Mageia 2021-0337: pjproject security update
Summary
Currently, PJSIP transport can be reused if they have the same IP address
+ port + protocol. However, this is insufficient for secure transport since
it lacks remote hostname authentication. The vulnerability allows for an
insecure interaction without user awareness. It affects users who need access
to connections to different destinations that translate to the same address,
and allows man-in-the-middle attack if attacker can route a connection to
another destination such as in the case of DNS spoofing (CVE-2020-15260).
An issue has been found in pjproject. Due to bad handling of two consecutive
crafted answers to an INVITE, the attacker is able to crash the server
resulting in a denial of service (CVE-2021-21375).
References
- https://bugs.mageia.org/show_bug.cgi?id=28998
- https://github.com/pjsip/pjproject/security/advisories/GHSA-8hcp-hm38-mfph
- https://github.com/pjsip/pjproject/security/advisories/GHSA-hvq6-f89p-frvp
- https://www.debian.org/lts/security/2021/dla-2636
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15260
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21375
Resolution
MGASA-2021-0337 - Updated pjproject packages fix security vulnerabilities
SRPMS
- 8/core/pjproject-2.10-5.2.mga8