SUSE 5024 Published by

A gupnp security update has been released for openSUSE Leap 15.3.



openSUSE-SU-2021:2153-1: important: Security update for gupnp


openSUSE Security Update: Security update for gupnp
______________________________________________________________________________

Announcement ID: openSUSE-SU-2021:2153-1
Rating: important
References: #1186590
Cross-References: CVE-2021-33516
CVSS scores:
CVE-2021-33516 (NVD) : 8.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
CVE-2021-33516 (SUSE): 9.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L

Affected Products:
openSUSE Leap 15.3
______________________________________________________________________________

An update that fixes one vulnerability is now available.

Description:

This update for gupnp fixes the following issues:

- CVE-2021-33516: Fixed a DNS rebinding, which could trick the browser
into triggering actions against local UPnP services (bsc#1186590).

Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- openSUSE Leap 15.3:

zypper in -t patch openSUSE-SLE-15.3-2021-2153=1


Package List:

- openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64):

gupnp-debugsource-1.2.2-3.3.1
libgupnp-1_2-0-1.2.2-3.3.1
libgupnp-1_2-0-debuginfo-1.2.2-3.3.1
libgupnp-devel-1.2.2-3.3.1
typelib-1_0-GUPnP-1_0-1.2.2-3.3.1

- openSUSE Leap 15.3 (x86_64):

libgupnp-1_2-0-32bit-1.2.2-3.3.1
libgupnp-1_2-0-32bit-debuginfo-1.2.2-3.3.1

References:

  https://www.suse.com/security/cve/CVE-2021-33516.html
  https://bugzilla.suse.com/1186590