{"affected":[{"ecosystem_specific":{"binaries":[{"dnsmasq":"2.78-lp151.5.3.1","dnsmasq-utils":"2.78-lp151.5.3.1"}]},"package":{"ecosystem":"openSUSE:Leap 15.1","name":"dnsmasq","purl":"pkg:rpm/opensuse/dnsmasq&distro=openSUSE%20Leap%2015.1"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"2.78-lp151.5.3.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for dnsmasq fixes the following issues:\n\nSecurity issues fixed: \t  \n\n- CVE-2019-14834: Fixed a memory leak which could have allowed to remote attackers \n  to cause denial of service via DHCP response creation (bsc#1154849)\n- CVE-2017-15107: Fixed a vulnerability in DNSSEC implementation. Processing of\n  wildcard synthesized NSEC records may result improper validation for non-existance \n  (bsc#1076958).\n\nOther issues addressed:   \n- Included linux/sockios.h to get SIOCGSTAMP (bsc#1156543).\n- Removed cache size limit (bsc#1138743).\n- bsc#1152539: include config files from /etc/dnsmasq.d/*.conf .\n\nThis update was imported from the SUSE:SLE-15-SP1:Update update project.","id":"openSUSE-SU-2019:2669-1","modified":"2019-12-11T09:14:13Z","published":"2019-12-11T09:14:13Z","references":[{"type":"ADVISORY","url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Q67RZVOGYUXDBDWXHU3XGAS736VQNOM4/#Q67RZVOGYUXDBDWXHU3XGAS736VQNOM4"},{"type":"REPORT","url":"https://bugzilla.suse.com/1076958"},{"type":"REPORT","url":"https://bugzilla.suse.com/1138743"},{"type":"REPORT","url":"https://bugzilla.suse.com/1152539"},{"type":"REPORT","url":"https://bugzilla.suse.com/1154849"},{"type":"REPORT","url":"https://bugzilla.suse.com/1156543"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-15107"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2019-14834"}],"related":["CVE-2017-15107","CVE-2019-14834"],"summary":"Security update for dnsmasq","upstream":["CVE-2017-15107","CVE-2019-14834"]}