Debian Bug report logs -
#976595
minidlna: CVE-2020-28926
Reply or subscribe to this bug.
Toggle useless messages
Report forwarded
to debian-bugs-dist@lists.debian.org, carnil@debian.org, team@security.debian.org, Alexander GQ Gerasiov <gq@debian.org>
:
Bug#976595
; Package src:minidlna
.
(Sat, 05 Dec 2020 15:51:03 GMT) (full text, mbox, link).
Acknowledgement sent
to Salvatore Bonaccorso <carnil@debian.org>
:
New Bug report received and forwarded. Copy sent to carnil@debian.org, team@security.debian.org, Alexander GQ Gerasiov <gq@debian.org>
.
(Sat, 05 Dec 2020 15:51:03 GMT) (full text, mbox, link).
Message #5 received at submit@bugs.debian.org (full text, mbox, reply):
Source: minidlna
Version: 1.2.1+dfsg-2
Severity: grave
Tags: security upstream
X-Debbugs-Cc: carnil@debian.org, Debian Security Team <team@security.debian.org>
Control: found -1 1.2.1+dfsg-1
Hi,
The following vulnerability was published for minidlna.
CVE-2020-28926[0]:
| ReadyMedia (aka MiniDLNA) before versions 1.3.0 allows remote code
| execution. Sending a malicious UPnP HTTP request to the miniDLNA
| service using HTTP chunked encoding can lead to a signedness bug
| resulting in a buffer overflow in calls to memcpy/memmove.
If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.
For further information see:
[0] https://security-tracker.debian.org/tracker/CVE-2020-28926
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28926
[1] https://sourceforge.net/p/minidlna/git/ci/9fba41008adebc1da0f4f6c6e27ae422ace3fe4a
Regards,
Salvatore
Marked as found in versions minidlna/1.2.1+dfsg-1.
Request was from Salvatore Bonaccorso <carnil@debian.org>
to submit@bugs.debian.org
.
(Sat, 05 Dec 2020 15:51:03 GMT) (full text, mbox, link).
Send a report that this bug log contains spam.
Debian bug tracking system administrator <owner@bugs.debian.org>.
Last modified:
Sun Dec 6 07:57:46 2020;
Machine Name:
buxtehude
Debian Bug tracking system
Debbugs is free software and licensed under the terms of the GNU
Public License version 2. The current version can be obtained
from https://bugs.debian.org/debbugs-source/.
Copyright © 1999 Darren O. Benham,
1997,2003 nCipher Corporation Ltd,
1994-97 Ian Jackson,
2005-2017 Don Armstrong, and many other contributors.