SB20260420125 - Fedora 42 update for coturn
Published: April 20, 2026
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Improper access control (CVE-ID: CVE-2026-27624)
The vulnerability allows a remote attacker to bypass peer IP access control restrictions.
The vulnerability exists due to improper access control in peer address validation in src/client/ns_turn_ioaddr.c when processing CreatePermission or ChannelBind requests with IPv4-mapped IPv6 XOR-PEER-ADDRESS values. A remote attacker can send a specially crafted request using an ::ffff: IPv4-mapped IPv6 peer address to bypass peer IP access control restrictions.
Exploitation may depend on whether the relay socket is wildcard-bound versus bound to a specific IPv6 address, and on operating system behavior.
Remediation
Install update from vendor's website.