Secunia Security Advisory - Ubuntu has issued an update for dnsmasq. This fixes two vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system.
3d77daaa5dc9ee78a46dd00eff12b2b7878555b593ed5e309db9ae6dbf20e8d9
----------------------------------------------------------------------
Do you have VARM strategy implemented?
(Vulnerability Assessment Remediation Management)
If not, then implement it through the most reliable vulnerability
intelligence source on the market.
Implement it through Secunia.
For more information visit:
https://secunia.com/advisories/business_solutions/
Alternatively request a call from a Secunia representative today to
discuss how we can help you with our capabilities contact us at:
sales@secunia.com
----------------------------------------------------------------------
TITLE:
Ubuntu update for dnsmasq
SECUNIA ADVISORY ID:
SA36563
VERIFY ADVISORY:
https://secunia.com/advisories/36563/
DESCRIPTION:
Ubuntu has issued an update for dnsmasq. This fixes two
vulnerabilities, which can be exploited by malicious people to cause
a DoS (Denial of Service) and potentially compromise a vulnerable
system.
For more information:
SA36394
SOLUTION:
Apply updated packages.
-- Ubuntu 8.04 LTS --
Source archives:
https://security.ubuntu.com/ubuntu/pool/main/d/dnsmasq/dnsmasq_2.41-2ubuntu2.2.diff.gz
Size/MD5: 22736 b0b1196898ba0a1d49dd3d767c1d685c
https://security.ubuntu.com/ubuntu/pool/main/d/dnsmasq/dnsmasq_2.41-2ubuntu2.2.dsc
Size/MD5: 706 ecf4c36193d5063039a63f33712df6e2
https://security.ubuntu.com/ubuntu/pool/main/d/dnsmasq/dnsmasq_2.41.orig=2Etar.gz
Size/MD5: 357997 8d0acd6656299a800c4d1be5a1193e39
Architecture independent packages:
https://security.ubuntu.com/ubuntu/pool/universe/d/dnsmasq/dnsmasq_2.41-2ubuntu2.2_all.deb
Size/MD5: 11964 e5fa2630695acfe9caa62d0d30a89b01
amd64 architecture (Athlon64, Opteron, EM64T Xeon):
https://security.ubuntu.com/ubuntu/pool/main/d/dnsmasq/dnsmasq-base_2.41-2ubuntu2.2_amd64.deb
Size/MD5: 210274 aab9865b6ad46104e28e5db9e98f6c74
i386 architecture (x86 compatible Intel/AMD):
https://security.ubuntu.com/ubuntu/pool/main/d/dnsmasq/dnsmasq-base_2.41-2ubuntu2.2_i386.deb
Size/MD5: 202712 36d3885ee58bdb59ae323c9ea9528f3c
lpia architecture (Low Power Intel Architecture):
https://ports.ubuntu.com/pool/main/d/dnsmasq/dnsmasq-base_2.41-2ubuntu2.2_lpia.deb
Size/MD5: 203286 0c2f1dbfefdbc27905284d323be2023d
powerpc architecture (Apple Macintosh G3/G4/G5):
https://ports.ubuntu.com/pool/main/d/dnsmasq/dnsmasq-base_2.41-2ubuntu2.2_powerpc.deb
Size/MD5: 210564 53e28b512b863f41a605979c2ae4d51e
sparc architecture (Sun SPARC/UltraSPARC):
https://ports.ubuntu.com/pool/main/d/dnsmasq/dnsmasq-base_2.41-2ubuntu2.2_sparc.deb
Size/MD5: 204218 2c03e7df659884baeac446d0a87c8e9e
-- Ubuntu 8.10 --
Source archives:
https://security.ubuntu.com/ubuntu/pool/main/d/dnsmasq/dnsmasq_2.45-1ubuntu1.1.diff.gz
Size/MD5: 15256 100f87ac7b49fd2ad56a1baccd1aeae5
https://security.ubuntu.com/ubuntu/pool/main/d/dnsmasq/dnsmasq_2.45-1ubuntu1.1.dsc
Size/MD5: 1098 74863177e20c0340d7cf225fb60ac182
