* bsc#1060354, CVE-2017-14491: 2 byte heap based overflow. * bsc#1060355, CVE-2017-14492: heap based overflow. * bsc#1060360, CVE-2017-14493: stack based overflow. * bsc#1060361, CVE-2017-14494: DHCP - info leak. * bsc#1060362, CVE-2017-14495: DNS - OOM DoS. * bsc#1060364, CVE-2017-14496: DNS - DoS Integer underflow. * Fix DHCP relaying, broken in 2.76 and 2.77. * For other changes, see http://www.thekelleys.org.uk/dnsmasq/CHANGELOG - Obsoleted patches: * Fix-crash-introduced-in-2675f2061525bc954be14988d643.patch * Handle-binding-upstream-servers-to-an-interface.patch OBS-URL: https://build.opensuse.org/package/show/network/dnsmasq?expand=0&rev=90
17 lines
538 B
Diff
17 lines
538 B
Diff
--- src/dnsmasq.c.orig
|
|
+++ src/dnsmasq.c
|
|
@@ -581,11 +581,10 @@ int main (int argc, char **argv)
|
|
if (!option_bool(OPT_DEBUG) && getuid() == 0)
|
|
{
|
|
int bad_capabilities = 0;
|
|
- gid_t dummy;
|
|
|
|
- /* remove all supplementary groups */
|
|
+ /* set the supplementary groups of the daemon user */
|
|
if (gp &&
|
|
- (setgroups(0, &dummy) == -1 ||
|
|
+ (initgroups(daemon->username, gp->gr_gid) == -1 ||
|
|
setgid(gp->gr_gid) == -1))
|
|
{
|
|
send_event(err_pipe[1], EVENT_GROUP_ERR, errno, daemon->groupname);
|