Updated pjproject packages fix security vulnerabilities
Publication date: 10 Jul 2021Modification date: 10 Jul 2021
Type: security
Affected Mageia releases : 8
CVE: CVE-2020-15260 , CVE-2021-21375
Description
Currently, PJSIP transport can be reused if they have the same IP address + port + protocol. However, this is insufficient for secure transport since it lacks remote hostname authentication. The vulnerability allows for an insecure interaction without user awareness. It affects users who need access to connections to different destinations that translate to the same address, and allows man-in-the-middle attack if attacker can route a connection to another destination such as in the case of DNS spoofing (CVE-2020-15260). An issue has been found in pjproject. Due to bad handling of two consecutive crafted answers to an INVITE, the attacker is able to crash the server resulting in a denial of service (CVE-2021-21375).
References
- https://bugs.mageia.org/show_bug.cgi?id=28998
- https://github.com/pjsip/pjproject/security/advisories/GHSA-8hcp-hm38-mfph
- https://github.com/pjsip/pjproject/security/advisories/GHSA-hvq6-f89p-frvp
- https://www.debian.org/lts/security/2021/dla-2636
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15260
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21375
SRPMS
8/core
- pjproject-2.10-5.2.mga8