https://security.ubuntu.com/ubuntu/pool/main/d/dnsmasq/dnsmasq_2.45.orig=2Etar.gz
Size/MD5: 377466 59106495260bb2d0f184f0d4ae88d740
Architecture independent packages:
https://security.ubuntu.com/ubuntu/pool/universe/d/dnsmasq/dnsmasq_2.45-1ubuntu1.1_all.deb
Size/MD5: 12164 c78f9591778ad9fdea8744553cfe21d0
amd64 architecture (Athlon64, Opteron, EM64T Xeon):
https://security.ubuntu.com/ubuntu/pool/main/d/dnsmasq/dnsmasq-base_2.45-1ubuntu1.1_amd64.deb
Size/MD5: 219310 7d5435aeb7bd3b1c8c12c8e830f6e167
i386 architecture (x86 compatible Intel/AMD):
https://security.ubuntu.com/ubuntu/pool/main/d/dnsmasq/dnsmasq-base_2.45-1ubuntu1.1_i386.deb
Size/MD5: 212322 c3053944a71e5be108251e1eadcb206c
lpia architecture (Low Power Intel Architecture):
https://ports.ubuntu.com/pool/main/d/dnsmasq/dnsmasq-base_2.45-1ubuntu1.1_lpia.deb
Size/MD5: 211744 976e638797537eac32e3fd96ec0a78b9
powerpc architecture (Apple Macintosh G3/G4/G5):
https://ports.ubuntu.com/pool/main/d/dnsmasq/dnsmasq-base_2.45-1ubuntu1.1_powerpc.deb
Size/MD5: 217828 78d5925bd54239598042b81230341f95
sparc architecture (Sun SPARC/UltraSPARC):
https://ports.ubuntu.com/pool/main/d/dnsmasq/dnsmasq-base_2.45-1ubuntu1.1_sparc.deb
Size/MD5: 213498 b43f01c34f8471173bd8177b0300f292
-- Ubuntu 9.04 --
Source archives:
https://security.ubuntu.com/ubuntu/pool/main/d/dnsmasq/dnsmasq_2.47-3ubuntu0.1.diff.gz
Size/MD5: 15599 54f4b48ec1ec03b06a5fa8b2706c0611
https://security.ubuntu.com/ubuntu/pool/main/d/dnsmasq/dnsmasq_2.47-3ubuntu0.1.dsc
Size/MD5: 1098 786c3dc587ceb870ea724d66ff0085dc
https://security.ubuntu.com/ubuntu/pool/main/d/dnsmasq/dnsmasq_2.47.orig=2Etar.gz
Size/MD5: 393306 8bf2bd2dcbd5b3e7a689611d20b51126
Architecture independent packages:
https://security.ubuntu.com/ubuntu/pool/universe/d/dnsmasq/dnsmasq_2.47-3ubuntu0.1_all.deb
Size/MD5: 13004 11219fb5f0ecd525a1bfb7ce95fd5e81
amd64 architecture (Athlon64, Opteron, EM64T Xeon):
https://security.ubuntu.com/ubuntu/pool/main/d/dnsmasq/dnsmasq-base_2.47-3ubuntu0.1_amd64.deb
Size/MD5: 229344 9c43a00001bb1feef5e3340225fc4704
i386 architecture (x86 compatible Intel/AMD):
https://security.ubuntu.com/ubuntu/pool/main/d/dnsmasq/dnsmasq-base_2.47-3ubuntu0.1_i386.deb
Size/MD5: 221568 e28309342282e463efdf10694046b96c
lpia architecture (Low Power Intel Architecture):
https://ports.ubuntu.com/pool/main/d/dnsmasq/dnsmasq-base_2.47-3ubuntu0.1_lpia.deb
Size/MD5: 221032 19755ca579fa44543f3658d20abbcaac
powerpc architecture (Apple Macintosh G3/G4/G5):
https://ports.ubuntu.com/pool/main/d/dnsmasq/dnsmasq-base_2.47-3ubuntu0.1_powerpc.deb
Size/MD5: 227238 a30b637a127aa09a0425550be64c5b49
sparc architecture (Sun SPARC/UltraSPARC):
https://ports.ubuntu.com/pool/main/d/dnsmasq/dnsmasq-base_2.47-3ubuntu0.1_sparc.deb
Size/MD5: 222732 0f7dd8d1aabcad788a50b147fd1cb6ba
ORIGINAL ADVISORY:
USN-827-1:
https://www.ubuntu.com/usn/USN-827-1
OTHER REFERENCES:
SA36394:
https://secunia.com/advisories/36394/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
https://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
https://secunia.com/advisories/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------