ALT-BU-2024-16044-1
Branch c9f2 update bulletin.
Package python3-module-cryptography updated to version 41.0.7-alt0.c9f2.1 for branch c9f2 in task 362816.
Closed vulnerabilities
BDU:2024-02534
Уязвимость функций load_pem_pkcs7_certificates() и load_der_pkcs7_certificates() пакет cryptography, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2023-49083
cryptography is a package designed to expose cryptographic primitives and recipes to Python developers. Calling `load_pem_pkcs7_certificates` or `load_der_pkcs7_certificates` could lead to a NULL-pointer dereference and segfault. Exploitation of this vulnerability poses a serious risk of Denial of Service (DoS) for any application attempting to deserialize a PKCS7 blob/certificate. The consequences extend to potential disruptions in system availability and stability. This vulnerability has been patched in version 41.0.6.
- https://github.com/pyca/cryptography/commit/f09c261ca10a31fe41b1262306db7f8f1da0e48a
- https://github.com/pyca/cryptography/commit/f09c261ca10a31fe41b1262306db7f8f1da0e48a
- https://github.com/pyca/cryptography/pull/9926
- https://github.com/pyca/cryptography/pull/9926
- https://github.com/pyca/cryptography/security/advisories/GHSA-jfhm-5ghh-2f97
- https://github.com/pyca/cryptography/security/advisories/GHSA-jfhm-5ghh-2f97
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMNTYMUGFJSDBYBU22FUYBHFRZODRKXV/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMNTYMUGFJSDBYBU22FUYBHFRZODRKXV/
Closed bugs
Оставляет мусор
Closed vulnerabilities
Modified: 2024-11-21
CVE-2021-3657
A flaw was found in mbsync versions prior to 1.4.4. Due to inadequate handling of extremely large (>=2GiB) IMAP literals, malicious or compromised IMAP servers, and hypothetically even external email senders, could cause several different buffer overflows, which could conceivably be exploited for remote code execution.
- https://bugzilla.redhat.com/show_bug.cgi?id=2028932
- https://bugzilla.redhat.com/show_bug.cgi?id=2028932
- [debian-lts-announce] 20220701 [SECURITY] [DLA 3066-1] isync security update
- [debian-lts-announce] 20220701 [SECURITY] [DLA 3066-1] isync security update
- GLSA-202208-15
- GLSA-202208-15
- https://www.openwall.com/lists/oss-security/2021/12/03/1
- https://www.openwall.com/lists/oss-security/2021/12/03/1
Package postgresql12 updated to version 12.22-alt0.c9f2.1 for branch c9f2 in task 363023.
Closed vulnerabilities
BDU:2024-09679
Уязвимость переменных среды PL/Perl системы управления базами данных PostgreSQL, позволяющая нарушителю выполнить произвольный код
BDU:2024-09681
Уязвимость команд SET ROLE, SET SESSION системы управления базами данных PostgreSQL, позволяющая нарушителю повысить свои привилегии и получить доступ к защищаемой информации
BDU:2024-09682
Уязвимость компонента libpq системы управления базами данных PostgreSQL, позволяющая нарушителю обойти существующие ограничения безопасности и выполнить атаку типа «человек посередине»
BDU:2024-09684
Уязвимость политики безопасности таблиц с защитой строк CREATE POLICY системы управления базами данных PostgreSQL, позволяющая нарушителю выполнить произвольные команды
Modified: 2024-11-15
CVE-2024-10976
Incomplete tracking in PostgreSQL of tables with row security allows a reused query to view or change different rows from those intended. CVE-2023-2455 and CVE-2016-2193 fixed most interaction between row security and user ID changes. They missed cases where a subquery, WITH query, security invoker view, or SQL-language function references a table with a row-level security policy. This has the same consequences as the two earlier CVEs. That is to say, it leads to potentially incorrect policies being applied in cases where role-specific policies are used and a given query is planned under one role and then executed under other roles. This scenario can happen under security definer functions or when a common user and query is planned initially and then re-used across multiple SET ROLEs. Applying an incorrect policy may permit a user to complete otherwise-forbidden reads and modifications. This affects only databases that have used CREATE POLICY to define a row security policy. An attacker must tailor an attack to a particular application's pattern of query plan reuse, user ID changes, and role-specific row security policies. Versions before PostgreSQL 17.1, 16.5, 15.9, 14.14, 13.17, and 12.21 are affected.
Modified: 2024-11-15
CVE-2024-10977
Client use of server error message in PostgreSQL allows a server not trusted under current SSL or GSS settings to furnish arbitrary non-NUL bytes to the libpq application. For example, a man-in-the-middle attacker could send a long error message that a human or screen-scraper user of psql mistakes for valid query results. This is probably not a concern for clients where the user interface unambiguously indicates the boundary between one error message and other text. Versions before PostgreSQL 17.1, 16.5, 15.9, 14.14, 13.17, and 12.21 are affected.
