ArchLinux: 202104-8: libupnp: content spoofing
Summary
The server part of pupnp (libupnp) appears to be vulnerable to DNS rebinding attacks because it does not check the value of the `Host` header. This can be mitigated by using DNS revolvers which block DNS- rebinding attacks. The vulnerability is fixed in version 1.14.6 and later.
Resolution
Upgrade to 1.14.6-1.
# pacman -Syu "libupnp>=1.14.6-1"
The problem has been fixed upstream in version 1.14.6.
References
https://github.com/pupnp/pupnp/security/advisories/GHSA-6hqq-w3jq-9fhg https://github.com/pupnp/pupnp/commit/21fd85815da7ed2578d0de7cac4c433008f0ecd4 https://security.archlinux.org/CVE-2021-29462
Workaround
None.