Описание
ELSA-2013-0277: dnsmasq security, bug fix and enhancement update (MODERATE)
[2.48-13]
- Fix the DHCP RELEASE problem when two or more dnsmasq instances are running (rhbz#887156)
[2.48-12]
- Fixing initscript restart stop functions (rhbz#850944)
[2.48-11]
- Revert previous changes because of many problems with --bind-dynamic option backport.
- Dropping dnsmasq-2.48-add-bind-dynamic-option.patch
- Set SO_BINDTODEVICE socket option when using --bind-interfaces (rhbz#884957)
[2.48-10]
- Fixed dnsmasq-2.48-add-bind-dynamic-option.patch
- the option --bind-dynamic was not set correctly when used
[2.48-9]
- Added cc flag -fno-strict-aliasing to solve Testsuite regressions
[2.48-8]
- Fix CVE-2012-3411 (rhbz#882251)
[2.48-7]
- Fix lease-change script (rhbz#815819)
- Check tftp-root exists and is accessible at startup (rhbz#824214)
Обновленные пакеты
Oracle Linux 6
Oracle Linux x86_64
dnsmasq
2.48-13.el6
dnsmasq-utils
2.48-13.el6
Oracle Linux i686
dnsmasq
2.48-13.el6
dnsmasq-utils
2.48-13.el6
Связанные CVE
Связанные уязвимости
Dnsmasq before 2.63test1, when used with certain libvirt configurations, replies to requests from prohibited interfaces, which allows remote attackers to cause a denial of service (traffic amplification) via a spoofed DNS query.
Dnsmasq before 2.63test1, when used with certain libvirt configurations, replies to requests from prohibited interfaces, which allows remote attackers to cause a denial of service (traffic amplification) via a spoofed DNS query.
Dnsmasq before 2.63test1, when used with certain libvirt configurations, replies to requests from prohibited interfaces, which allows remote attackers to cause a denial of service (traffic amplification) via a spoofed DNS query.
Dnsmasq before 2.63test1, when used with certain libvirt configuration ...
Dnsmasq before 2.63test1, when used with certain libvirt configurations, replies to requests from prohibited interfaces, which allows remote attackers to cause a denial of service (traffic amplification) via a spoofed DNS query.