[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Accepted ring 20210112.2.b757bac~ds1-1+deb11u1 (source) into oldstable-security



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Thu, 12 Sep 2024 20:14:43 -0400
Source: ring
Architecture: source
Version: 20210112.2.b757bac~ds1-1+deb11u1
Distribution: bullseye-security
Urgency: medium
Maintainer: Debian VoIP Team <pkg-voip-maintainers@lists.alioth.debian.org>
Changed-By: Roberto C. Sánchez <roberto@debian.org>
Changes:
 ring (20210112.2.b757bac~ds1-1+deb11u1) bullseye-security; urgency=medium
 .
   * Non-maintainer upload by the LTS team.
   * d/gbp.conf: set debian-branch
   * d/.gitlab-ci.yml: add CI setup
   * CVE-2021-32686
     The embedded copy of pjproject is affected by this CVE.
     A race condition between callback and destroy, due to the accepted socket
     having no group lock. Additionally, the SSL socket parent/listener may get
     destroyed during handshake. Both issues were reported to happen
     intermittently in heavy load TLS connections. They cause a crash, resulting
     in a denial of service.
   * CVE-2021-37706
     The embedded copy of pjproject is affected by this CVE.
     If the incoming STUN message contains an ERROR-CODE attribute, the header
     length is not checked before performing a subtraction operation, potentially
     resulting in an integer underflow scenario. This issue affects all users
     that use STUN. A malicious actor located within the victim's network may
     forge and send a specially crafted UDP (STUN) message that could remotely
     execute arbitrary code on the victim’s machine.
   * CVE-2021-43299, CVE-2021-43300, CVE-2021-43301, CVE-2021-43302 and
     CVE-2021-43303
     The embedded copy of pjproject is affected by these CVEs.
     An attacker-controlled 'filename' argument may cause a buffer overflow since
     it is copied to a fixed-size stack buffer without any size validation.
   * CVE-2021-43804
     The embedded copy of pjproject is affected by this CVE.
     In affected versions if the incoming RTCP BYE message contains a reason's
     length, this declared length is not checked against the actual received
     packet size, potentially resulting in an out-of-bound read access.
   * CVE-2021-43845
     The embedded copy of pjproject is affected by this CVE.
     If incoming RTCP XR message contain block, the data field is not checked
     against the received packet size, potentially resulting in an out-of-bound
     read access.
   * CVE-2022-21722
     The embedded copy of pjproject is affected by this CVE.
     There are various cases where it is possible that certain incoming RTP/RTCP
     packets can potentially cause out-of-bound read access.
   * CVE-2022-21723
     The embedded copy of pjproject is affected by this CVE.
     Parsing an incoming SIP message that contains a malformed multipart can
     potentially cause out-of-bound read access.
   * CVE-2022-23537
     The embedded copy of pjproject is affected by this CVE.
     Buffer overread is possible when parsing a specially crafted STUN message
     with unknown attribute.
   * CVE-2022-23547
     The embedded copy of pjproject is affected by this CVE.
     Possible buffer overread when parsing a certain STUN message.
   * CVE-2022-23608
     The embedded copy of pjproject is affected by this CVE.
     When in a dialog set (or forking) scenario, a hash key shared by multiple
     UAC dialogs can potentially be prematurely freed when one of the dialogs is
     destroyed . The issue may cause a dialog set to be registered in the hash
     table multiple times (with different hash keys) leading to undefined
     behavior such as dialog list collision which eventually leading to endless
     loop.
   * CVE-2022-24754
     The embedded copy of pjproject is affected by this CVE.
     There is a stack-buffer overflow vulnerability which only impacts PJSIP
     users who accept hashed digest credentials (credentials with data_type
     `PJSIP_CRED_DATA_DIGEST`).
   * CVE-2022-24763
     The embedded copy of pjproject is affected by this CVE.
     A denial-of-service vulnerability affects PJSIP users that consume PJSIP's
     XML parsing in their apps.
   * CVE-2022-24764
     The embedded copy of pjproject is affected by this CVE.
     A stack buffer overflow vulnerability affects PJSUA2 users or users that
     call the API `pjmedia_sdp_print(), pjmedia_sdp_media_print()`.
   * CVE-2022-24793
     The embedded copy of pjproject is affected by this CVE.
     A buffer overflow vulnerability in affects applications that use PJSIP DNS
     resolution.
   * CVE-2022-31031
     The embedded copy of pjproject is affected by this CVE.
     A stack buffer overflow vulnerability affects PJSIP users that use STUN in
     their applications, either by: setting a STUN server in their account/media
     config in PJSUA/PJSUA2 level, or directly using `pjlib-util/stun_simple`
     API.
   * CVE-2022-39244.patch
     The embedded copy of pjproject is affected by this CVE.
     The PJSIP parser, PJMEDIA RTP decoder, and PJMEDIA SDP parser are affeced
     by a buffer overflow vulnerability. Users connecting to untrusted clients
     are at risk.
   * CVE-2023-27585
     The embedded copy of pjproject is affected by this CVE.
     A buffer overflow vulnerability affects applications that use PJSIP DNS
     resolver.
Checksums-Sha1:
 868abfa659447207224f67d3b9fae6cdc2e104ec 2994 ring_20210112.2.b757bac~ds1-1+deb11u1.dsc
 57d0bb13b5799bb1639cb5790231ed3c6747538a 112050224 ring_20210112.2.b757bac~ds1.orig.tar.gz
 44f9b22ac664df9e0452855accd8b1d7c0070d78 36396 ring_20210112.2.b757bac~ds1-1+deb11u1.debian.tar.xz
 2b751e6d1c31d287eddb326cb6db89bafee9728d 26556 ring_20210112.2.b757bac~ds1-1+deb11u1_amd64.buildinfo
Checksums-Sha256:
 6b4941c38ec72dff8bf71d6976d6cd07e3e576896bba3235463264b1424ca7b3 2994 ring_20210112.2.b757bac~ds1-1+deb11u1.dsc
 17e3f6fb6a61cffdce49c4ccd12c65f414d47bde94b80ba08a0124c004899a3f 112050224 ring_20210112.2.b757bac~ds1.orig.tar.gz
 a87de78feb4fd936c5c40b0b9c4d0310f22b99c26451481e4162bcb508b2f93b 36396 ring_20210112.2.b757bac~ds1-1+deb11u1.debian.tar.xz
 afeef21564855e3c34958161a229c50be814afd7c958c6e5845aabe0fabb39a8 26556 ring_20210112.2.b757bac~ds1-1+deb11u1_amd64.buildinfo
Files:
 9f0c7b004e484f540bea47bc179a1fdb 2994 comm optional ring_20210112.2.b757bac~ds1-1+deb11u1.dsc
 7725eca0941c818b8daf5e2ea7a8202e 112050224 comm optional ring_20210112.2.b757bac~ds1.orig.tar.gz
 98ded42497e436379374fb75d1f7a703 36396 comm optional ring_20210112.2.b757bac~ds1-1+deb11u1.debian.tar.xz
 c9d4ce67311842a12904a9a088c8f052 26556 comm optional ring_20210112.2.b757bac~ds1-1+deb11u1_amd64.buildinfo

-----BEGIN PGP SIGNATURE-----
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=OtJs
-----END PGP SIGNATURE-----

Attachment: pgptgN0Sg_o9D.pgp
Description: PGP signature


Reply to: