SUSE 5162 Published by

A dnsmasq security update has been released for openSUSE Leap 15.3.



openSUSE-SU-2021:3530-1: moderate: Security update for dnsmasq


openSUSE Security Update: Security update for dnsmasq
______________________________________________________________________________

Announcement ID: openSUSE-SU-2021:3530-1
Rating: moderate
References: #1173646 #1180914 #1183709 SLE-17936
Cross-References: CVE-2020-14312 CVE-2021-3448
CVSS scores:
CVE-2020-14312 (NVD) : 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2020-14312 (SUSE): 4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:L
CVE-2021-3448 (NVD) : 4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N
CVE-2021-3448 (SUSE): 4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N

Affected Products:
openSUSE Leap 15.3
______________________________________________________________________________

An update that solves two vulnerabilities, contains one
feature and has one errata is now available.

Description:

This update for dnsmasq fixes the following issues:

Update to version 2.86

- CVE-2021-3448: fixed outgoing port used when --server is used with an
interface name. (bsc#1183709)
- CVE-2020-14312: Set --local-service by default (bsc#1173646).
- Open inotify socket only when used (bsc#1180914).

Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- openSUSE Leap 15.3:

zypper in -t patch openSUSE-SLE-15.3-2021-3530=1


Package List:

- openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64):

dnsmasq-2.86-7.14.1
dnsmasq-debuginfo-2.86-7.14.1
dnsmasq-debugsource-2.86-7.14.1
dnsmasq-utils-2.86-7.14.1
dnsmasq-utils-debuginfo-2.86-7.14.1

References:

  https://www.suse.com/security/cve/CVE-2020-14312.html
  https://www.suse.com/security/cve/CVE-2021-3448.html
  https://bugzilla.suse.com/1173646
  https://bugzilla.suse.com/1180914
  https://bugzilla.suse.com/1183709