Mageia alert MGASA-2021-0319 (libupnp)
From: | Mageia Updates <buildsystem-daemon@mageia.org> | |
To: | updates-announce@ml.mageia.org | |
Subject: | [updates-announce] MGASA-2021-0319: Updated libupnp packages fix a security vulnerability | |
Date: | Fri, 09 Jul 2021 00:44:27 +0200 | |
Message-ID: | <20210708224427.DC47CA0E5A@duvel.mageia.org> | |
Archive-link: | Article |
MGASA-2021-0319 - Updated libupnp packages fix a security vulnerability Publication date: 08 Jul 2021 URL: https://advisories.mageia.org/MGASA-2021-0319.html Type: security Affected Mageia releases: 7, 8 CVE: CVE-2021-29462 Description: The Portable SDK for UPnP Devices is an SDK for development of UPnP device and control point applications. The server part of pupnp (libupnp) appears to be vulnerable to DNS rebinding attacks because it does not check the value of the 'Host' header. This can be mitigated by using DNS revolvers which block DNS-rebinding attacks. The vulnerability is fixed in version 1.14.6 and later (CVE-2021-29462). References: - https://bugs.mageia.org/show_bug.cgi?id=28923 - https://github.com/pupnp/pupnp/security/advisories/GHSA-6... - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2... SRPMS: - 7/core/libupnp-1.8.4-3.2.mga7 - 8/core/libupnp-1.14.6-1.mga8