Package "minidlna"

Name: minidlna


lightweight DLNA/UPnP-AV server targeted at embedded systems

Latest version: 1.2.1+dfsg-1ubuntu0.20.04.2
Release: focal (20.04)
Level: security
Repository: universe
Homepage: https://sourceforge.net/projects/minidlna/


Download "minidlna"

Other versions of "minidlna" in Focal

Repository Area Version
base universe 1.2.1+dfsg-1build1
updates universe 1.2.1+dfsg-1ubuntu0.20.04.2


Version: 1.2.1+dfsg-1ubuntu0.20.04.2 2023-09-27 11:09:43 UTC

  minidlna (1.2.1+dfsg-1ubuntu0.20.04.2) focal-security; urgency=medium

  * SECURITY UPDATE: DNS rebinding attack
    - debian/patches/CVE-2022-26505.patch: validate HTTP requests to
      protect against DNS rebinding.
    - CVE-2022-26505
  * SECURITY UPDATE: buffer overflow
    - debian/patches/CVE-2023-33476.patch: fix chunk length parsing.
    - CVE-2023-33476

 -- Allen Huang <email address hidden> Mon, 25 Sep 2023 16:27:46 +0100

Source diff to previous version
CVE-2022-26505 A DNS rebinding issue in ReadyMedia (formerly MiniDLNA) before 1.3.1 allows a remote web server to exfiltrate media files.
CVE-2023-33476 ReadyMedia (MiniDLNA) versions from 1.1.15 up to 1.3.2 is vulnerable to Buffer Overflow. The vulnerability is caused by incorrect validation logic wh

Version: 1.2.1+dfsg-1ubuntu0.20.04.1 2021-02-03 19:07:20 UTC

  minidlna (1.2.1+dfsg-1ubuntu0.20.04.1) focal-security; urgency=medium

  * SECURITY UPDATE: Insufficient input sanitization vulnerability
    - debian/patches/CVE-2020-12695.patch: upnphttp: Validate SUBSCRIBE
      callback URL.
    - debian/patches/CVE-2020-28926.patch: upnphttp: Disallow negative HTTP
      chunk lengths.
    - CVE-2020-12695
    - CVE-2020-28926
  * Other fixes:
    - debian/patches/14-fix-gcc10-ftbfs.patch: Fix build for GCC10.
    - debian/patches/15-use-newer-ip_multicast_if-api.patch: Use newer
    API for IP_MULTICAST_IF which allows one to specify interface by
    index, not by address.

 -- Paulo Flabiano Smorigo <email address hidden> Tue, 02 Feb 2021 14:45:21 +0000

CVE-2020-12695 The Open Connectivity Foundation UPnP specification before 2020-04-17 does not forbid the acceptance of a subscription request with a delivery URL on
CVE-2020-28926 ReadyMedia (aka MiniDLNA) before versions 1.3.0 allows remote code execution. Sending a malicious UPnP HTTP request to the miniDLNA service using HTT

About   -   Send Feedback to @ubuntu_updates