An advisory has been issued today (January 11): https://www.openwall.com/lists/oss-security/2021/01/11/3 The issue is fixed upstream in 4.5.2. We should probably consider dropping this, as it's highly specialized stuff and has no maintainer. Mageia 7 is also affected.
Whiteboard: (none) => MGA7TOOStatus comment: (none) => Fixed upstream in 4.5.2
Hi, thanks for reporting this. Assigned to the package maintainer. (Please set the status to 'assigned' if you are working on it)
CC: (none) => mitya, ouaurelienAssignee: bugsquad => pkg-bugs
Freeze push asked for cauldron
CC: (none) => mageia
Status comment: Fixed upstream in 4.5.2 => (none)Whiteboard: MGA7TOO => (none)Version: Cauldron => 7
Assignee: pkg-bugs => qa-bugs
Advisory: ======================== Updated coturn package fixes security vulnerability: When sending a CONNECT request with the XOR-PEER-ADDRESS value of 0.0.0.0, a malicious user would be able to relay packets to the loopback interface. Additionally, when coturn is listening on IPv6, which is default, the loopback interface can also be reached by making use of either [::1] or [::] as the peer address (CVE-2020-26262). If updating is not possible, the setting --denied-peer-ip=0.0.0.0 can mitigate this issue. The coturn package has been patched to fix this issue. References: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26262 https://github.com/coturn/coturn/security/advisories/GHSA-6g6j-r9rf-cm7p ======================== Updated packages in core/updates_testing: ======================== coturn-4.5.2-1.4.mga7 from coturn-4.5.2-1.4.mga7.src.rpm
Debian has issued an advisory for this on January 11: https://www.debian.org/security/2021/dsa-4829
Ubuntu has issued an advisory for this on January 11: https://ubuntu.com/security/notices/USN-4690-1