Updated libosip2 packages fix security vulnerabilities
Publication date: 14 Jun 2017Modification date: 14 Jun 2017
Type: security
Affected Mageia releases : 5
CVE: CVE-2016-10324 , CVE-2016-10325 , CVE-2016-10326 , CVE-2017-7853
Description
In libosip2 in GNU oSIP 4.1.0, a malformed SIP message can lead to a heap buffer overflow in the osip_clrncpy() function defined in osipparser2/osip_port.c (CVE-2016-10324). In libosip2 in GNU oSIP 4.1.0, a malformed SIP message can lead to a heap buffer overflow in the _osip_message_to_str() function defined in osipparser2/osip_message_to_str.c, resulting in a remote DoS (CVE-2016-10325). In libosip2 in GNU oSIP 4.1.0, a malformed SIP message can lead to a heap buffer overflow in the osip_body_to_str() function defined in osipparser2/osip_body.c, resulting in a remote DoS (CVE-2016-10326). In libosip2 in GNU 5.0.0, a malformed SIP message can lead to a heap buffer overflow in the msg_osip_body_parse() function defined in osipparser2/osip_message_parse.c, resulting in a remote DoS (CVE-2017-7853).
References
- https://bugs.mageia.org/show_bug.cgi?id=20758
- https://lists.opensuse.org/opensuse-updates/2017-04/msg00109.html
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10324
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10325
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10326
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7853
SRPMS
5/core
- libosip2-5.0.0-2.mga5
- siproxd-0.8.1-14.3.mga5
- exosip-4.0.0-4.2.mga5