Modified: 2024-11-22
CVE-2024-10978
Incorrect privilege assignment in PostgreSQL allows a less-privileged application user to view or change different rows from those intended. An attack requires the application to use SET ROLE, SET SESSION AUTHORIZATION, or an equivalent feature. The problem arises when an application query uses parameters from the attacker or conveys query results to the attacker. If that query reacts to current_setting('role') or the current user ID, it may modify or return data as though the session had not used SET ROLE or SET SESSION AUTHORIZATION. The attacker does not control which incorrect user ID applies. Query text from less-privileged sources is not a concern here, because SET ROLE and SET SESSION AUTHORIZATION are not sandboxes for unvetted queries. Versions before PostgreSQL 17.1, 16.5, 15.9, 14.14, 13.17, and 12.21 are affected.
Modified: 2024-11-25
CVE-2024-10979
Incorrect control of environment variables in PostgreSQL PL/Perl allows an unprivileged database user to change sensitive process environment variables (e.g. PATH). That often suffices to enable arbitrary code execution, even if the attacker lacks a database server operating system user. Versions before PostgreSQL 17.1, 16.5, 15.9, 14.14, 13.17, and 12.21 are affected.
Package postgresql12-1C updated to version 12.20-alt0.c9f2.3 for branch c9f2 in task 363023.
Closed vulnerabilities
BDU:2024-09679
Уязвимость переменных среды PL/Perl системы управления базами данных PostgreSQL, позволяющая нарушителю выполнить произвольный код
BDU:2024-09681
Уязвимость команд SET ROLE, SET SESSION системы управления базами данных PostgreSQL, позволяющая нарушителю повысить свои привилегии и получить доступ к защищаемой информации
BDU:2024-09682
Уязвимость компонента libpq системы управления базами данных PostgreSQL, позволяющая нарушителю обойти существующие ограничения безопасности и выполнить атаку типа «человек посередине»
BDU:2024-09684
Уязвимость политики безопасности таблиц с защитой строк CREATE POLICY системы управления базами данных PostgreSQL, позволяющая нарушителю выполнить произвольные команды
Modified: 2024-11-15
CVE-2024-10976
Incomplete tracking in PostgreSQL of tables with row security allows a reused query to view or change different rows from those intended. CVE-2023-2455 and CVE-2016-2193 fixed most interaction between row security and user ID changes. They missed cases where a subquery, WITH query, security invoker view, or SQL-language function references a table with a row-level security policy. This has the same consequences as the two earlier CVEs. That is to say, it leads to potentially incorrect policies being applied in cases where role-specific policies are used and a given query is planned under one role and then executed under other roles. This scenario can happen under security definer functions or when a common user and query is planned initially and then re-used across multiple SET ROLEs. Applying an incorrect policy may permit a user to complete otherwise-forbidden reads and modifications. This affects only databases that have used CREATE POLICY to define a row security policy. An attacker must tailor an attack to a particular application's pattern of query plan reuse, user ID changes, and role-specific row security policies. Versions before PostgreSQL 17.1, 16.5, 15.9, 14.14, 13.17, and 12.21 are affected.
Modified: 2024-11-15
CVE-2024-10977
Client use of server error message in PostgreSQL allows a server not trusted under current SSL or GSS settings to furnish arbitrary non-NUL bytes to the libpq application. For example, a man-in-the-middle attacker could send a long error message that a human or screen-scraper user of psql mistakes for valid query results. This is probably not a concern for clients where the user interface unambiguously indicates the boundary between one error message and other text. Versions before PostgreSQL 17.1, 16.5, 15.9, 14.14, 13.17, and 12.21 are affected.
Modified: 2024-11-22
CVE-2024-10978
Incorrect privilege assignment in PostgreSQL allows a less-privileged application user to view or change different rows from those intended. An attack requires the application to use SET ROLE, SET SESSION AUTHORIZATION, or an equivalent feature. The problem arises when an application query uses parameters from the attacker or conveys query results to the attacker. If that query reacts to current_setting('role') or the current user ID, it may modify or return data as though the session had not used SET ROLE or SET SESSION AUTHORIZATION. The attacker does not control which incorrect user ID applies. Query text from less-privileged sources is not a concern here, because SET ROLE and SET SESSION AUTHORIZATION are not sandboxes for unvetted queries. Versions before PostgreSQL 17.1, 16.5, 15.9, 14.14, 13.17, and 12.21 are affected.
Modified: 2024-11-25
CVE-2024-10979
Incorrect control of environment variables in PostgreSQL PL/Perl allows an unprivileged database user to change sensitive process environment variables (e.g. PATH). That often suffices to enable arbitrary code execution, even if the attacker lacks a database server operating system user. Versions before PostgreSQL 17.1, 16.5, 15.9, 14.14, 13.17, and 12.21 are affected.
