SUSE-SU-2021:14604-1: important: Security update for dnsmasq

sle-security-updates at sle-security-updates at
Tue Jan 19 07:20:20 MST 2021

   SUSE Security Update: Security update for dnsmasq

Announcement ID:    SUSE-SU-2021:14604-1
Rating:             important
References:         #1176076 #1177077 
Cross-References:   CVE-2020-25681 CVE-2020-25682 CVE-2020-25683
                    CVE-2020-25684 CVE-2020-25685 CVE-2020-25686
Affected Products:
                    SUSE Linux Enterprise Point of Sale 11-SP3
                    SUSE Linux Enterprise Debuginfo 11-SP3

   An update that fixes 7 vulnerabilities is now available.


   This update for dnsmasq fixes the following issues:

   Security issues fixed:

   - CVE-2020-25684, CVE-2020-25685, CVE-2020-25686: Fixed multiple Cache
     Poisoning attacks (bsc#1177077).
   - CVE-2020-25681, CVE-2020-25682, CVE-2020-25683, CVE-2020-25687: Fixed
     multiple potential Heap-based overflows when DNSSEC is enabled

   Non-security issue fixed:

   - Retry query to other servers on receipt of SERVFAIL rcode (bsc#1176076).

Patch Instructions:

   To install this SUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Point of Sale 11-SP3:

      zypper in -t patch sleposp3-dnsmasq-14604=1

   - SUSE Linux Enterprise Debuginfo 11-SP3:

      zypper in -t patch dbgsp3-dnsmasq-14604=1

Package List:

   - SUSE Linux Enterprise Point of Sale 11-SP3 (i586):


   - SUSE Linux Enterprise Debuginfo 11-SP3 (i586 s390x x86_64):



More information about the sle-security-updates mailing list