Bug 2460213 (CVE-2026-40613)
| Summary: | CVE-2026-40613 coturn: coturn: Denial of Service due to misaligned memory reads from crafted STUN messages | ||
|---|---|---|---|
| Product: | [Other] Security Response | Reporter: | OSIDB Bzimport <bzimport> |
| Component: | vulnerability | Assignee: | Product Security <prodsec-ir-bot> |
| Status: | NEW --- | QA Contact: | |
| Severity: | high | Docs Contact: | |
| Priority: | high | ||
| Version: | unspecified | Keywords: | Security |
| Target Milestone: | --- | ||
| Target Release: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| Whiteboard: | |||
| Fixed In Version: | Doc Type: | --- | |
| Doc Text: |
A flaw was found in coturn, an open-source implementation of TURN and STUN servers. Unsafe pointer casts in the STUN (Session Traversal Utilities for NAT) and TURN (Traversal Using Relays around NAT) attribute parsing functions can lead to misaligned memory reads. An unauthenticated remote attacker can exploit this by sending a single crafted UDP packet. This can cause the `turnserver` process to crash on ARM64 architectures, resulting in a Denial of Service (DoS).
|
Story Points: | --- |
| Clone Of: | Environment: | ||
| Last Closed: | Type: | --- | |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
| Bug Depends On: | 2460215, 2460216 | ||
| Bug Blocks: | |||
|
Description
OSIDB Bzimport
2026-04-21 19:01:52 UTC
|