|
|
Subscribe / Log in / New account

Mageia alert MGASA-2021-0319 (libupnp)

From:  Mageia Updates <buildsystem-daemon@mageia.org>
To:  updates-announce@ml.mageia.org
Subject:  [updates-announce] MGASA-2021-0319: Updated libupnp packages fix a security vulnerability
Date:  Fri, 09 Jul 2021 00:44:27 +0200
Message-ID:  <20210708224427.DC47CA0E5A@duvel.mageia.org>
Archive-link:  Article

MGASA-2021-0319 - Updated libupnp packages fix a security vulnerability Publication date: 08 Jul 2021 URL: https://advisories.mageia.org/MGASA-2021-0319.html Type: security Affected Mageia releases: 7, 8 CVE: CVE-2021-29462 Description: The Portable SDK for UPnP Devices is an SDK for development of UPnP device and control point applications. The server part of pupnp (libupnp) appears to be vulnerable to DNS rebinding attacks because it does not check the value of the 'Host' header. This can be mitigated by using DNS revolvers which block DNS-rebinding attacks. The vulnerability is fixed in version 1.14.6 and later (CVE-2021-29462). References: - https://bugs.mageia.org/show_bug.cgi?id=28923 - https://github.com/pupnp/pupnp/security/advisories/GHSA-6... - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2... SRPMS: - 7/core/libupnp-1.8.4-3.2.mga7 - 8/core/libupnp-1.14.6-1.mga8


to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds