SB20260420125 - Fedora 42 update for coturn



SB20260420125 - Fedora 42 update for coturn

Published: April 20, 2026

Security Bulletin ID SB20260420125
Severity
Medium
Patch available
YES
Number of vulnerabilities 1
Exploitation vector Remote access
Highest impact Data manipulation

Breakdown by Severity

Medium 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 1 security vulnerability.


1) Improper access control (CVE-ID: CVE-2026-27624)

The vulnerability allows a remote attacker to bypass peer IP access control restrictions.

The vulnerability exists due to improper access control in peer address validation in src/client/ns_turn_ioaddr.c when processing CreatePermission or ChannelBind requests with IPv4-mapped IPv6 XOR-PEER-ADDRESS values. A remote attacker can send a specially crafted request using an ::ffff: IPv4-mapped IPv6 peer address to bypass peer IP access control restrictions.

Exploitation may depend on whether the relay socket is wildcard-bound versus bound to a specific IPv6 address, and on operating system behavior.


Remediation

Install update from vendor's website.