Closed vulnerabilities
BDU:2022-01086
Уязвимость мультимедийной коммуникационной библиотеки PJSIP, связанная с целочисленной потерей значимости, позволяющая нарушителю выполнить произвольный код
BDU:2022-01087
Уязвимость мультимедийной коммуникационной библиотеки PJSIP, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю выполнить произвольный код
BDU:2022-01449
Уязвимость функции pjsua_playlist_create мультимедийной коммуникационной библиотеки PJSIP, связанная с переполнением буфера в стека, позволяющая нарушителю выполнить произвольный код
BDU:2022-01450
Уязвимость функции pjsua_call_dump мультимедийной коммуникационной библиотеки PJSIP, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю выполнить произвольный кодд
BDU:2022-01451
Уязвимость функции pjsua_recorder_create мультимедийной коммуникационной библиотеки PJSIP, связанная с переполнением буфера в стека, позволяющая нарушителю выполнить произвольный код
BDU:2022-01452
Уязвимость мультимедийной коммуникационной библиотеки PJSIP, связанная с переполнением буфера в стеке, позволяющая нарушителю выполнить произвольный код
BDU:2022-01458
Уязвимость функции pjsua_recorder_create мультимедийной коммуникационной библиотеки PJSIP, связанная с чтением за границами буфера памяти, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-02055
Уязвимость SSL-сокета системы управления IP-телефонией Asterisk, реализации протокола SIP PJSIP, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-02185
Уязвимость мультимедийной коммуникационной библиотеки PJSIP, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-02186
Уязвимость мультимедийной коммуникационной библиотеки PJSIP, связанная с использованием памяти после её освобождения, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-02207
Уязвимость мультимедийной коммуникационной библиотеки PJSIP, связанная с ошибками синхронизации при использовании общего ресурса, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-02209
Уязвимость мультимедийной коммуникационной библиотеки PJSIP, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-03168
Уязвимость реализации функции pjsip_auth_create_digest() мультимедийной коммуникационной библиотеки PJSIP, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код
BDU:2022-03169
Уязвимость мультимедийной коммуникационной библиотеки PJSIP, связанная с выполнением цикла с недоступным условием выхода, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-03171
Уязвимость реализации функций pjmedia_sdp_print() и pjmedia_sdp_media_print() интерфейса PJSUA2 API мультимедийной коммуникационной библиотеки PJSI, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании
BDU:2022-07479
Уязвимость мультимедиа библиотеки PJSIP, связанная с переполнением буфера в динамической памяти, позволяющая нарушителю выполнить произвольный код в целевой системе
Modified: 2024-11-21
CVE-2021-32686
PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In PJSIP before version 2.11.1, there are a couple of issues found in the SSL socket. First, a race condition between callback and destroy, due to the accepted socket having no group lock. Second, the SSL socket parent/listener may get destroyed during handshake. Both issues were reported to happen intermittently in heavy load TLS connections. They cause a crash, resulting in a denial of service. These are fixed in version 2.11.1.
- https://github.com/pjsip/pjproject/commit/d5f95aa066f878b0aef6a64e60b61e8626e664cd
- https://github.com/pjsip/pjproject/commit/d5f95aa066f878b0aef6a64e60b61e8626e664cd
- https://github.com/pjsip/pjproject/pull/2716
- https://github.com/pjsip/pjproject/pull/2716
- https://github.com/pjsip/pjproject/releases/tag/2.11.1
- https://github.com/pjsip/pjproject/releases/tag/2.11.1
- https://github.com/pjsip/pjproject/security/advisories/GHSA-cv8x-p47p-99wr
- https://github.com/pjsip/pjproject/security/advisories/GHSA-cv8x-p47p-99wr
- [debian-lts-announce] 20220328 [SECURITY] [DLA 2962-1] pjproject security update
- [debian-lts-announce] 20220328 [SECURITY] [DLA 2962-1] pjproject security update
- GLSA-202210-37
- GLSA-202210-37
- DSA-4999
- DSA-4999
Modified: 2024-11-21
CVE-2021-37706
PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In affected versions if the incoming STUN message contains an ERROR-CODE attribute, the header length is not checked before performing a subtraction operation, potentially resulting in an integer underflow scenario. This issue affects all users that use STUN. A malicious actor located within the victim’s network may forge and send a specially crafted UDP (STUN) message that could remotely execute arbitrary code on the victim’s machine. Users are advised to upgrade as soon as possible. There are no known workarounds.
- http://packetstormsecurity.com/files/166225/Asterisk-Project-Security-Advisory-AST-2022-004.html
- http://packetstormsecurity.com/files/166225/Asterisk-Project-Security-Advisory-AST-2022-004.html
- 20220304 AST-2022-004: pjproject: integer underflow on STUN message
- 20220304 AST-2022-004: pjproject: integer underflow on STUN message
- https://github.com/pjsip/pjproject/commit/15663e3f37091069b8c98a7fce680dc04bc8e865
- https://github.com/pjsip/pjproject/commit/15663e3f37091069b8c98a7fce680dc04bc8e865
- https://github.com/pjsip/pjproject/security/advisories/GHSA-2qpg-f6wf-w984
- https://github.com/pjsip/pjproject/security/advisories/GHSA-2qpg-f6wf-w984
- [debian-lts-announce] 20220328 [SECURITY] [DLA 2962-1] pjproject security update
- [debian-lts-announce] 20220328 [SECURITY] [DLA 2962-1] pjproject security update
- [debian-lts-announce] 20221117 [SECURITY] [DLA 3194-1] asterisk security update
- [debian-lts-announce] 20221117 [SECURITY] [DLA 3194-1] asterisk security update
- [debian-lts-announce] 20230829 [SECURITY] [DLA 3549-1] ring security update
- [debian-lts-announce] 20230829 [SECURITY] [DLA 3549-1] ring security update
- GLSA-202210-37
- GLSA-202210-37
- DSA-5285
- DSA-5285
Modified: 2024-11-21
CVE-2021-41141
PJSIP is a free and open source multimedia communication library written in the C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In various parts of PJSIP, when error/failure occurs, it is found that the function returns without releasing the currently held locks. This could result in a system deadlock, which cause a denial of service for the users. No release has yet been made which contains the linked fix commit. All versions up to an including 2.11.1 are affected. Users may need to manually apply the patch.
