MGASA-2021-0337 - Updated pjproject packages fix security vulnerabilities

Publication date: 10 Jul 2021
URL: https://advisories.mageia.org/MGASA-2021-0337.html
Type: security
Affected Mageia releases: 8
CVE: CVE-2020-15260,
     CVE-2021-21375

Currently, PJSIP transport can be reused if they have the same IP address
+ port + protocol. However, this is insufficient for secure transport since
it lacks remote hostname authentication. The vulnerability allows for an
insecure interaction without user awareness. It affects users who need access
to connections to different destinations that translate to the same address,
and allows man-in-the-middle attack if attacker can route a connection to
another destination such as in the case of DNS spoofing (CVE-2020-15260).

An issue has been found in pjproject. Due to bad handling of two consecutive
crafted answers to an INVITE, the attacker is able to crash the server
resulting in a denial of service (CVE-2021-21375).

References:
- https://bugs.mageia.org/show_bug.cgi?id=28998
- https://github.com/pjsip/pjproject/security/advisories/GHSA-8hcp-hm38-mfph
- https://github.com/pjsip/pjproject/security/advisories/GHSA-hvq6-f89p-frvp
- https://www.debian.org/lts/security/2021/dla-2636
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15260
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21375

SRPMS:
- 8/core/pjproject-2.10-5.2.mga8