Lucene search

K
mageiaGentoo FoundationMGASA-2021-0087
HistoryFeb 19, 2021 - 1:27 p.m.

Updated coturn package fixes a security vulnerability

2021-02-1913:27:54
Gentoo Foundation
advisories.mageia.org
13

0.002 Low

EPSS

Percentile

56.4%

When sending a CONNECT request with the XOR-PEER-ADDRESS value of 0.0.0.0, a malicious user would be able to relay packets to the loopback interface. Additionally, when coturn is listening on IPv6, which is default, the loopback interface can also be reached by making use of either [::1] or [::] as the peer address (CVE-2020-26262). If updating is not possible, the setting --denied-peer-ip=0.0.0.0 can mitigate this issue. The coturn package has been patched to fix this issue.

OSVersionArchitecturePackageVersionFilename
Mageia7noarchcoturn< 4.5.2-1.4coturn-4.5.2-1.4.mga7