CVE-2021-29462 (https://nvd.nist.gov/vuln/detail/CVE-2021-29462): The server-part of pupnp, a library used to implement UPnP clients and servers, is vulnerable to DNS rebinding attacks. @ maintainer(s): Please bump to >=net-libs/libupnp-1.14.6!
The bug has been referenced in the following commit(s): https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=dbeadea75f7d3266168a355dd6f2e3ce72dfa8bc commit dbeadea75f7d3266168a355dd6f2e3ce72dfa8bc Author: Thomas Deutschmann <whissi@gentoo.org> AuthorDate: 2021-06-02 12:23:38 +0000 Commit: Thomas Deutschmann <whissi@gentoo.org> CommitDate: 2021-06-02 12:25:42 +0000 net-libs/libupnp: bump to v1.14.7 Bug: https://bugs.gentoo.org/784590 Package-Manager: Portage-3.0.19, Repoman-3.0.3 Signed-off-by: Thomas Deutschmann <whissi@gentoo.org> net-libs/libupnp/Manifest | 1 + net-libs/libupnp/libupnp-1.14.7.ebuild | 52 ++++++++++++++++++++++++++++++++++ 2 files changed, 53 insertions(+)
sparc stable
amd64 done
x86 done
ppc stable
ppc64 stable
arm64 done
arm done all arches done
Please cleanup, thanks!
The bug has been referenced in the following commit(s): https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=e8eb7be4480f96a2efd24f83b954e27c3ad5607b commit e8eb7be4480f96a2efd24f83b954e27c3ad5607b Author: John Helmert III <ajak@gentoo.org> AuthorDate: 2021-07-25 20:26:54 +0000 Commit: John Helmert III <ajak@gentoo.org> CommitDate: 2021-07-26 03:12:34 +0000 net-libs/libupnp: drop 1.14.0, 1.14.5 Bug: https://bugs.gentoo.org/784590 Signed-off-by: John Helmert III <ajak@gentoo.org> net-libs/libupnp/Manifest | 2 -- net-libs/libupnp/libupnp-1.14.0.ebuild | 50 -------------------------------- net-libs/libupnp/libupnp-1.14.5.ebuild | 52 ---------------------------------- 3 files changed, 104 deletions(-)
FYI: I took ownership and bumped to newest 1.14.12
Unable to check for sanity: > no match for package: net-libs/libupnp-1.14.7