ALT-BU-2024-16125-1
Branch c10f1 update bulletin.
Package python3-module-setuptools updated to version 57.4.0-alt1.p10.1 for branch c10f1 in task 363060.
Closed vulnerabilities
BDU:2023-02445
Уязвимость инструментов установки пакетов Python Packaging Authority, связанная с некорректным регулярным выражением, позволяющая нарушителю вызывать отказ в обслуживании
BDU:2024-05843
Уязвимость модуля package_index библиотеки упрощения упаковки проектов setuptools, связанная с неправильным контролем генерации кода, позволяющая нарушителю выполнять произвольные команды в системе
Modified: 2024-11-21
CVE-2022-40897
Python Packaging Authority (PyPA) setuptools before 65.5.1 allows remote attackers to cause a denial of service via HTML in a crafted package or custom PackageIndex page. There is a Regular Expression Denial of Service (ReDoS) in package_index.py.
- https://github.com/pypa/setuptools/blob/fe8a98e696241487ba6ac9f91faa38ade939ec5d/setuptools/package_index.py#L200
- https://github.com/pypa/setuptools/blob/fe8a98e696241487ba6ac9f91faa38ade939ec5d/setuptools/package_index.py#L200
- https://github.com/pypa/setuptools/commit/43a9c9bfa6aa626ec2a22540bea28d2ca77964be
- https://github.com/pypa/setuptools/commit/43a9c9bfa6aa626ec2a22540bea28d2ca77964be
- https://github.com/pypa/setuptools/compare/v65.5.0...v65.5.1
- https://github.com/pypa/setuptools/compare/v65.5.0...v65.5.1
- FEDORA-2023-60e2b22be0
- FEDORA-2023-60e2b22be0
- FEDORA-2023-9992b32c1f
- FEDORA-2023-9992b32c1f
- https://pyup.io/posts/pyup-discovers-redos-vulnerabilities-in-top-python-packages/
- https://pyup.io/posts/pyup-discovers-redos-vulnerabilities-in-top-python-packages/
- https://pyup.io/vulnerabilities/CVE-2022-40897/52495/
- https://pyup.io/vulnerabilities/CVE-2022-40897/52495/
- https://security.netapp.com/advisory/ntap-20230214-0001/
- https://security.netapp.com/advisory/ntap-20230214-0001/
- https://security.netapp.com/advisory/ntap-20240621-0006/
- https://security.netapp.com/advisory/ntap-20240621-0006/
Modified: 2024-11-21
CVE-2024-6345
A vulnerability in the package_index module of pypa/setuptools versions up to 69.1.1 allows for remote code execution via its download functions. These functions, which are used to download packages from URLs provided by users or retrieved from package index servers, are susceptible to code injection. If these functions are exposed to user-controlled inputs, such as package URLs, they can execute arbitrary commands on the system. The issue is fixed in version 70.0.
Package python-module-urllib3 updated to version 1.26.20-alt1.c10f1 for branch c10f1 in task 363021.
Closed vulnerabilities
BDU:2023-06977
Уязвимость модуля urllib3 интерпретатора языка программирования Python, позволяющая нарушителю раскрыть защищаемую информацию
BDU:2023-08730
Уязвимость модуля urllib3 интерпретатора языка программирования Python, связанная с отсутствием защиты служебных данных, позволяющая нарушителю раскрыть защищаемую информацию
Modified: 2024-12-13
CVE-2023-43804
urllib3 is a user-friendly HTTP client library for Python. urllib3 doesn't treat the `Cookie` HTTP header special or provide any helpers for managing cookies over HTTP, that is the responsibility of the user. However, it is possible for a user to specify a `Cookie` header and unknowingly leak information via HTTP redirects to a different origin if that user doesn't disable redirects explicitly. This issue has been patched in urllib3 version 1.26.17 or 2.0.5.
- https://github.com/urllib3/urllib3/commit/01220354d389cd05474713f8c982d05c9b17aafb
- https://github.com/urllib3/urllib3/commit/01220354d389cd05474713f8c982d05c9b17aafb
- https://github.com/urllib3/urllib3/commit/644124ecd0b6e417c527191f866daa05a5a2056d
- https://github.com/urllib3/urllib3/commit/644124ecd0b6e417c527191f866daa05a5a2056d
- https://github.com/urllib3/urllib3/security/advisories/GHSA-v845-jxx5-vc9f
- https://github.com/urllib3/urllib3/security/advisories/GHSA-v845-jxx5-vc9f
- https://lists.debian.org/debian-lts-announce/2023/10/msg00012.html
- https://lists.debian.org/debian-lts-announce/2023/10/msg00012.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5F5CUBAN5XMEBVBZPHFITBLMJV5FIJJ5/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5F5CUBAN5XMEBVBZPHFITBLMJV5FIJJ5/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I3PR7C6RJ6JUBQKIJ644DMIJSUP36VDY/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I3PR7C6RJ6JUBQKIJ644DMIJSUP36VDY/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NDAGZXYJ7H2G3SB47M453VQVNAWKAEJJ/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NDAGZXYJ7H2G3SB47M453VQVNAWKAEJJ/
- https://security.netapp.com/advisory/ntap-20241213-0007/
- https://www.vicarius.io/vsociety/posts/cve-2023-43804-urllib3-vulnerability-3
Modified: 2025-02-13
CVE-2023-45803
urllib3 is a user-friendly HTTP client library for Python. urllib3 previously wouldn't remove the HTTP request body when an HTTP redirect response using status 301, 302, or 303 after the request had its method changed from one that could accept a request body (like `POST`) to `GET` as is required by HTTP RFCs. Although this behavior is not specified in the section for redirects, it can be inferred by piecing together information from different sections and we have observed the behavior in other major HTTP client implementations like curl and web browsers. Because the vulnerability requires a previously trusted service to become compromised in order to have an impact on confidentiality we believe the exploitability of this vulnerability is low. Additionally, many users aren't putting sensitive data in HTTP request bodies, if this is the case then this vulnerability isn't exploitable. Both of the following conditions must be true to be affected by this vulnerability: 1. Using urllib3 and submitting sensitive information in the HTTP request body (such as form data or JSON) and 2. The origin service is compromised and starts redirecting using 301, 302, or 303 to a malicious peer or the redirected-to service becomes compromised. This issue has been addressed in versions 1.26.18 and 2.0.7 and users are advised to update to resolve this issue. Users unable to update should disable redirects for services that aren't expecting to respond with redirects with `redirects=False` and disable automatic redirects with `redirects=False` and handle 301, 302, and 303 redirects manually by stripping the HTTP request body.
- https://github.com/urllib3/urllib3/commit/4e98d57809dacab1cbe625fddeec1a290c478ea9
- https://github.com/urllib3/urllib3/commit/4e98d57809dacab1cbe625fddeec1a290c478ea9
- https://github.com/urllib3/urllib3/security/advisories/GHSA-g4mx-q9vg-27p4
- https://github.com/urllib3/urllib3/security/advisories/GHSA-g4mx-q9vg-27p4
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4R2Y5XK3WALSR3FNAGN7JBYV2B343ZKB/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4R2Y5XK3WALSR3FNAGN7JBYV2B343ZKB/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5F5CUBAN5XMEBVBZPHFITBLMJV5FIJJ5/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5F5CUBAN5XMEBVBZPHFITBLMJV5FIJJ5/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PPDPLM6UUMN55ESPQWJFLLIZY4ZKCNRX/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PPDPLM6UUMN55ESPQWJFLLIZY4ZKCNRX/
- https://www.rfc-editor.org/rfc/rfc9110.html#name-get
- https://www.rfc-editor.org/rfc/rfc9110.html#name-get
Closed vulnerabilities
Modified: 2024-11-21
CVE-2021-3657
A flaw was found in mbsync versions prior to 1.4.4. Due to inadequate handling of extremely large (>=2GiB) IMAP literals, malicious or compromised IMAP servers, and hypothetically even external email senders, could cause several different buffer overflows, which could conceivably be exploited for remote code execution.
- https://bugzilla.redhat.com/show_bug.cgi?id=2028932
- https://bugzilla.redhat.com/show_bug.cgi?id=2028932
- [debian-lts-announce] 20220701 [SECURITY] [DLA 3066-1] isync security update
- [debian-lts-announce] 20220701 [SECURITY] [DLA 3066-1] isync security update
- GLSA-202208-15
- GLSA-202208-15
- https://www.openwall.com/lists/oss-security/2021/12/03/1
- https://www.openwall.com/lists/oss-security/2021/12/03/1
Closed vulnerabilities
BDU:2022-01086
Уязвимость мультимедийной коммуникационной библиотеки PJSIP, связанная с целочисленной потерей значимости, позволяющая нарушителю выполнить произвольный код
BDU:2022-01087
Уязвимость мультимедийной коммуникационной библиотеки PJSIP, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю выполнить произвольный код
BDU:2022-01449
Уязвимость функции pjsua_playlist_create мультимедийной коммуникационной библиотеки PJSIP, связанная с переполнением буфера в стека, позволяющая нарушителю выполнить произвольный код
BDU:2022-01450
Уязвимость функции pjsua_call_dump мультимедийной коммуникационной библиотеки PJSIP, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю выполнить произвольный кодд
BDU:2022-01451
Уязвимость функции pjsua_recorder_create мультимедийной коммуникационной библиотеки PJSIP, связанная с переполнением буфера в стека, позволяющая нарушителю выполнить произвольный код
BDU:2022-01452
Уязвимость мультимедийной коммуникационной библиотеки PJSIP, связанная с переполнением буфера в стеке, позволяющая нарушителю выполнить произвольный код
BDU:2022-01458
Уязвимость функции pjsua_recorder_create мультимедийной коммуникационной библиотеки PJSIP, связанная с чтением за границами буфера памяти, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-02055
Уязвимость SSL-сокета системы управления IP-телефонией Asterisk, реализации протокола SIP PJSIP, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-02185
Уязвимость мультимедийной коммуникационной библиотеки PJSIP, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-02186
Уязвимость мультимедийной коммуникационной библиотеки PJSIP, связанная с использованием памяти после её освобождения, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-02207
Уязвимость мультимедийной коммуникационной библиотеки PJSIP, связанная с ошибками синхронизации при использовании общего ресурса, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-02209
Уязвимость мультимедийной коммуникационной библиотеки PJSIP, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-03168
Уязвимость реализации функции pjsip_auth_create_digest() мультимедийной коммуникационной библиотеки PJSIP, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код
BDU:2022-03169
Уязвимость мультимедийной коммуникационной библиотеки PJSIP, связанная с выполнением цикла с недоступным условием выхода, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-03171
Уязвимость реализации функций pjmedia_sdp_print() и pjmedia_sdp_media_print() интерфейса PJSUA2 API мультимедийной коммуникационной библиотеки PJSI, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании
BDU:2022-07479
Уязвимость мультимедиа библиотеки PJSIP, связанная с переполнением буфера в динамической памяти, позволяющая нарушителю выполнить произвольный код в целевой системе
Modified: 2024-11-21
CVE-2021-32686
PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In PJSIP before version 2.11.1, there are a couple of issues found in the SSL socket. First, a race condition between callback and destroy, due to the accepted socket having no group lock. Second, the SSL socket parent/listener may get destroyed during handshake. Both issues were reported to happen intermittently in heavy load TLS connections. They cause a crash, resulting in a denial of service. These are fixed in version 2.11.1.
- https://github.com/pjsip/pjproject/commit/d5f95aa066f878b0aef6a64e60b61e8626e664cd
- https://github.com/pjsip/pjproject/commit/d5f95aa066f878b0aef6a64e60b61e8626e664cd
- https://github.com/pjsip/pjproject/pull/2716
- https://github.com/pjsip/pjproject/pull/2716
- https://github.com/pjsip/pjproject/releases/tag/2.11.1
- https://github.com/pjsip/pjproject/releases/tag/2.11.1
- https://github.com/pjsip/pjproject/security/advisories/GHSA-cv8x-p47p-99wr
- https://github.com/pjsip/pjproject/security/advisories/GHSA-cv8x-p47p-99wr
- [debian-lts-announce] 20220328 [SECURITY] [DLA 2962-1] pjproject security update
- [debian-lts-announce] 20220328 [SECURITY] [DLA 2962-1] pjproject security update
- GLSA-202210-37
- GLSA-202210-37
- DSA-4999
- DSA-4999
Modified: 2024-11-21
CVE-2021-37706
PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In affected versions if the incoming STUN message contains an ERROR-CODE attribute, the header length is not checked before performing a subtraction operation, potentially resulting in an integer underflow scenario. This issue affects all users that use STUN. A malicious actor located within the victim’s network may forge and send a specially crafted UDP (STUN) message that could remotely execute arbitrary code on the victim’s machine. Users are advised to upgrade as soon as possible. There are no known workarounds.
- http://packetstormsecurity.com/files/166225/Asterisk-Project-Security-Advisory-AST-2022-004.html
- http://packetstormsecurity.com/files/166225/Asterisk-Project-Security-Advisory-AST-2022-004.html
- 20220304 AST-2022-004: pjproject: integer underflow on STUN message
- 20220304 AST-2022-004: pjproject: integer underflow on STUN message
- https://github.com/pjsip/pjproject/commit/15663e3f37091069b8c98a7fce680dc04bc8e865
- https://github.com/pjsip/pjproject/commit/15663e3f37091069b8c98a7fce680dc04bc8e865
- https://github.com/pjsip/pjproject/security/advisories/GHSA-2qpg-f6wf-w984
- https://github.com/pjsip/pjproject/security/advisories/GHSA-2qpg-f6wf-w984
- [debian-lts-announce] 20220328 [SECURITY] [DLA 2962-1] pjproject security update
- [debian-lts-announce] 20220328 [SECURITY] [DLA 2962-1] pjproject security update
- [debian-lts-announce] 20221117 [SECURITY] [DLA 3194-1] asterisk security update
- [debian-lts-announce] 20221117 [SECURITY] [DLA 3194-1] asterisk security update
- [debian-lts-announce] 20230829 [SECURITY] [DLA 3549-1] ring security update
- [debian-lts-announce] 20230829 [SECURITY] [DLA 3549-1] ring security update
- GLSA-202210-37
- GLSA-202210-37
- DSA-5285
- DSA-5285
Modified: 2024-11-21
CVE-2021-41141
PJSIP is a free and open source multimedia communication library written in the C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In various parts of PJSIP, when error/failure occurs, it is found that the function returns without releasing the currently held locks. This could result in a system deadlock, which cause a denial of service for the users. No release has yet been made which contains the linked fix commit. All versions up to an including 2.11.1 are affected. Users may need to manually apply the patch.
- https://github.com/pjsip/pjproject/commit/1aa2c0e0fb60a1b0bf793e0d834073ffe50fb196
- https://github.com/pjsip/pjproject/commit/1aa2c0e0fb60a1b0bf793e0d834073ffe50fb196
- https://github.com/pjsip/pjproject/security/advisories/GHSA-8fmx-hqw7-6gmc
- https://github.com/pjsip/pjproject/security/advisories/GHSA-8fmx-hqw7-6gmc
- [debian-lts-announce] 20220328 [SECURITY] [DLA 2962-1] pjproject security update
- [debian-lts-announce] 20220328 [SECURITY] [DLA 2962-1] pjproject security update
- GLSA-202210-37
- GLSA-202210-37
Modified: 2024-11-21
CVE-2021-43299
Stack overflow in PJSUA API when calling pjsua_player_create. An attacker-controlled 'filename' argument may cause a buffer overflow since it is copied to a fixed-size stack buffer without any size validation.
- https://github.com/pjsip/pjproject/security/advisories/GHSA-qcvw-h34v-c7r9
- https://github.com/pjsip/pjproject/security/advisories/GHSA-qcvw-h34v-c7r9
- [debian-lts-announce] 20220328 [SECURITY] [DLA 2962-1] pjproject security update
- [debian-lts-announce] 20220328 [SECURITY] [DLA 2962-1] pjproject security update
- [debian-lts-announce] 20221117 [SECURITY] [DLA 3194-1] asterisk security update
- [debian-lts-announce] 20221117 [SECURITY] [DLA 3194-1] asterisk security update
- [debian-lts-announce] 20230829 [SECURITY] [DLA 3549-1] ring security update
- [debian-lts-announce] 20230829 [SECURITY] [DLA 3549-1] ring security update
- DSA-5285
- DSA-5285
Modified: 2024-11-21
CVE-2021-43300
Stack overflow in PJSUA API when calling pjsua_recorder_create. An attacker-controlled 'filename' argument may cause a buffer overflow since it is copied to a fixed-size stack buffer without any size validation.
- https://github.com/pjsip/pjproject/security/advisories/GHSA-qcvw-h34v-c7r9
- https://github.com/pjsip/pjproject/security/advisories/GHSA-qcvw-h34v-c7r9
- [debian-lts-announce] 20220328 [SECURITY] [DLA 2962-1] pjproject security update
- [debian-lts-announce] 20220328 [SECURITY] [DLA 2962-1] pjproject security update
- [debian-lts-announce] 20221117 [SECURITY] [DLA 3194-1] asterisk security update
- [debian-lts-announce] 20221117 [SECURITY] [DLA 3194-1] asterisk security update
- [debian-lts-announce] 20230829 [SECURITY] [DLA 3549-1] ring security update
- [debian-lts-announce] 20230829 [SECURITY] [DLA 3549-1] ring security update
- DSA-5285
- DSA-5285
Modified: 2024-11-21
CVE-2021-43301
Stack overflow in PJSUA API when calling pjsua_playlist_create. An attacker-controlled 'file_names' argument may cause a buffer overflow since it is copied to a fixed-size stack buffer without any size validation.
- https://github.com/pjsip/pjproject/security/advisories/GHSA-qcvw-h34v-c7r9
- https://github.com/pjsip/pjproject/security/advisories/GHSA-qcvw-h34v-c7r9
- [debian-lts-announce] 20220328 [SECURITY] [DLA 2962-1] pjproject security update
- [debian-lts-announce] 20220328 [SECURITY] [DLA 2962-1] pjproject security update
- [debian-lts-announce] 20221117 [SECURITY] [DLA 3194-1] asterisk security update
- [debian-lts-announce] 20221117 [SECURITY] [DLA 3194-1] asterisk security update
- [debian-lts-announce] 20230829 [SECURITY] [DLA 3549-1] ring security update
- [debian-lts-announce] 20230829 [SECURITY] [DLA 3549-1] ring security update
- DSA-5285
- DSA-5285
Modified: 2024-11-21
CVE-2021-43302
Read out-of-bounds in PJSUA API when calling pjsua_recorder_create. An attacker-controlled 'filename' argument may cause an out-of-bounds read when the filename is shorter than 4 characters.
- https://github.com/pjsip/pjproject/security/advisories/GHSA-qcvw-h34v-c7r9
- https://github.com/pjsip/pjproject/security/advisories/GHSA-qcvw-h34v-c7r9
- [debian-lts-announce] 20220328 [SECURITY] [DLA 2962-1] pjproject security update
- [debian-lts-announce] 20220328 [SECURITY] [DLA 2962-1] pjproject security update
- [debian-lts-announce] 20221117 [SECURITY] [DLA 3194-1] asterisk security update
- [debian-lts-announce] 20221117 [SECURITY] [DLA 3194-1] asterisk security update
- [debian-lts-announce] 20230829 [SECURITY] [DLA 3549-1] ring security update
- [debian-lts-announce] 20230829 [SECURITY] [DLA 3549-1] ring security update
- DSA-5285
- DSA-5285
Modified: 2024-11-21
CVE-2021-43303
Buffer overflow in PJSUA API when calling pjsua_call_dump. An attacker-controlled 'buffer' argument may cause a buffer overflow, since supplying an output buffer smaller than 128 characters may overflow the output buffer, regardless of the 'maxlen' argument supplied
- https://github.com/pjsip/pjproject/security/advisories/GHSA-qcvw-h34v-c7r9
- https://github.com/pjsip/pjproject/security/advisories/GHSA-qcvw-h34v-c7r9
- [debian-lts-announce] 20220328 [SECURITY] [DLA 2962-1] pjproject security update
- [debian-lts-announce] 20220328 [SECURITY] [DLA 2962-1] pjproject security update
- [debian-lts-announce] 20221117 [SECURITY] [DLA 3194-1] asterisk security update
- [debian-lts-announce] 20221117 [SECURITY] [DLA 3194-1] asterisk security update
- [debian-lts-announce] 20230829 [SECURITY] [DLA 3549-1] ring security update
- [debian-lts-announce] 20230829 [SECURITY] [DLA 3549-1] ring security update
- DSA-5285
- DSA-5285
Modified: 2024-11-21
CVE-2021-43804
PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In affected versions if the incoming RTCP BYE message contains a reason's length, this declared length is not checked against the actual received packet size, potentially resulting in an out-of-bound read access. This issue affects all users that use PJMEDIA and RTCP. A malicious actor can send a RTCP BYE message with an invalid reason length. Users are advised to upgrade as soon as possible. There are no known workarounds.
- https://github.com/pjsip/pjproject/commit/8b621f192cae14456ee0b0ade52ce6c6f258af1e
- https://github.com/pjsip/pjproject/commit/8b621f192cae14456ee0b0ade52ce6c6f258af1e
- https://github.com/pjsip/pjproject/security/advisories/GHSA-3qx3-cg72-wrh9
- https://github.com/pjsip/pjproject/security/advisories/GHSA-3qx3-cg72-wrh9
- [debian-lts-announce] 20220328 [SECURITY] [DLA 2962-1] pjproject security update
- [debian-lts-announce] 20220328 [SECURITY] [DLA 2962-1] pjproject security update
- [debian-lts-announce] 20221117 [SECURITY] [DLA 3194-1] asterisk security update
- [debian-lts-announce] 20221117 [SECURITY] [DLA 3194-1] asterisk security update
- [debian-lts-announce] 20230829 [SECURITY] [DLA 3549-1] ring security update
- [debian-lts-announce] 20230829 [SECURITY] [DLA 3549-1] ring security update
- GLSA-202210-37
- GLSA-202210-37
- DSA-5285
- DSA-5285
Modified: 2024-11-21
CVE-2021-43845
PJSIP is a free and open source multimedia communication library. In version 2.11.1 and prior, if incoming RTCP XR message contain block, the data field is not checked against the received packet size, potentially resulting in an out-of-bound read access. This affects all users that use PJMEDIA and RTCP XR. A malicious actor can send a RTCP XR message with an invalid packet size.
- https://github.com/pjsip/pjproject/commit/f74c1fc22b760d2a24369aa72c74c4a9ab985859
- https://github.com/pjsip/pjproject/commit/f74c1fc22b760d2a24369aa72c74c4a9ab985859
- https://github.com/pjsip/pjproject/pull/2924
- https://github.com/pjsip/pjproject/pull/2924
- https://github.com/pjsip/pjproject/security/advisories/GHSA-r374-qrwv-86hh
- https://github.com/pjsip/pjproject/security/advisories/GHSA-r374-qrwv-86hh
- [debian-lts-announce] 20220328 [SECURITY] [DLA 2962-1] pjproject security update
- [debian-lts-announce] 20220328 [SECURITY] [DLA 2962-1] pjproject security update
- [debian-lts-announce] 20221117 [SECURITY] [DLA 3194-1] asterisk security update
- [debian-lts-announce] 20221117 [SECURITY] [DLA 3194-1] asterisk security update
- [debian-lts-announce] 20230829 [SECURITY] [DLA 3549-1] ring security update
- [debian-lts-announce] 20230829 [SECURITY] [DLA 3549-1] ring security update
- GLSA-202210-37
- GLSA-202210-37
- DSA-5285
- DSA-5285
Modified: 2024-11-21
CVE-2022-21722
PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In version 2.11.1 and prior, there are various cases where it is possible that certain incoming RTP/RTCP packets can potentially cause out-of-bound read access. This issue affects all users that use PJMEDIA and accept incoming RTP/RTCP. A patch is available as a commit in the `master` branch. There are no known workarounds.
- https://github.com/pjsip/pjproject/commit/22af44e68a0c7d190ac1e25075e1382f77e9397a
- https://github.com/pjsip/pjproject/commit/22af44e68a0c7d190ac1e25075e1382f77e9397a
- https://github.com/pjsip/pjproject/security/advisories/GHSA-m66q-q64c-hv36
- https://github.com/pjsip/pjproject/security/advisories/GHSA-m66q-q64c-hv36
- [debian-lts-announce] 20220328 [SECURITY] [DLA 2962-1] pjproject security update
- [debian-lts-announce] 20220328 [SECURITY] [DLA 2962-1] pjproject security update
- [debian-lts-announce] 20221117 [SECURITY] [DLA 3194-1] asterisk security update
- [debian-lts-announce] 20221117 [SECURITY] [DLA 3194-1] asterisk security update
- [debian-lts-announce] 20230829 [SECURITY] [DLA 3549-1] ring security update
- [debian-lts-announce] 20230829 [SECURITY] [DLA 3549-1] ring security update
- GLSA-202210-37
- GLSA-202210-37
- DSA-5285
- DSA-5285
Modified: 2024-11-21
CVE-2022-21723
PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In versions 2.11.1 and prior, parsing an incoming SIP message that contains a malformed multipart can potentially cause out-of-bound read access. This issue affects all PJSIP users that accept SIP multipart. The patch is available as commit in the `master` branch. There are no known workarounds.
- http://packetstormsecurity.com/files/166227/Asterisk-Project-Security-Advisory-AST-2022-006.html
- http://packetstormsecurity.com/files/166227/Asterisk-Project-Security-Advisory-AST-2022-006.html
- 20220304 AST-2022-006: pjproject: unconstrained malformed multipart SIP message
- 20220304 AST-2022-006: pjproject: unconstrained malformed multipart SIP message
- https://github.com/pjsip/pjproject/commit/077b465c33f0aec05a49cd2ca456f9a1b112e896
- https://github.com/pjsip/pjproject/commit/077b465c33f0aec05a49cd2ca456f9a1b112e896
- https://github.com/pjsip/pjproject/security/advisories/GHSA-7fw8-54cv-r7pm
- https://github.com/pjsip/pjproject/security/advisories/GHSA-7fw8-54cv-r7pm
- [debian-lts-announce] 20220328 [SECURITY] [DLA 2962-1] pjproject security update
- [debian-lts-announce] 20220328 [SECURITY] [DLA 2962-1] pjproject security update
- [debian-lts-announce] 20221117 [SECURITY] [DLA 3194-1] asterisk security update
- [debian-lts-announce] 20221117 [SECURITY] [DLA 3194-1] asterisk security update
- [debian-lts-announce] 20230829 [SECURITY] [DLA 3549-1] ring security update
- [debian-lts-announce] 20230829 [SECURITY] [DLA 3549-1] ring security update
- GLSA-202210-37
- GLSA-202210-37
- DSA-5285
- DSA-5285
Modified: 2024-11-21
CVE-2022-23537
PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. Buffer overread is possible when parsing a specially crafted STUN message with unknown attribute. The vulnerability affects applications that uses STUN including PJNATH and PJSUA-LIB. The patch is available as a commit in the master branch (2.13.1).
- https://github.com/pjsip/pjproject/commit/d8440f4d711a654b511f50f79c0445b26f9dd1e1
- https://github.com/pjsip/pjproject/commit/d8440f4d711a654b511f50f79c0445b26f9dd1e1
- https://github.com/pjsip/pjproject/security/advisories/GHSA-9pfh-r8x4-w26w
- https://github.com/pjsip/pjproject/security/advisories/GHSA-9pfh-r8x4-w26w
- https://lists.debian.org/debian-lts-announce/2023/08/msg00038.html
- https://lists.debian.org/debian-lts-announce/2023/08/msg00038.html
Modified: 2024-11-21
CVE-2022-23608
PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In versions up to and including 2.11.1 when in a dialog set (or forking) scenario, a hash key shared by multiple UAC dialogs can potentially be prematurely freed when one of the dialogs is destroyed . The issue may cause a dialog set to be registered in the hash table multiple times (with different hash keys) leading to undefined behavior such as dialog list collision which eventually leading to endless loop. A patch is available in commit db3235953baa56d2fb0e276ca510fefca751643f which will be included in the next release. There are no known workarounds for this issue.
- http://packetstormsecurity.com/files/166226/Asterisk-Project-Security-Advisory-AST-2022-005.html
- http://packetstormsecurity.com/files/166226/Asterisk-Project-Security-Advisory-AST-2022-005.html
- 20220304 AST-2022-005: pjproject: undefined behavior after freeing a dialog set
- 20220304 AST-2022-005: pjproject: undefined behavior after freeing a dialog set
- https://github.com/pjsip/pjproject/commit/db3235953baa56d2fb0e276ca510fefca751643f
- https://github.com/pjsip/pjproject/commit/db3235953baa56d2fb0e276ca510fefca751643f
- https://github.com/pjsip/pjproject/security/advisories/GHSA-ffff-m5fm-qm62
- https://github.com/pjsip/pjproject/security/advisories/GHSA-ffff-m5fm-qm62
- [debian-lts-announce] 20220328 [SECURITY] [DLA 2962-1] pjproject security update
- [debian-lts-announce] 20220328 [SECURITY] [DLA 2962-1] pjproject security update
- [debian-lts-announce] 20220331 [SECURITY] [DLA 2962-2] pjproject regression update
- [debian-lts-announce] 20220331 [SECURITY] [DLA 2962-2] pjproject regression update
- [debian-lts-announce] 20221117 [SECURITY] [DLA 3194-1] asterisk security update
- [debian-lts-announce] 20221117 [SECURITY] [DLA 3194-1] asterisk security update
- [debian-lts-announce] 20230829 [SECURITY] [DLA 3549-1] ring security update
- [debian-lts-announce] 20230829 [SECURITY] [DLA 3549-1] ring security update
- GLSA-202210-37
- GLSA-202210-37
- DSA-5285
- DSA-5285
Modified: 2024-11-21
CVE-2022-24754
PJSIP is a free and open source multimedia communication library written in C language. In versions prior to and including 2.12 PJSIP there is a stack-buffer overflow vulnerability which only impacts PJSIP users who accept hashed digest credentials (credentials with data_type `PJSIP_CRED_DATA_DIGEST`). This issue has been patched in the master branch of the PJSIP repository and will be included with the next release. Users unable to upgrade need to check that the hashed digest data length must be equal to `PJSIP_MD5STRLEN` before passing to PJSIP.
- https://github.com/pjsip/pjproject/commit/d27f79da11df7bc8bb56c2f291d71e54df8d2c47
- https://github.com/pjsip/pjproject/commit/d27f79da11df7bc8bb56c2f291d71e54df8d2c47
- https://github.com/pjsip/pjproject/security/advisories/GHSA-73f7-48m9-w662
- https://github.com/pjsip/pjproject/security/advisories/GHSA-73f7-48m9-w662
- [debian-lts-announce] 20220328 [SECURITY] [DLA 2962-1] pjproject security update
- [debian-lts-announce] 20220328 [SECURITY] [DLA 2962-1] pjproject security update
- [debian-lts-announce] 20230829 [SECURITY] [DLA 3549-1] ring security update
- [debian-lts-announce] 20230829 [SECURITY] [DLA 3549-1] ring security update
- GLSA-202210-37
- GLSA-202210-37
Modified: 2024-11-21
CVE-2022-24764
PJSIP is a free and open source multimedia communication library written in C. Versions 2.12 and prior contain a stack buffer overflow vulnerability that affects PJSUA2 users or users that call the API `pjmedia_sdp_print(), pjmedia_sdp_media_print()`. Applications that do not use PJSUA2 and do not directly call `pjmedia_sdp_print()` or `pjmedia_sdp_media_print()` should not be affected. A patch is available on the `master` branch of the `pjsip/pjproject` GitHub repository. There are currently no known workarounds.
- https://github.com/pjsip/pjproject/commit/560a1346f87aabe126509bb24930106dea292b00
- https://github.com/pjsip/pjproject/commit/560a1346f87aabe126509bb24930106dea292b00
- https://github.com/pjsip/pjproject/security/advisories/GHSA-f5qg-pqcg-765m
- https://github.com/pjsip/pjproject/security/advisories/GHSA-f5qg-pqcg-765m
- [debian-lts-announce] 20220328 [SECURITY] [DLA 2962-1] pjproject security update
- [debian-lts-announce] 20220328 [SECURITY] [DLA 2962-1] pjproject security update
- [debian-lts-announce] 20221117 [SECURITY] [DLA 3194-1] asterisk security update
- [debian-lts-announce] 20221117 [SECURITY] [DLA 3194-1] asterisk security update
- [debian-lts-announce] 20230829 [SECURITY] [DLA 3549-1] ring security update
- [debian-lts-announce] 20230829 [SECURITY] [DLA 3549-1] ring security update
- GLSA-202210-37
- GLSA-202210-37
- DSA-5285
- DSA-5285
Modified: 2024-11-21
CVE-2022-24792
PJSIP is a free and open source multimedia communication library written in C. A denial-of-service vulnerability affects applications on a 32-bit systems that use PJSIP versions 2.12 and prior to play/read invalid WAV files. The vulnerability occurs when reading WAV file data chunks with length greater than 31-bit integers. The vulnerability does not affect 64-bit apps and should not affect apps that only plays trusted WAV files. A patch is available on the `master` branch of the `pjsip/project` GitHub repository. As a workaround, apps can reject a WAV file received from an unknown source or validate the file first.
- https://github.com/pjsip/pjproject/commit/947bc1ee6d05be10204b918df75a503415fd3213
- https://github.com/pjsip/pjproject/commit/947bc1ee6d05be10204b918df75a503415fd3213
- https://github.com/pjsip/pjproject/security/advisories/GHSA-rwgw-vwxg-q799
- https://github.com/pjsip/pjproject/security/advisories/GHSA-rwgw-vwxg-q799
- [debian-lts-announce] 20220531 [SECURITY] [DLA 3036-1] pjproject security update
- [debian-lts-announce] 20220531 [SECURITY] [DLA 3036-1] pjproject security update
- [debian-lts-announce] 20221117 [SECURITY] [DLA 3194-1] asterisk security update
- [debian-lts-announce] 20221117 [SECURITY] [DLA 3194-1] asterisk security update
- GLSA-202210-37
- GLSA-202210-37
- DSA-5285
- DSA-5285
Modified: 2024-11-21
CVE-2022-31031
PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In versions prior to and including 2.12.1 a stack buffer overflow vulnerability affects PJSIP users that use STUN in their applications, either by: setting a STUN server in their account/media config in PJSUA/PJSUA2 level, or directly using `pjlib-util/stun_simple` API. A patch is available in commit 450baca which should be included in the next release. There are no known workarounds for this issue.
- https://github.com/pjsip/pjproject/commit/450baca94f475345542c6953832650c390889202
- https://github.com/pjsip/pjproject/commit/450baca94f475345542c6953832650c390889202
- https://github.com/pjsip/pjproject/security/advisories/GHSA-26j7-ww69-c4qj
- https://github.com/pjsip/pjproject/security/advisories/GHSA-26j7-ww69-c4qj
- [debian-lts-announce] 20230222 [SECURITY] [DLA 3335-1] asterisk security update
- [debian-lts-announce] 20230222 [SECURITY] [DLA 3335-1] asterisk security update
- [debian-lts-announce] 20230829 [SECURITY] [DLA 3549-1] ring security update
- [debian-lts-announce] 20230829 [SECURITY] [DLA 3549-1] ring security update
- GLSA-202210-37
- GLSA-202210-37
- DSA-5358
- DSA-5358
Modified: 2024-11-21
CVE-2023-27585
PJSIP is a free and open source multimedia communication library written in C. A buffer overflow vulnerability in versions 2.13 and prior affects applications that use PJSIP DNS resolver. It doesn't affect PJSIP users who do not utilise PJSIP DNS resolver. This vulnerability is related to CVE-2022-24793. The difference is that this issue is in parsing the query record `parse_query()`, while the issue in CVE-2022-24793 is in `parse_rr()`. A patch is available as commit `d1c5e4d` in the `master` branch. A workaround is to disable DNS resolution in PJSIP config (by setting `nameserver_count` to zero) or use an external resolver implementation instead.
- https://github.com/pjsip/pjproject/commit/d1c5e4da5bae7f220bc30719888bb389c905c0c5
- https://github.com/pjsip/pjproject/commit/d1c5e4da5bae7f220bc30719888bb389c905c0c5
- https://github.com/pjsip/pjproject/security/advisories/GHSA-p6g5-v97c-w5q4
- https://github.com/pjsip/pjproject/security/advisories/GHSA-p6g5-v97c-w5q4
- https://github.com/pjsip/pjproject/security/advisories/GHSA-q9cp-8wcq-7pfr
- https://github.com/pjsip/pjproject/security/advisories/GHSA-q9cp-8wcq-7pfr
- [debian-lts-announce] 20230418 [SECURITY] [DLA 3394-1] asterisk security update
- [debian-lts-announce] 20230418 [SECURITY] [DLA 3394-1] asterisk security update
- [debian-lts-announce] 20230829 [SECURITY] [DLA 3549-1] ring security update
- [debian-lts-announce] 20230829 [SECURITY] [DLA 3549-1] ring security update
- DSA-5438
- DSA-5438
- https://www.pjsip.org/pjlib-util/docs/html/group__PJ__DNS__RESOLVER.htm
- https://www.pjsip.org/pjlib-util/docs/html/group__PJ__DNS__RESOLVER.htm
Modified: 2025-02-13
CVE-2023-38703
PJSIP is a free and open source multimedia communication library written in C with high level API in C, C++, Java, C#, and Python languages. SRTP is a higher level media transport which is stacked upon a lower level media transport such as UDP and ICE. Currently a higher level transport is not synchronized with its lower level transport that may introduce use-after-free issue. This vulnerability affects applications that have SRTP capability (`PJMEDIA_HAS_SRTP` is set) and use underlying media transport other than UDP. This vulnerability’s impact may range from unexpected application termination to control flow hijack/memory corruption. The patch is available as a commit in the master branch.
- https://github.com/pjsip/pjproject/commit/6dc9b8c181aff39845f02b4626e0812820d4ef0d
- https://github.com/pjsip/pjproject/commit/6dc9b8c181aff39845f02b4626e0812820d4ef0d
- https://github.com/pjsip/pjproject/security/advisories/GHSA-f76w-fh7c-pc66
- https://github.com/pjsip/pjproject/security/advisories/GHSA-f76w-fh7c-pc66
- https://lists.debian.org/debian-lts-announce/2023/12/msg00019.html
- https://lists.debian.org/debian-lts-announce/2023/12/msg00019.html
Closed vulnerabilities
BDU:2024-07683
Уязвимость системы управления базами данных MongoDB, существующая из-за проблемы с управлением процессом, позволяющая нарушителю загрузить произвольные библиотеки и получить полный контроль над приложением
Modified: 2024-10-31
CVE-2024-8013
A bug in query analysis of certain complex self-referential $lookup subpipelines may result in literal values in expressions for encrypted fields to be sent to the server as plaintext instead of ciphertext. Should this occur, no documents would be returned or written. This issue affects mongocryptd binary (v5.0 versions prior to 5.0.29, v6.0 versions prior to 6.0.17, v7.0 versions prior to 7.0.12 and v7.3 versions prior to 7.3.4) and mongo_crypt_v1.so shared libraries (v6.0 versions prior to 6.0.17, v7.0 versions prior to 7.0.12 and v7.3 versions prior to 7.3.4) released alongside MongoDB Enterprise Server versions.
Modified: 2024-08-30
CVE-2024-8207
In certain highly specific configurations of the host system and MongoDB server binary installation on Linux Operating Systems, it may be possible for a unintended actor with host-level access to cause the MongoDB Server binary to load unintended actor-controlled shared libraries when the server binary is started, potentially resulting in the unintended actor gaining full control over the MongoDB server process. This issue affects MongoDB Server v5.0 versions prior to 5.0.14 and MongoDB Server v6.0 versions prior to 6.0.3. Required Configuration: Only environments with Linux as the underlying operating system is affected by this issue
Closed vulnerabilities
BDU:2024-08901
Уязвимость системы управления базами данных MongoDB, связанная с неправильной проверкой согласованности во входных данных, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-10-31
CVE-2024-8013
A bug in query analysis of certain complex self-referential $lookup subpipelines may result in literal values in expressions for encrypted fields to be sent to the server as plaintext instead of ciphertext. Should this occur, no documents would be returned or written. This issue affects mongocryptd binary (v5.0 versions prior to 5.0.29, v6.0 versions prior to 6.0.17, v7.0 versions prior to 7.0.12 and v7.3 versions prior to 7.3.4) and mongo_crypt_v1.so shared libraries (v6.0 versions prior to 6.0.17, v7.0 versions prior to 7.0.12 and v7.3 versions prior to 7.3.4) released alongside MongoDB Enterprise Server versions.
Modified: 2024-11-07
CVE-2024-8305
prepareUnique index may cause secondaries to crash due to incorrect enforcement of index constraints on secondaries, where in extreme cases may cause multiple secondaries crashing leading to no primaries. This issue affects MongoDB Server v6.0 versions prior to 6.0.17, MongoDB Server v7.0 versions prior to 7.0.13 and MongoDB Server v7.3 versions prior to 7.3.4