ALAS2-2020-1469

Related Vulnerabilities: CVE-2020-14312  

A flaw was found in the default configuration of dnsmasq, as shipped with Fedora and Red Hat Enterprise Linux, where it listens on any interface and accepts queries from addresses outside of its local subnet. In particular, the option `local-service` is not enabled. Running dnsmasq in this manner may inadvertently make it an open resolver accessible from any address on the internet. This flaw allows an attacker to conduct a Distributed Denial of Service (DDoS) against other systems. (CVE-2020-14312)

ALAS2-2020-1469


Amazon Linux 2 Security Advisory: ALAS-2020-1469
Advisory Release Date: 2020-07-31 19:20 Pacific
Advisory Updated Date: 2020-08-05 06:36 Pacific
Severity: Medium
References: CVE-2020-14312 

Issue Overview:

A flaw was found in the default configuration of dnsmasq, as shipped with Fedora and Red Hat Enterprise Linux, where it listens on any interface and accepts queries from addresses outside of its local subnet. In particular, the option `local-service` is not enabled. Running dnsmasq in this manner may inadvertently make it an open resolver accessible from any address on the internet. This flaw allows an attacker to conduct a Distributed Denial of Service (DDoS) against other systems. (CVE-2020-14312)


Affected Packages:

dnsmasq


Issue Correction:
Run yum update dnsmasq to update your system.

New Packages:
aarch64:
    dnsmasq-2.76-10.amzn2.1.1.aarch64
    dnsmasq-utils-2.76-10.amzn2.1.1.aarch64
    dnsmasq-debuginfo-2.76-10.amzn2.1.1.aarch64

i686:
    dnsmasq-2.76-10.amzn2.1.1.i686
    dnsmasq-utils-2.76-10.amzn2.1.1.i686
    dnsmasq-debuginfo-2.76-10.amzn2.1.1.i686

src:
    dnsmasq-2.76-10.amzn2.1.1.src

x86_64:
    dnsmasq-2.76-10.amzn2.1.1.x86_64
    dnsmasq-utils-2.76-10.amzn2.1.1.x86_64
    dnsmasq-debuginfo-2.76-10.amzn2.1.1.x86_64