Bug 1301202
Summary: | libsrtp global-buffer-overflow | ||
---|---|---|---|
Product: | Red Hat Enterprise Linux 7 | Reporter: | Badalyan Vyacheslav <v.badalyan> |
Component: | libsrtp | Assignee: | Jan Grulich <jgrulich> |
Status: | CLOSED ERRATA | QA Contact: | qe-baseos-daemons |
Severity: | high | Docs Contact: | |
Priority: | unspecified | ||
Version: | 7.4 | CC: | mboisver, tpelka, tpopela, xrobau |
Target Milestone: | rc | ||
Target Release: | --- | ||
Hardware: | x86_64 | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | libsrtp-1.4.4-11.20101004cvs.el7 | Doc Type: | If docs needed, set a value |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2020-12-10 14:44:53 UTC | Type: | Bug |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: |
Description
Badalyan Vyacheslav
2016-01-22 21:05:22 UTC
libsrtp-1.5.0-3.fc23 also affected! [root@vm-asterisk04t pbs.vbadalyan]# rpm -qa | grep srtp libsrtp-1.5.0-3.fc23.x86_64 libsrtp-devel-1.5.0-3.fc23.x86_64 ================================================================ ==9660==ERROR: AddressSanitizer: global-buffer-overflow on address 0x7f5af10dad7e at pc 0x7f5af0ec6d7f bp 0x7ffda4a4ddc0 sp 0x7ffda4a4ddb0 READ of size 1 at 0x7f5af10dad7e thread T0 #0 0x7f5af0ec6d7e in v128_copy_octet_string ../../srtp/crypto/math/datatypes.c:246 #1 0x7f5af0ebfc97 in aes_icm_context_init ../../srtp/crypto/cipher/aes_icm.c:172 #2 0x7f5af0eb5e04 in cipher_type_self_test ../../srtp/crypto/cipher/cipher.c:120 #3 0x7f5af0ec98b0 in crypto_kernel_load_cipher_type ../../srtp/crypto/kernel/crypto_kernel.c:310 #4 0x7f5af0ec9d60 in crypto_kernel_init ../../srtp/crypto/kernel/crypto_kernel.c:154 #5 0x7f5af0eccfa8 in srtp_init ../../srtp/srtp/srtp.c:1093 #6 0x7f5aedd0709d in res_srtp_init /root/asterisk-13.7.0/res/res_srtp.c:562 #7 0x7f5aedd07143 in load_module /root/asterisk-13.7.0/res/res_srtp.c:585 #8 0x6613f5 in start_resource /root/asterisk-13.7.0/main/loader.c:1021 #9 0x662c78 in load_resource_list /root/asterisk-13.7.0/main/loader.c:1219 #10 0x663978 in load_modules /root/asterisk-13.7.0/main/loader.c:1367 #11 0x492049 in asterisk_daemon /root/asterisk-13.7.0/main/asterisk.c:4676 #12 0x491006 in main /root/asterisk-13.7.0/main/asterisk.c:4282 #13 0x7f5af8cf3b14 in __libc_start_main (/lib64/libc.so.6+0x21b14) #14 0x432778 (/usr/sbin/asterisk+0x432778) libsrtp-1.5.0-3.fc23 does not have this issue. I've just found this bug after it being reported as a Remote DoS on the Asterisk and FreePBX projects. Cite: https://issues.asterisk.org/jira/browse/ASTERISK-27155 Cite: https://issues.freepbx.org/browse/FREEPBX-15526 The version of LibSRTP that is distributed with RHEL 7 is vulnerable to many security issues, and it should be increased to (at least) 1.5.4. There are no backward compatibility issues. |