Bug 2460213 (CVE-2026-40613) - CVE-2026-40613 coturn: coturn: Denial of Service due to misaligned memory reads from crafted STUN messages
Summary: CVE-2026-40613 coturn: coturn: Denial of Service due to misaligned memory rea...
Keywords:
Status: NEW
Alias: CVE-2026-40613
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 2460215 2460216
Blocks:
TreeView+ depends on / blocked
 
Reported: 2026-04-21 19:01 UTC by OSIDB Bzimport
Modified: 2026-04-21 19:21 UTC (History)
0 users

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2026-04-21 19:01:52 UTC
Coturn is a free open source implementation of TURN and STUN Server. Prior to 4.10.0, the STUN/TURN attribute parsing functions in coturn perform unsafe pointer casts from uint8_t * to uint16_t * without alignment checks. When processing a crafted STUN message with odd-aligned attribute boundaries, this results in misaligned memory reads at ns_turn_msg.c. On ARM64 architectures (AArch64) with strict alignment enforcement, this causes a SIGBUS signal that immediately kills the turnserver process. An unauthenticated remote attacker can crash any ARM64 coturn deployment by sending a single crafted UDP packet. This vulnerability is fixed in 4.10.0.


Note You need to log in before you can comment on or make changes to this bug.