Amazon Linux 2 Security Advisory: ALAS-2021-1673
Advisory Release Date: 2021-07-01 00:50 Pacific
Advisory Updated Date: 2021-07-01 20:29 Pacific
A flaw was found in gupnp. DNS rebinding can occur when a victim's browser is used by a remote web server to trigger actions against local UPnP services including data exfiltration, data tempering, and other exploits. The highest threat from this vulnerability is to data confidentiality and integrity. (CVE-2021-33516)
Affected Packages:
gupnp
Note:
This advisory is applicable to Amazon Linux 2 (AL2) Core repository. Visit this FAQ section for the difference between AL2 Core and AL2 Extras advisories.
Issue Correction:
Run yum update gupnp to update your system.
aarch64:
gupnp-1.0.2-6.amzn2.aarch64
gupnp-devel-1.0.2-6.amzn2.aarch64
gupnp-debuginfo-1.0.2-6.amzn2.aarch64
i686:
gupnp-1.0.2-6.amzn2.i686
gupnp-devel-1.0.2-6.amzn2.i686
gupnp-debuginfo-1.0.2-6.amzn2.i686
noarch:
gupnp-docs-1.0.2-6.amzn2.noarch
src:
gupnp-1.0.2-6.amzn2.src
x86_64:
gupnp-1.0.2-6.amzn2.x86_64
gupnp-devel-1.0.2-6.amzn2.x86_64
gupnp-debuginfo-1.0.2-6.amzn2.x86_64