[Buildroot] [git commit] package/freeswitch: security bump version to 1.10.7

Peter Korsgaard peter at korsgaard.com
Thu Jan 27 07:12:30 UTC 2022


>>>>> "Peter" == Peter Korsgaard <peter at korsgaard.com> writes:

 > commit: https://git.buildroot.net/buildroot/commit/?id=829777c1c9a0d40c8c5753e6fe86acfc78edfc92
 > branch: https://git.buildroot.net/buildroot/commit/?id=refs/heads/master

 > Fixes the following security issues:

 > - CVE-2021-41105: FreeSWITCH susceptible to Denial of Service via invalid
 >   SRTP packets

 >   When handling SRTP calls, FreeSWITCH is susceptible to a DoS where calls
 >   can be terminated by remote attackers.  This attack can be done
 >   continuously, thus denying encrypted calls during the attack.

 >   https://github.com/signalwire/freeswitch/security/advisories/GHSA-jh42-prph-gp36

 > - CVE-2021-41157: FreeSWITCH does not authenticate SIP SUBSCRIBE requests by default

 >   By default, SIP requests of the type SUBSCRIBE are not authenticated in
 >   the affected versions of FreeSWITCH.

 >   https://github.com/signalwire/freeswitch/security/advisories/GHSA-g7xg-7c54-rmpj

 > - CVE-2021-37624: FreeSWITCH does not authenticate SIP MESSAGE requests,
 >   leading to spam and message spoofing

 >   By default, SIP requests of the type MESSAGE (RFC 3428) are not
 >   authenticated in the affected versions of FreeSWITCH.  MESSAGE requests
 >   are relayed to SIP user agents registered with the FreeSWITCH server
 >   without requiring any authentication.  Although this behaviour can be
 >   changed by setting the auth-messages parameter to true, it is not the
 >   default setting.

 >   https://github.com/signalwire/freeswitch/security/advisories/GHSA-mjcm-q9h8-9xv3

 > - CVE-2021-41145: FreeSWITCH susceptible to Denial of Service via SIP flooding

 >   When flooding FreeSWITCH with SIP messages, it was observed that after a
 >   number of seconds the process was killed by the operating system due to
 >   memory exhaustion

 >   https://github.com/signalwire/freeswitch/security/advisories/GHSA-jvpq-23v4-gp3m

 > - CVE-2021-41158: FreeSWITCH vulnerable to SIP digest leak for configured gateways

 >   An attacker can perform a SIP digest leak attack against FreeSWITCH and
 >   receive the challenge response of a gateway configured on the FreeSWITCH
 >   server.  This is done by challenging FreeSWITCH's SIP requests with the
 >   realm set to that of the gateway, thus forcing FreeSWITCH to respond with
 >   the challenge response which is based on the password of that targeted
 >   gateway.

 >   https://github.com/signalwire/freeswitch/security/advisories/GHSA-3v3f-99mv-qvj4

 > Release notes:
 > https://github.com/signalwire/freeswitch/releases/tag/v1.10.7

 > Removed patch, upstream applied a different fix:
 > https://github.com/signalwire/freeswitch/commit/e9fde845de5b8885282bf5e70f4be3645c5c3e9b

 > Added optional dependency to libks, needed due to upstream commit
 > https://github.com/signalwire/freeswitch/commit/ed9851666615d283effb76edc7028cc08b07eff9

 > Added upstream patches to fix build errors.

 > Signed-off-by: Bernd Kuhls <bernd.kuhls at t-online.de>
 > [Peter: mention security fixes]
 > Signed-off-by: Peter Korsgaard <peter at korsgaard.com>

Committed to 2021.02.x and 2021.11.x, thanks.

-- 
Bye, Peter Korsgaard



More information about the buildroot mailing list