Mageia 2021-0087: coturn security update | LinuxSecurity.com
MGASA-2021-0087 - Updated coturn package fixes a security vulnerability

Publication date: 19 Feb 2021
URL: https://advisories.mageia.org/MGASA-2021-0087.html
Type: security
Affected Mageia releases: 7
CVE: CVE-2020-26262

When sending a CONNECT request with the XOR-PEER-ADDRESS value of 0.0.0.0, a
malicious user would be able to relay packets to the loopback interface.
Additionally, when coturn is listening on IPv6, which is default, the loopback
interface can also be reached by making use of either [::1] or [::] as the peer
address (CVE-2020-26262).

If updating is not possible, the setting --denied-peer-ip=0.0.0.0 can mitigate
this issue.

The coturn package has been patched to fix this issue.

References:
- https://bugs.mageia.org/show_bug.cgi?id=28068
- https://github.com/coturn/coturn/security/advisories/GHSA-6g6j-r9rf-cm7p
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26262

SRPMS:
- 7/core/coturn-4.5.2-1.4.mga7

Mageia 2021-0087: coturn security update

When sending a CONNECT request with the XOR-PEER-ADDRESS value of 0.0.0.0, a malicious user would be able to relay packets to the loopback interface

Summary

When sending a CONNECT request with the XOR-PEER-ADDRESS value of 0.0.0.0, a malicious user would be able to relay packets to the loopback interface. Additionally, when coturn is listening on IPv6, which is default, the loopback interface can also be reached by making use of either [::1] or [::] as the peer address (CVE-2020-26262).
If updating is not possible, the setting --denied-peer-ip=0.0.0.0 can mitigate this issue.
The coturn package has been patched to fix this issue.

References

- https://bugs.mageia.org/show_bug.cgi?id=28068

- https://github.com/coturn/coturn/security/advisories/GHSA-6g6j-r9rf-cm7p

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26262

Resolution

MGASA-2021-0087 - Updated coturn package fixes a security vulnerability

SRPMS

- 7/core/coturn-4.5.2-1.4.mga7

Severity
Publication date: 19 Feb 2021
URL: https://advisories.mageia.org/MGASA-2021-0087.html
Type: security
CVE: CVE-2020-26262

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.