- https://github.com/pjsip/pjproject/commit/1aa2c0e0fb60a1b0bf793e0d834073ffe50fb196
- https://github.com/pjsip/pjproject/commit/1aa2c0e0fb60a1b0bf793e0d834073ffe50fb196
- https://github.com/pjsip/pjproject/security/advisories/GHSA-8fmx-hqw7-6gmc
- https://github.com/pjsip/pjproject/security/advisories/GHSA-8fmx-hqw7-6gmc
- [debian-lts-announce] 20220328 [SECURITY] [DLA 2962-1] pjproject security update
- [debian-lts-announce] 20220328 [SECURITY] [DLA 2962-1] pjproject security update
- GLSA-202210-37
- GLSA-202210-37
Modified: 2024-11-21
CVE-2021-43299
Stack overflow in PJSUA API when calling pjsua_player_create. An attacker-controlled 'filename' argument may cause a buffer overflow since it is copied to a fixed-size stack buffer without any size validation.
- https://github.com/pjsip/pjproject/security/advisories/GHSA-qcvw-h34v-c7r9
- https://github.com/pjsip/pjproject/security/advisories/GHSA-qcvw-h34v-c7r9
- [debian-lts-announce] 20220328 [SECURITY] [DLA 2962-1] pjproject security update
- [debian-lts-announce] 20220328 [SECURITY] [DLA 2962-1] pjproject security update
- [debian-lts-announce] 20221117 [SECURITY] [DLA 3194-1] asterisk security update
- [debian-lts-announce] 20221117 [SECURITY] [DLA 3194-1] asterisk security update
- [debian-lts-announce] 20230829 [SECURITY] [DLA 3549-1] ring security update
- [debian-lts-announce] 20230829 [SECURITY] [DLA 3549-1] ring security update
- DSA-5285
- DSA-5285
Modified: 2024-11-21
CVE-2021-43300
Stack overflow in PJSUA API when calling pjsua_recorder_create. An attacker-controlled 'filename' argument may cause a buffer overflow since it is copied to a fixed-size stack buffer without any size validation.
- https://github.com/pjsip/pjproject/security/advisories/GHSA-qcvw-h34v-c7r9
- https://github.com/pjsip/pjproject/security/advisories/GHSA-qcvw-h34v-c7r9
- [debian-lts-announce] 20220328 [SECURITY] [DLA 2962-1] pjproject security update
- [debian-lts-announce] 20220328 [SECURITY] [DLA 2962-1] pjproject security update
- [debian-lts-announce] 20221117 [SECURITY] [DLA 3194-1] asterisk security update
- [debian-lts-announce] 20221117 [SECURITY] [DLA 3194-1] asterisk security update
- [debian-lts-announce] 20230829 [SECURITY] [DLA 3549-1] ring security update
- [debian-lts-announce] 20230829 [SECURITY] [DLA 3549-1] ring security update
- DSA-5285
- DSA-5285
Modified: 2024-11-21
CVE-2021-43301
Stack overflow in PJSUA API when calling pjsua_playlist_create. An attacker-controlled 'file_names' argument may cause a buffer overflow since it is copied to a fixed-size stack buffer without any size validation.
- https://github.com/pjsip/pjproject/security/advisories/GHSA-qcvw-h34v-c7r9
- https://github.com/pjsip/pjproject/security/advisories/GHSA-qcvw-h34v-c7r9
- [debian-lts-announce] 20220328 [SECURITY] [DLA 2962-1] pjproject security update
- [debian-lts-announce] 20220328 [SECURITY] [DLA 2962-1] pjproject security update
- [debian-lts-announce] 20221117 [SECURITY] [DLA 3194-1] asterisk security update
- [debian-lts-announce] 20221117 [SECURITY] [DLA 3194-1] asterisk security update
- [debian-lts-announce] 20230829 [SECURITY] [DLA 3549-1] ring security update
- [debian-lts-announce] 20230829 [SECURITY] [DLA 3549-1] ring security update
- DSA-5285
- DSA-5285
Modified: 2024-11-21
CVE-2021-43302
Read out-of-bounds in PJSUA API when calling pjsua_recorder_create. An attacker-controlled 'filename' argument may cause an out-of-bounds read when the filename is shorter than 4 characters.
- https://github.com/pjsip/pjproject/security/advisories/GHSA-qcvw-h34v-c7r9
- https://github.com/pjsip/pjproject/security/advisories/GHSA-qcvw-h34v-c7r9
- [debian-lts-announce] 20220328 [SECURITY] [DLA 2962-1] pjproject security update
- [debian-lts-announce] 20220328 [SECURITY] [DLA 2962-1] pjproject security update
- [debian-lts-announce] 20221117 [SECURITY] [DLA 3194-1] asterisk security update
- [debian-lts-announce] 20221117 [SECURITY] [DLA 3194-1] asterisk security update
- [debian-lts-announce] 20230829 [SECURITY] [DLA 3549-1] ring security update
- [debian-lts-announce] 20230829 [SECURITY] [DLA 3549-1] ring security update
- DSA-5285
- DSA-5285
Modified: 2024-11-21
CVE-2021-43303
Buffer overflow in PJSUA API when calling pjsua_call_dump. An attacker-controlled 'buffer' argument may cause a buffer overflow, since supplying an output buffer smaller than 128 characters may overflow the output buffer, regardless of the 'maxlen' argument supplied
- https://github.com/pjsip/pjproject/security/advisories/GHSA-qcvw-h34v-c7r9
- https://github.com/pjsip/pjproject/security/advisories/GHSA-qcvw-h34v-c7r9
- [debian-lts-announce] 20220328 [SECURITY] [DLA 2962-1] pjproject security update
- [debian-lts-announce] 20220328 [SECURITY] [DLA 2962-1] pjproject security update
- [debian-lts-announce] 20221117 [SECURITY] [DLA 3194-1] asterisk security update
- [debian-lts-announce] 20221117 [SECURITY] [DLA 3194-1] asterisk security update
- [debian-lts-announce] 20230829 [SECURITY] [DLA 3549-1] ring security update
- [debian-lts-announce] 20230829 [SECURITY] [DLA 3549-1] ring security update
- DSA-5285
- DSA-5285
Modified: 2024-11-21
CVE-2021-43804
PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In affected versions if the incoming RTCP BYE message contains a reason's length, this declared length is not checked against the actual received packet size, potentially resulting in an out-of-bound read access. This issue affects all users that use PJMEDIA and RTCP. A malicious actor can send a RTCP BYE message with an invalid reason length. Users are advised to upgrade as soon as possible. There are no known workarounds.
- https://github.com/pjsip/pjproject/commit/8b621f192cae14456ee0b0ade52ce6c6f258af1e
- https://github.com/pjsip/pjproject/commit/8b621f192cae14456ee0b0ade52ce6c6f258af1e
- https://github.com/pjsip/pjproject/security/advisories/GHSA-3qx3-cg72-wrh9
- https://github.com/pjsip/pjproject/security/advisories/GHSA-3qx3-cg72-wrh9
- [debian-lts-announce] 20220328 [SECURITY] [DLA 2962-1] pjproject security update
- [debian-lts-announce] 20220328 [SECURITY] [DLA 2962-1] pjproject security update
- [debian-lts-announce] 20221117 [SECURITY] [DLA 3194-1] asterisk security update
- [debian-lts-announce] 20221117 [SECURITY] [DLA 3194-1] asterisk security update
- [debian-lts-announce] 20230829 [SECURITY] [DLA 3549-1] ring security update
- [debian-lts-announce] 20230829 [SECURITY] [DLA 3549-1] ring security update
- GLSA-202210-37
- GLSA-202210-37
- DSA-5285
- DSA-5285
Modified: 2024-11-21
CVE-2021-43845
PJSIP is a free and open source multimedia communication library. In version 2.11.1 and prior, if incoming RTCP XR message contain block, the data field is not checked against the received packet size, potentially resulting in an out-of-bound read access. This affects all users that use PJMEDIA and RTCP XR. A malicious actor can send a RTCP XR message with an invalid packet size.
- https://github.com/pjsip/pjproject/commit/f74c1fc22b760d2a24369aa72c74c4a9ab985859
- https://github.com/pjsip/pjproject/commit/f74c1fc22b760d2a24369aa72c74c4a9ab985859
- https://github.com/pjsip/pjproject/pull/2924
- https://github.com/pjsip/pjproject/pull/2924
- https://github.com/pjsip/pjproject/security/advisories/GHSA-r374-qrwv-86hh
- https://github.com/pjsip/pjproject/security/advisories/GHSA-r374-qrwv-86hh
- [debian-lts-announce] 20220328 [SECURITY] [DLA 2962-1] pjproject security update
- [debian-lts-announce] 20220328 [SECURITY] [DLA 2962-1] pjproject security update
- [debian-lts-announce] 20221117 [SECURITY] [DLA 3194-1] asterisk security update
- [debian-lts-announce] 20221117 [SECURITY] [DLA 3194-1] asterisk security update
- [debian-lts-announce] 20230829 [SECURITY] [DLA 3549-1] ring security update
- [debian-lts-announce] 20230829 [SECURITY] [DLA 3549-1] ring security update
- GLSA-202210-37
- GLSA-202210-37
- DSA-5285
- DSA-5285
Modified: 2024-11-21
CVE-2022-21722
PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In version 2.11.1 and prior, there are various cases where it is possible that certain incoming RTP/RTCP packets can potentially cause out-of-bound read access. This issue affects all users that use PJMEDIA and accept incoming RTP/RTCP. A patch is available as a commit in the `master` branch. There are no known workarounds.
- https://github.com/pjsip/pjproject/commit/22af44e68a0c7d190ac1e25075e1382f77e9397a
- https://github.com/pjsip/pjproject/commit/22af44e68a0c7d190ac1e25075e1382f77e9397a
- https://github.com/pjsip/pjproject/security/advisories/GHSA-m66q-q64c-hv36
- https://github.com/pjsip/pjproject/security/advisories/GHSA-m66q-q64c-hv36
- [debian-lts-announce] 20220328 [SECURITY] [DLA 2962-1] pjproject security update
- [debian-lts-announce] 20220328 [SECURITY] [DLA 2962-1] pjproject security update
- [debian-lts-announce] 20221117 [SECURITY] [DLA 3194-1] asterisk security update
- [debian-lts-announce] 20221117 [SECURITY] [DLA 3194-1] asterisk security update
- [debian-lts-announce] 20230829 [SECURITY] [DLA 3549-1] ring security update
- [debian-lts-announce] 20230829 [SECURITY] [DLA 3549-1] ring security update
- GLSA-202210-37
- GLSA-202210-37
- DSA-5285
- DSA-5285
Modified: 2024-11-21
CVE-2022-21723
PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In versions 2.11.1 and prior, parsing an incoming SIP message that contains a malformed multipart can potentially cause out-of-bound read access. This issue affects all PJSIP users that accept SIP multipart. The patch is available as commit in the `master` branch. There are no known workarounds.
- http://packetstormsecurity.com/files/166227/Asterisk-Project-Security-Advisory-AST-2022-006.html
- http://packetstormsecurity.com/files/166227/Asterisk-Project-Security-Advisory-AST-2022-006.html
- 20220304 AST-2022-006: pjproject: unconstrained malformed multipart SIP message
- 20220304 AST-2022-006: pjproject: unconstrained malformed multipart SIP message
- https://github.com/pjsip/pjproject/commit/077b465c33f0aec05a49cd2ca456f9a1b112e896
- https://github.com/pjsip/pjproject/commit/077b465c33f0aec05a49cd2ca456f9a1b112e896
- https://github.com/pjsip/pjproject/security/advisories/GHSA-7fw8-54cv-r7pm
- https://github.com/pjsip/pjproject/security/advisories/GHSA-7fw8-54cv-r7pm
- [debian-lts-announce] 20220328 [SECURITY] [DLA 2962-1] pjproject security update
- [debian-lts-announce] 20220328 [SECURITY] [DLA 2962-1] pjproject security update
- [debian-lts-announce] 20221117 [SECURITY] [DLA 3194-1] asterisk security update
- [debian-lts-announce] 20221117 [SECURITY] [DLA 3194-1] asterisk security update
- [debian-lts-announce] 20230829 [SECURITY] [DLA 3549-1] ring security update
- [debian-lts-announce] 20230829 [SECURITY] [DLA 3549-1] ring security update
- GLSA-202210-37
- GLSA-202210-37
- DSA-5285
- DSA-5285
Modified: 2024-11-21
CVE-2022-23537
PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. Buffer overread is possible when parsing a specially crafted STUN message with unknown attribute. The vulnerability affects applications that uses STUN including PJNATH and PJSUA-LIB. The patch is available as a commit in the master branch (2.13.1).
- https://github.com/pjsip/pjproject/commit/d8440f4d711a654b511f50f79c0445b26f9dd1e1
- https://github.com/pjsip/pjproject/commit/d8440f4d711a654b511f50f79c0445b26f9dd1e1
- https://github.com/pjsip/pjproject/security/advisories/GHSA-9pfh-r8x4-w26w
- https://github.com/pjsip/pjproject/security/advisories/GHSA-9pfh-r8x4-w26w
- https://lists.debian.org/debian-lts-announce/2023/08/msg00038.html
- https://lists.debian.org/debian-lts-announce/2023/08/msg00038.html
Modified: 2024-11-21
CVE-2022-23608
PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In versions up to and including 2.11.1 when in a dialog set (or forking) scenario, a hash key shared by multiple UAC dialogs can potentially be prematurely freed when one of the dialogs is destroyed . The issue may cause a dialog set to be registered in the hash table multiple times (with different hash keys) leading to undefined behavior such as dialog list collision which eventually leading to endless loop. A patch is available in commit db3235953baa56d2fb0e276ca510fefca751643f which will be included in the next release. There are no known workarounds for this issue.
- http://packetstormsecurity.com/files/166226/Asterisk-Project-Security-Advisory-AST-2022-005.html
- http://packetstormsecurity.com/files/166226/Asterisk-Project-Security-Advisory-AST-2022-005.html
- 20220304 AST-2022-005: pjproject: undefined behavior after freeing a dialog set
- 20220304 AST-2022-005: pjproject: undefined behavior after freeing a dialog set
- https://github.com/pjsip/pjproject/commit/db3235953baa56d2fb0e276ca510fefca751643f
- https://github.com/pjsip/pjproject/commit/db3235953baa56d2fb0e276ca510fefca751643f
- https://github.com/pjsip/pjproject/security/advisories/GHSA-ffff-m5fm-qm62
- https://github.com/pjsip/pjproject/security/advisories/GHSA-ffff-m5fm-qm62
- [debian-lts-announce] 20220328 [SECURITY] [DLA 2962-1] pjproject security update
- [debian-lts-announce] 20220328 [SECURITY] [DLA 2962-1] pjproject security update
- [debian-lts-announce] 20220331 [SECURITY] [DLA 2962-2] pjproject regression update
- [debian-lts-announce] 20220331 [SECURITY] [DLA 2962-2] pjproject regression update
- [debian-lts-announce] 20221117 [SECURITY] [DLA 3194-1] asterisk security update
- [debian-lts-announce] 20221117 [SECURITY] [DLA 3194-1] asterisk security update
- [debian-lts-announce] 20230829 [SECURITY] [DLA 3549-1] ring security update
- [debian-lts-announce] 20230829 [SECURITY] [DLA 3549-1] ring security update
- GLSA-202210-37
- GLSA-202210-37
- DSA-5285
- DSA-5285
Modified: 2024-11-21
CVE-2022-24754
PJSIP is a free and open source multimedia communication library written in C language. In versions prior to and including 2.12 PJSIP there is a stack-buffer overflow vulnerability which only impacts PJSIP users who accept hashed digest credentials (credentials with data_type `PJSIP_CRED_DATA_DIGEST`). This issue has been patched in the master branch of the PJSIP repository and will be included with the next release. Users unable to upgrade need to check that the hashed digest data length must be equal to `PJSIP_MD5STRLEN` before passing to PJSIP.
- https://github.com/pjsip/pjproject/commit/d27f79da11df7bc8bb56c2f291d71e54df8d2c47
- https://github.com/pjsip/pjproject/commit/d27f79da11df7bc8bb56c2f291d71e54df8d2c47
- https://github.com/pjsip/pjproject/security/advisories/GHSA-73f7-48m9-w662
- https://github.com/pjsip/pjproject/security/advisories/GHSA-73f7-48m9-w662
- [debian-lts-announce] 20220328 [SECURITY] [DLA 2962-1] pjproject security update
- [debian-lts-announce] 20220328 [SECURITY] [DLA 2962-1] pjproject security update
- [debian-lts-announce] 20230829 [SECURITY] [DLA 3549-1] ring security update
- [debian-lts-announce] 20230829 [SECURITY] [DLA 3549-1] ring security update
- GLSA-202210-37
- GLSA-202210-37
Modified: 2024-11-21
CVE-2022-24764
PJSIP is a free and open source multimedia communication library written in C. Versions 2.12 and prior contain a stack buffer overflow vulnerability that affects PJSUA2 users or users that call the API `pjmedia_sdp_print(), pjmedia_sdp_media_print()`. Applications that do not use PJSUA2 and do not directly call `pjmedia_sdp_print()` or `pjmedia_sdp_media_print()` should not be affected. A patch is available on the `master` branch of the `pjsip/pjproject` GitHub repository. There are currently no known workarounds.
- https://github.com/pjsip/pjproject/commit/560a1346f87aabe126509bb24930106dea292b00
- https://github.com/pjsip/pjproject/commit/560a1346f87aabe126509bb24930106dea292b00
- https://github.com/pjsip/pjproject/security/advisories/GHSA-f5qg-pqcg-765m
- https://github.com/pjsip/pjproject/security/advisories/GHSA-f5qg-pqcg-765m
- [debian-lts-announce] 20220328 [SECURITY] [DLA 2962-1] pjproject security update
- [debian-lts-announce] 20220328 [SECURITY] [DLA 2962-1] pjproject security update
- [debian-lts-announce] 20221117 [SECURITY] [DLA 3194-1] asterisk security update
- [debian-lts-announce] 20221117 [SECURITY] [DLA 3194-1] asterisk security update
- [debian-lts-announce] 20230829 [SECURITY] [DLA 3549-1] ring security update
- [debian-lts-announce] 20230829 [SECURITY] [DLA 3549-1] ring security update
- GLSA-202210-37
- GLSA-202210-37
- DSA-5285
- DSA-5285
Modified: 2024-11-21
CVE-2022-24792
PJSIP is a free and open source multimedia communication library written in C. A denial-of-service vulnerability affects applications on a 32-bit systems that use PJSIP versions 2.12 and prior to play/read invalid WAV files. The vulnerability occurs when reading WAV file data chunks with length greater than 31-bit integers. The vulnerability does not affect 64-bit apps and should not affect apps that only plays trusted WAV files. A patch is available on the `master` branch of the `pjsip/project` GitHub repository. As a workaround, apps can reject a WAV file received from an unknown source or validate the file first.
