{"id":"MGASA-2021-0319","summary":"Updated libupnp packages fix a security vulnerability","details":"The Portable SDK for UPnP Devices is an SDK for development of UPnP device and\ncontrol point applications. The server part of pupnp (libupnp) appears to be\nvulnerable to DNS rebinding attacks because it does not check the value of the\n'Host' header. This can be mitigated by using DNS revolvers which block\nDNS-rebinding attacks. The vulnerability is fixed in version 1.14.6 and later\n(CVE-2021-29462).\n","modified":"2026-02-02T04:46:57.252906Z","published":"2021-07-08T22:43:19Z","related":["CVE-2021-29462"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2021-0319.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=28923"},{"type":"REPORT","url":"https://github.com/pupnp/pupnp/security/advisories/GHSA-6hqq-w3jq-9fhg"}],"affected":[{"package":{"name":"libupnp","ecosystem":"Mageia:7","purl":"pkg:rpm/mageia/libupnp?arch=source&distro=mageia-7"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.8.4-3.2.mga7"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2021-0319.json"}},{"package":{"name":"libupnp","ecosystem":"Mageia:8","purl":"pkg:rpm/mageia/libupnp?arch=source&distro=mageia-8"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.14.6-1.mga8"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2021-0319.json"}}],"schema_version":"1.7.3","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}