Mageia 2021-0321: gupnp security update
Summary
An issue was discovered in GUPnP before 1.0.7 and 1.1.x and 1.2.x before 1.2.5.
It allows DNS rebinding. A remote web server can exploit this vulnerability to
trick a victim's browser into triggering actions against local UPnP services
implemented using this library. Depending on the affected service, this could
be used for data exfiltration, data tempering, etc. (CVE-2021-33516)
References
- https://bugs.mageia.org/show_bug.cgi?id=29085
- https://ubuntu.com/security/notices/USN-4970-1
- https://access.redhat.com/errata/RHSA-2021:2363
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33516
Resolution
MGASA-2021-0321 - Updated gupnp packages fix a security vulnerability
SRPMS
- 8/core/gupnp-1.2.4-1.1.mga8
- 7/core/gupnp-1.2.3-1.1.mga7