Debian Security Advisory
DLA-2315-1 gupnp -- LTS security update
- Date Reported:
- 06 Aug 2020
- Affected Packages:
- Security database references:
- In Mitre's CVE dictionary: CVE-2020-12695.
- More information:
Yunus Çadırcı found an issue in the SUBSCRIBE method of UPnP, a network protocol for devices to automatically discover and communicate with each other. Insufficient checks on this method allowed attackers to use vulnerable UPnP services for DoS attacks or possibly to bypass firewalls.
For Debian 9 stretch, this problem has been fixed in version 1.0.1-1+deb9u1.
We recommend that you upgrade your gupnp packages.
For the detailed security status of gupnp please refer to its security tracker page at: https://security-tracker.debian.org/tracker/gupnp
Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS