[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#989815: buster-pu: package ring/20190215.1.f152c98~ds1-1



Package: release.debian.org
Severity: normal
Tags: buster
User: release.debian.org@packages.debian.org
Usertags: pu

Probably a bit late, but Salvatore just suggested to handle this via PU instead of security upload.

The attached debdiff for ring fixes CVE-2021-21375 in Buster.

The fix has been already uploaded to Stretch some time ago and nobody complained up to now.

  Thorsten

PS. In order to avoid delays, I already uploaded the package ...
diff -Nru ring-20190215.1.f152c98~ds1/debian/changelog ring-20190215.1.f152c98~ds1/debian/changelog
--- ring-20190215.1.f152c98~ds1/debian/changelog	2019-02-19 04:46:25.000000000 +0100
+++ ring-20190215.1.f152c98~ds1/debian/changelog	2021-04-22 19:03:02.000000000 +0200
@@ -1,3 +1,14 @@
+ring (20190215.1.f152c98~ds1-1+deb10u1) buster; urgency=high
+
+  * Non-maintainer upload by the LTS Team.
+  * CVE-2021-21375 (Closes: #986815)
+    The embedded copy of pjproject is affected by this CVE.
+    Due to bad handling of two consecutive crafted answers to an INVITE,
+    the attacker is able to crash the server resulting in a denial of
+    service.
+
+ -- Thorsten Alteholz <debian@alteholz.de>  Thu, 22 Apr 2021 19:03:02 +0200
+
 ring (20190215.1.f152c98~ds1-1) unstable; urgency=medium
 
   * New upstream version.
diff -Nru ring-20190215.1.f152c98~ds1/debian/patches/CVE-2021-21375.patch ring-20190215.1.f152c98~ds1/debian/patches/CVE-2021-21375.patch
--- ring-20190215.1.f152c98~ds1/debian/patches/CVE-2021-21375.patch	1970-01-01 01:00:00.000000000 +0100
+++ ring-20190215.1.f152c98~ds1/debian/patches/CVE-2021-21375.patch	2021-04-22 19:03:02.000000000 +0200
@@ -0,0 +1,33 @@
+Index: ring-20190215.1.f152c98~ds1/daemon/contrib/tarballs-unpacked/pjproject-2.8.tar.gz/pjproject-2.8/pjmedia/src/pjmedia/sdp_neg.c
+===================================================================
+--- ring-20190215.1.f152c98~ds1.orig/daemon/contrib/tarballs-unpacked/pjproject-2.8.tar.gz/pjproject-2.8/pjmedia/src/pjmedia/sdp_neg.c	2021-04-25 18:03:13.057447325 +0200
++++ ring-20190215.1.f152c98~ds1/daemon/contrib/tarballs-unpacked/pjproject-2.8.tar.gz/pjproject-2.8/pjmedia/src/pjmedia/sdp_neg.c	2021-04-25 18:03:13.037446913 +0200
+@@ -304,7 +304,6 @@
+ {
+     pjmedia_sdp_session *new_offer;
+     pjmedia_sdp_session *old_offer;
+-    char media_used[PJMEDIA_MAX_SDP_MEDIA];
+     unsigned oi; /* old offer media index */
+     pj_status_t status;
+ 
+@@ -323,8 +322,19 @@
+     /* Change state to STATE_LOCAL_OFFER */
+     neg->state = PJMEDIA_SDP_NEG_STATE_LOCAL_OFFER;
+ 
++    /* When there is no active local SDP in state PJMEDIA_SDP_NEG_STATE_DONE,
++     * it means that the previous initial SDP nego must have been failed,
++     * so we'll just set the local SDP offer here.
++     */
++    if (!neg->active_local_sdp) {
++	neg->initial_sdp_tmp = NULL;
++	neg->initial_sdp = pjmedia_sdp_session_clone(pool, local);
++	neg->neg_local_sdp = pjmedia_sdp_session_clone(pool, local);
++
++	return PJ_SUCCESS;
++    }
++
+     /* Init vars */
+-    pj_bzero(media_used, sizeof(media_used));
+     old_offer = neg->active_local_sdp;
+     new_offer = pjmedia_sdp_session_clone(pool, local);
+ 
diff -Nru ring-20190215.1.f152c98~ds1/debian/patches/series ring-20190215.1.f152c98~ds1/debian/patches/series
--- ring-20190215.1.f152c98~ds1/debian/patches/series	2019-02-19 04:46:25.000000000 +0100
+++ ring-20190215.1.f152c98~ds1/debian/patches/series	2021-04-22 19:03:02.000000000 +0200
@@ -1,3 +1,5 @@
 dont-build-gnutls.patch
 namedirectory-old-restbed.patch
 jsoncpp-rename.patch
+
+CVE-2021-21375.patch

Reply to: