A buffer overflow flaw was reported [1] in libsrtp, Cisco's reference implementation of the Secure Real-time Transport Protocol (SRTP), in how the crypto_policy_set_from_profile_for_rtp() function applies cryptographic profiles to an srtp_policy. This could allow for a crash of a client linked against libsrtp (like asterisk or linphone). A pull request in git [2] has a patch to correct this issue. [1] http://seclists.org/fulldisclosure/2013/Jun/10 [2] https://github.com/cisco/libsrtp/pull/26
Created libsrtp tracking bugs for this issue Affects: fedora-all [bug 970700] Affects: epel-6 [bug 970701]
Actually, this is the correct pull request: https://github.com/cisco/libsrtp/pull/27 The other one is noted as being incorrect.
This was assigned CVE-2013-2139: http://www.openwall.com/lists/oss-security/2013/06/04/8
libsrtp-1.4.4-9.20101004cvs.fc18 has been pushed to the Fedora 18 stable repository. If problems still persist, please make note of it in this bug report.
libsrtp-1.4.4-9.20101004cvs.fc19 has been pushed to the Fedora 19 stable repository. If problems still persist, please make note of it in this bug report.
libsrtp-1.4.4-9.20101004cvs.fc20 has been pushed to the Fedora 20 stable repository. If problems still persist, please make note of it in this bug report.
libsrtp-1.4.4-10.20101004cvs.el6 has been pushed to the Fedora EPEL 6 stable repository. If problems still persist, please make note of it in this bug report.
Statement: Red Hat Product Security has rated this issue as having Low security impact. This issue is not currently planned to be addressed in future updates. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2020:3873 https://access.redhat.com/errata/RHSA-2020:3873