MGASA-2021-0321 - Updated gupnp packages fix a security vulnerability

Publication date: 08 Jul 2021
URL: https://advisories.mageia.org/MGASA-2021-0321.html
Type: security
Affected Mageia releases: 7, 8
CVE: CVE-2021-33516

An issue was discovered in GUPnP before 1.0.7 and 1.1.x and 1.2.x before 1.2.5.
It allows DNS rebinding. A remote web server can exploit this vulnerability to
trick a victim's browser into triggering actions against local UPnP services
implemented using this library. Depending on the affected service, this could
be used for data exfiltration, data tempering, etc. (CVE-2021-33516)

References:
- https://bugs.mageia.org/show_bug.cgi?id=29085
- https://ubuntu.com/security/notices/USN-4970-1
- https://access.redhat.com/errata/RHSA-2021:2363
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33516

SRPMS:
- 8/core/gupnp-1.2.4-1.1.mga8
- 7/core/gupnp-1.2.3-1.1.mga7

Mageia 2021-0321: gupnp security update

An issue was discovered in GUPnP before 1.0.7 and 1.1.x and 1.2.x before 1.2.5

Summary

An issue was discovered in GUPnP before 1.0.7 and 1.1.x and 1.2.x before 1.2.5. It allows DNS rebinding. A remote web server can exploit this vulnerability to trick a victim's browser into triggering actions against local UPnP services implemented using this library. Depending on the affected service, this could be used for data exfiltration, data tempering, etc. (CVE-2021-33516)

References

- https://bugs.mageia.org/show_bug.cgi?id=29085

- https://ubuntu.com/security/notices/USN-4970-1

- https://access.redhat.com/errata/RHSA-2021:2363

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33516

Resolution

MGASA-2021-0321 - Updated gupnp packages fix a security vulnerability

SRPMS

- 8/core/gupnp-1.2.4-1.1.mga8

- 7/core/gupnp-1.2.3-1.1.mga7

Severity
Publication date: 08 Jul 2021
URL: https://advisories.mageia.org/MGASA-2021-0321.html
Type: security
CVE: CVE-2021-33516

Related News