Linux Enterprise Module for Basesystem 15 (src): dnsmasq-2.78-3.8.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
openSUSE-SU-2019:2669-1: An update that solves two vulnerabilities and has three fixes is now available. Category: security (moderate) Bug References: 1076958,1138743,1152539,1154849,1156543 CVE References: CVE-2017-15107,CVE-2019-14834 Sources used: openSUSE Leap 15.1 (src): dnsmasq-2.78-lp151.5.3.1
SUSE-SU-2020:0419-1: An update that solves one vulnerability and has one errata is now available. Category: security (moderate) Bug References: 1138743,1154849 CVE References: CVE-2019-14834 Sources used: SUSE OpenStack Cloud Crowbar 9 (src): dnsmasq-2.78-18.12.1 SUSE OpenStack Cloud Crowbar 8 (src): dnsmasq-2.78-18.12.1 SUSE OpenStack Cloud 9 (src): dnsmasq-2.78-18.12.1 SUSE OpenStack Cloud 8 (src): dnsmasq-2.78-18.12.1 SUSE OpenStack Cloud 7 (src): dnsmasq-2.78-18.12.1 SUSE Linux Enterprise Server 12-SP5 (src): dnsmasq-2.78-18.12.1 SUSE Linux Enterprise Server 12-SP4 (src): dnsmasq-2.78-18.12.1 SUSE Linux Enterprise Desktop 12-SP4 (src): dnsmasq-2.78-18.12.1 HPE Helion Openstack 8 (src): dnsmasq-2.78-18.12.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2021:14603-1: An update that fixes 8 vulnerabilities is now available. Category: security (important) Bug References: 1154849,1176076,1177077 CVE References: CVE-2019-14834,CVE-2020-25681,CVE-2020-25682,CVE-2020-25683,CVE-2020-25684,CVE-2020-25685,CVE-2020-25686,CVE-2020-25687 JIRA References: Sources used: SUSE Linux Enterprise Server 11-SP4-LTSS (src): dnsmasq-2.78-0.17.15.1 SUSE Linux Enterprise Debuginfo 11-SP4 (src): dnsmasq-2.78-0.17.15.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Done.