Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 784590 (CVE-2021-29462) - <net-libs/libupnp-1.14.7: DNS rebinding vulnerability in pupnp (CVE-2021-29462)
Summary: <net-libs/libupnp-1.14.7: DNS rebinding vulnerability in pupnp (CVE-2021-29462)
Status: IN_PROGRESS
Alias: CVE-2021-29462
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal minor (vote)
Assignee: Gentoo Security
URL: https://www.openwall.com/lists/oss-se...
Whiteboard: B4 [glsa? cve]
Keywords:
Depends on:
Blocks:
 
Reported: 2021-04-20 22:00 UTC by GLSAMaker/CVETool Bot
Modified: 2022-06-02 22:07 UTC (History)
2 users (show)

See Also:
Package list:
net-libs/libupnp-1.14.7
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description GLSAMaker/CVETool Bot gentoo-dev 2021-04-20 22:00:46 UTC
CVE-2021-29462 (https://nvd.nist.gov/vuln/detail/CVE-2021-29462):
  The server-part of pupnp, a library used to implement UPnP clients and
  servers, is vulnerable to DNS rebinding attacks.


@ maintainer(s): Please bump to >=net-libs/libupnp-1.14.6!
Comment 1 Larry the Git Cow gentoo-dev 2021-06-02 12:25:57 UTC
The bug has been referenced in the following commit(s):

https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=dbeadea75f7d3266168a355dd6f2e3ce72dfa8bc

commit dbeadea75f7d3266168a355dd6f2e3ce72dfa8bc
Author:     Thomas Deutschmann <whissi@gentoo.org>
AuthorDate: 2021-06-02 12:23:38 +0000
Commit:     Thomas Deutschmann <whissi@gentoo.org>
CommitDate: 2021-06-02 12:25:42 +0000

    net-libs/libupnp: bump to v1.14.7
    
    Bug: https://bugs.gentoo.org/784590
    Package-Manager: Portage-3.0.19, Repoman-3.0.3
    Signed-off-by: Thomas Deutschmann <whissi@gentoo.org>

 net-libs/libupnp/Manifest              |  1 +
 net-libs/libupnp/libupnp-1.14.7.ebuild | 52 ++++++++++++++++++++++++++++++++++
 2 files changed, 53 insertions(+)
Comment 2 Agostino Sarubbo gentoo-dev 2021-06-17 07:23:12 UTC
sparc stable
Comment 3 Sam James archtester Gentoo Infrastructure gentoo-dev Security 2021-06-17 20:18:34 UTC
amd64 done
Comment 4 Sam James archtester Gentoo Infrastructure gentoo-dev Security 2021-06-17 20:19:58 UTC
x86 done
Comment 5 Agostino Sarubbo gentoo-dev 2021-06-18 06:28:11 UTC
ppc stable
Comment 6 Agostino Sarubbo gentoo-dev 2021-06-18 06:29:05 UTC
ppc64 stable
Comment 7 Sam James archtester Gentoo Infrastructure gentoo-dev Security 2021-06-18 22:37:41 UTC
arm64 done
Comment 8 Sam James archtester Gentoo Infrastructure gentoo-dev Security 2021-06-21 07:18:57 UTC
arm done

all arches done
Comment 9 Sam James archtester Gentoo Infrastructure gentoo-dev Security 2021-06-21 07:20:05 UTC
Please cleanup, thanks!
Comment 10 Larry the Git Cow gentoo-dev 2021-07-26 03:25:00 UTC
The bug has been referenced in the following commit(s):

https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=e8eb7be4480f96a2efd24f83b954e27c3ad5607b

commit e8eb7be4480f96a2efd24f83b954e27c3ad5607b
Author:     John Helmert III <ajak@gentoo.org>
AuthorDate: 2021-07-25 20:26:54 +0000
Commit:     John Helmert III <ajak@gentoo.org>
CommitDate: 2021-07-26 03:12:34 +0000

    net-libs/libupnp: drop 1.14.0, 1.14.5
    
    Bug: https://bugs.gentoo.org/784590
    Signed-off-by: John Helmert III <ajak@gentoo.org>

 net-libs/libupnp/Manifest              |  2 --
 net-libs/libupnp/libupnp-1.14.0.ebuild | 50 --------------------------------
 net-libs/libupnp/libupnp-1.14.5.ebuild | 52 ----------------------------------
 3 files changed, 104 deletions(-)
Comment 11 Conrad Kostecki gentoo-dev 2021-10-03 13:17:03 UTC
FYI: I took ownership and bumped to newest 1.14.12
Comment 12 NATTkA bot gentoo-dev 2022-02-09 23:00:56 UTC
Unable to check for sanity:

> no match for package: net-libs/libupnp-1.14.7