- https://github.com/pjsip/pjproject/commit/947bc1ee6d05be10204b918df75a503415fd3213
- https://github.com/pjsip/pjproject/commit/947bc1ee6d05be10204b918df75a503415fd3213
- https://github.com/pjsip/pjproject/security/advisories/GHSA-rwgw-vwxg-q799
- https://github.com/pjsip/pjproject/security/advisories/GHSA-rwgw-vwxg-q799
- [debian-lts-announce] 20220531 [SECURITY] [DLA 3036-1] pjproject security update
- [debian-lts-announce] 20220531 [SECURITY] [DLA 3036-1] pjproject security update
- [debian-lts-announce] 20221117 [SECURITY] [DLA 3194-1] asterisk security update
- [debian-lts-announce] 20221117 [SECURITY] [DLA 3194-1] asterisk security update
- GLSA-202210-37
- GLSA-202210-37
- DSA-5285
- DSA-5285
Modified: 2024-11-21
CVE-2022-31031
PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In versions prior to and including 2.12.1 a stack buffer overflow vulnerability affects PJSIP users that use STUN in their applications, either by: setting a STUN server in their account/media config in PJSUA/PJSUA2 level, or directly using `pjlib-util/stun_simple` API. A patch is available in commit 450baca which should be included in the next release. There are no known workarounds for this issue.
- https://github.com/pjsip/pjproject/commit/450baca94f475345542c6953832650c390889202
- https://github.com/pjsip/pjproject/commit/450baca94f475345542c6953832650c390889202
- https://github.com/pjsip/pjproject/security/advisories/GHSA-26j7-ww69-c4qj
- https://github.com/pjsip/pjproject/security/advisories/GHSA-26j7-ww69-c4qj
- [debian-lts-announce] 20230222 [SECURITY] [DLA 3335-1] asterisk security update
- [debian-lts-announce] 20230222 [SECURITY] [DLA 3335-1] asterisk security update
- [debian-lts-announce] 20230829 [SECURITY] [DLA 3549-1] ring security update
- [debian-lts-announce] 20230829 [SECURITY] [DLA 3549-1] ring security update
- GLSA-202210-37
- GLSA-202210-37
- DSA-5358
- DSA-5358
Modified: 2024-11-21
CVE-2023-27585
PJSIP is a free and open source multimedia communication library written in C. A buffer overflow vulnerability in versions 2.13 and prior affects applications that use PJSIP DNS resolver. It doesn't affect PJSIP users who do not utilise PJSIP DNS resolver. This vulnerability is related to CVE-2022-24793. The difference is that this issue is in parsing the query record `parse_query()`, while the issue in CVE-2022-24793 is in `parse_rr()`. A patch is available as commit `d1c5e4d` in the `master` branch. A workaround is to disable DNS resolution in PJSIP config (by setting `nameserver_count` to zero) or use an external resolver implementation instead.
- https://github.com/pjsip/pjproject/commit/d1c5e4da5bae7f220bc30719888bb389c905c0c5
- https://github.com/pjsip/pjproject/commit/d1c5e4da5bae7f220bc30719888bb389c905c0c5
- https://github.com/pjsip/pjproject/security/advisories/GHSA-p6g5-v97c-w5q4
- https://github.com/pjsip/pjproject/security/advisories/GHSA-p6g5-v97c-w5q4
- https://github.com/pjsip/pjproject/security/advisories/GHSA-q9cp-8wcq-7pfr
- https://github.com/pjsip/pjproject/security/advisories/GHSA-q9cp-8wcq-7pfr
- [debian-lts-announce] 20230418 [SECURITY] [DLA 3394-1] asterisk security update
- [debian-lts-announce] 20230418 [SECURITY] [DLA 3394-1] asterisk security update
- [debian-lts-announce] 20230829 [SECURITY] [DLA 3549-1] ring security update
- [debian-lts-announce] 20230829 [SECURITY] [DLA 3549-1] ring security update
- DSA-5438
- DSA-5438
- https://www.pjsip.org/pjlib-util/docs/html/group__PJ__DNS__RESOLVER.htm
- https://www.pjsip.org/pjlib-util/docs/html/group__PJ__DNS__RESOLVER.htm
Modified: 2024-11-21
CVE-2023-38703
PJSIP is a free and open source multimedia communication library written in C with high level API in C, C++, Java, C#, and Python languages. SRTP is a higher level media transport which is stacked upon a lower level media transport such as UDP and ICE. Currently a higher level transport is not synchronized with its lower level transport that may introduce use-after-free issue. This vulnerability affects applications that have SRTP capability (`PJMEDIA_HAS_SRTP` is set) and use underlying media transport other than UDP. This vulnerability’s impact may range from unexpected application termination to control flow hijack/memory corruption. The patch is available as a commit in the master branch.
- https://github.com/pjsip/pjproject/commit/6dc9b8c181aff39845f02b4626e0812820d4ef0d
- https://github.com/pjsip/pjproject/commit/6dc9b8c181aff39845f02b4626e0812820d4ef0d
- https://github.com/pjsip/pjproject/security/advisories/GHSA-f76w-fh7c-pc66
- https://github.com/pjsip/pjproject/security/advisories/GHSA-f76w-fh7c-pc66
- https://lists.debian.org/debian-lts-announce/2023/12/msg00019.html
- https://lists.debian.org/debian-lts-announce/2023/12/msg00019.html