Ubuntu Security Notice 3009-1 - Edwin Toeroek discovered that Dnsmasq incorrectly handled certain CNAME responses. A remote attacker could use this issue to cause Dnsmasq to crash, resulting in a denial of service.
fae87ad5bfaa8a9c17f6b996b296915df4309e1b748f889d2d9e62d4ac549e3e
From: Marc Deslauriers <marc.deslauriers@canonical.com>
Reply-To: Ubuntu Security <security@ubuntu.com>
To: ubuntu-security-announce@lists.ubuntu.com
Message-ID: <576831E4.1060205@canonical.com>
Subject: [USN-3009-1] Dnsmasq vulnerability
============================================================================
Ubuntu Security Notice USN-3009-1
June 20, 2016
dnsmasq vulnerability
============================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 16.04 LTS
- Ubuntu 15.10
Summary:
Dnsmasq could be made to crash if it received specially crafted network
traffic.
Software Description:
- dnsmasq: Small caching DNS proxy and DHCP/TFTP server
Details:
Edwin T=C3=B6r=C3=B6k discovered that Dnsmasq incorrectly handled certain CNAME
responses. A remote attacker could use this issue to cause Dnsmasq to
crash, resulting in a denial of service.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 16.04 LTS:
dnsmasq 2.75-1ubuntu0.16.04.1
dnsmasq-base 2.75-1ubuntu0.16.04.1
dnsmasq-utils 2.75-1ubuntu0.16.04.1
Ubuntu 15.10:
dnsmasq 2.75-1ubuntu0.15.10.1
dnsmasq-base 2.75-1ubuntu0.15.10.1
dnsmasq-utils 2.75-1ubuntu0.15.10.1
After a standard system update you need to reboot your computer to make
all the necessary changes.
References:
http://www.ubuntu.com/usn/usn-3009-1
CVE-2015-8899
Package Information:
https://launchpad.net/ubuntu/+source/dnsmasq/2.75-1ubuntu0.16.04.1
https://launchpad.net/ubuntu/+source/dnsmasq/2.75-1ubuntu0.15.10.1