[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[SECURITY] [DLA 3549-1] ring security update



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian LTS Advisory DLA-3549-1                debian-lts@lists.debian.org
https://www.debian.org/lts/security/                    Thorsten Alteholz
August 29, 2023                               https://wiki.debian.org/LTS
- -------------------------------------------------------------------------

Package        : ring
Version        : 20190215.1.f152c98~ds1-1+deb10u2
CVE ID         : CVE-2021-37706 CVE-2021-43299 CVE-2021-43300
                 CVE-2021-43301 CVE-2021-43302 CVE-2021-43303
                 CVE-2021-43804 CVE-2021-43845 CVE-2022-21722
                 CVE-2022-21723 CVE-2022-23537 CVE-2022-23547
                 CVE-2022-23608 CVE-2022-24754 CVE-2022-24763
                 CVE-2022-24764 CVE-2022-24793 CVE-2022-31031
                 CVE-2022-39244 CVE-2023-27585


Several issue have been found in ring/jami, a secure and distributed voice, video and chat platform. The issues are about missing boundary checks, resulting in out-of-bound read access, buffer overflow or denial-of-service.


For Debian 10 buster, these problems have been fixed in version
20190215.1.f152c98~ds1-1+deb10u2.

We recommend that you upgrade your ring/jami packages.

For the detailed security status of ring please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/ring

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

-----BEGIN PGP SIGNATURE-----
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=ro/n
-----END PGP SIGNATURE-----


Reply to: