Bug 19008 - libupnp new security issue CVE-2016-6255
Summary: libupnp new security issue CVE-2016-6255
Status: RESOLVED FIXED
Alias: None
Product: Mageia
Classification: Unclassified
Component: Security (show other bugs)
Version: 5
Hardware: All Linux
Priority: Normal normal
Target Milestone: ---
Assignee: QA Team
QA Contact: Sec team
URL: http://lwn.net/Vulnerabilities/695558/
Whiteboard: has_procedure MGA5-32-OK advisory
Keywords: validated_update
Depends on:
Blocks:
 
Reported: 2016-07-21 18:24 CEST by David Walser
Modified: 2016-07-27 18:50 CEST (History)
3 users (show)

See Also:
Source RPM: libupnp-1.6.19-4.mga5.src.rpm
CVE:
Status comment:


Attachments

Description David Walser 2016-07-21 18:24:38 CEST
A CVE has been assigned for a security issue in libupnp:
http://openwall.com/lists/oss-security/2016/07/20/5

A patch to fix it is linked in the message above.

Patched packages uploaded for Mageia 5 and Cauldron.

Advisory:
========================

Updated libupnp packages fix security vulnerability:

libupnp's default behavior allows an unauthenticated user access to a server's
filesystem through POST and GET requests (CVE-2016-6255).

References:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6255
http://openwall.com/lists/oss-security/2016/07/20/5
========================

Updated packages in core/updates_testing:
========================
libupnp6-1.6.19-4.1.mga5
libthreadutil6-1.6.19-4.1.mga5
libixml2-1.6.19-4.1.mga5
libupnp-devel-1.6.19-4.1.mga5

from libupnp-1.6.19-4.1.mga5.src.rpm
Comment 1 David Walser 2016-07-23 23:48:16 CEST
Used by amule, openclonk, retroshare, ushare, and vlc-plugin-upnp.  Not sure which ones of those would enable the HTTP server.
Comment 2 Herman Viaene 2016-07-25 17:01:35 CEST
MGA5-32 on AcerD60 Xfce
No installation issues
Used test as per bug14143 Comment 9, used VLC to play music , works OK.

CC: (none) => herman.viaene

Herman Viaene 2016-07-25 17:01:51 CEST

Whiteboard: (none) => has_procedure MGA5-32-OK

Dave Hodgins 2016-07-26 23:30:24 CEST

Keywords: (none) => validated_update
Whiteboard: has_procedure MGA5-32-OK => has_procedure MGA5-32-OK advisory
CC: (none) => davidwhodgins, sysadmin-bugs

Comment 3 Mageia Robot 2016-07-26 23:59:57 CEST
An update for this issue has been pushed to the Mageia Updates repository.

http://advisories.mageia.org/MGASA-2016-0266.html

Status: NEW => RESOLVED
Resolution: (none) => FIXED

David Walser 2016-07-27 18:50:29 CEST

URL: (none) => http://lwn.net/Vulnerabilities/695558/


Note You need to log in before you can comment on or make changes to this bug.