SUSE-SU-2021:14603-1: important: Security update for dnsmasq

sle-security-updates at sle-security-updates at
Tue Jan 19 07:18:08 MST 2021

   SUSE Security Update: Security update for dnsmasq

Announcement ID:    SUSE-SU-2021:14603-1
Rating:             important
References:         #1154849 #1176076 #1177077 
Cross-References:   CVE-2019-14834 CVE-2020-25681 CVE-2020-25682
                    CVE-2020-25683 CVE-2020-25684 CVE-2020-25685
                    CVE-2020-25686 CVE-2020-25687
Affected Products:
                    SUSE Linux Enterprise Server 11-SP4-LTSS
                    SUSE Linux Enterprise Debuginfo 11-SP4

   An update that fixes 8 vulnerabilities is now available.


   This update for dnsmasq fixes the following issues:

   - CVE-2019-14834: Fixed a memory leak which could have allowed to remote
     attackers to cause denial of service via DHCP response creation
   - bsc#1177077: Fixed DNSpooq vulnerabilities
   - CVE-2020-25684, CVE-2020-25685, CVE-2020-25686: Fixed multiple Cache
     poisoning attacks.
   - CVE-2020-25681, CVE-2020-25682, CVE-2020-25683, CVE-2020-25687: Fixed
     multiple potential Heap-based overflows when DNSSEC is enabled.
   - Retry query to other servers on receipt of SERVFAIL rcode (bsc#1176076)

Patch Instructions:

   To install this SUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Server 11-SP4-LTSS:

      zypper in -t patch slessp4-dnsmasq-14603=1

   - SUSE Linux Enterprise Debuginfo 11-SP4:

      zypper in -t patch dbgsp4-dnsmasq-14603=1

Package List:

   - SUSE Linux Enterprise Server 11-SP4-LTSS (i586 ppc64 s390x x86_64):


   - SUSE Linux Enterprise Debuginfo 11-SP4 (i586 ppc64 s390x x86_64):



More information about the sle-security-updates mailing list