FS#38422 - [libsrtp] security patch for CVE-2013-2139
Attached to Project:
Arch Linux
Opened by RbN (RbN) - Wednesday, 08 January 2014, 21:36 GMT
Last edited by Eric Belanger (Snowman) - Thursday, 06 February 2014, 23:19 GMT
Opened by RbN (RbN) - Wednesday, 08 January 2014, 21:36 GMT
Last edited by Eric Belanger (Snowman) - Thursday, 06 February 2014, 23:19 GMT
|
Details
Description(RedHat Bugzilla [0]):
"A buffer overflow flaw was reported [1] in libsrtp, Cisco's reference implementation of the Secure Real-time Transport Protocol (SRTP), in how the crypto_policy_set_from_profile_for_rtp() function applies cryptographic profiles to an srtp_policy. This could allow for a crash of a client linked against libsrtp (like asterisk or linphone)." Resolution: apply patch of the pull request [1] Ressources: [0] https://bugzilla.redhat.com/show_bug.cgi?id=970697 [1] https://github.com/cisco/libsrtp/pull/27 |
This task depends upon
Closed by Eric Belanger (Snowman)
Thursday, 06 February 2014, 23:19 GMT
Reason for closing: Fixed
Additional comments about closing: libsrtp-15.1c9bd90-3
Thursday, 06 February 2014, 23:19 GMT
Reason for closing: Fixed
Additional comments about closing: libsrtp-15.1c9bd90-3