Version in base suite: 1.12.11+20110422.1-2.1 Version in overlay suite: 1.12.11+20110422.1-2.1+deb11u1 Base version: sofia-sip_1.12.11+20110422.1-2.1+deb11u1 Target version: sofia-sip_1.12.11+20110422.1-2.1+deb11u2 Base file: /srv/ftp-master.debian.org/ftp/pool/main/s/sofia-sip/sofia-sip_1.12.11+20110422.1-2.1+deb11u1.dsc Target file: /srv/ftp-master.debian.org/policy/pool/main/s/sofia-sip/sofia-sip_1.12.11+20110422.1-2.1+deb11u2.dsc debian/changelog | 6 ++++++ libsofia-sip-ua/stun/stun_common.c | 9 +++++++++ 2 files changed, 15 insertions(+) diff -u sofia-sip-1.12.11+20110422.1/debian/changelog sofia-sip-1.12.11+20110422.1/debian/changelog --- sofia-sip-1.12.11+20110422.1/debian/changelog +++ sofia-sip-1.12.11+20110422.1/debian/changelog @@ -1,3 +1,9 @@ +sofia-sip (1.12.11+20110422.1-2.1+deb11u2) bullseye-security; urgency=medium + + * CVE-2023-32307 (Closes: #1036847) + + -- Moritz Mühlenhoff Sun, 11 Jun 2023 17:15:07 +0200 + sofia-sip (1.12.11+20110422.1-2.1+deb11u1) bullseye-security; urgency=medium * Apply patches to fix reported CVEs. diff -u sofia-sip-1.12.11+20110422.1/libsofia-sip-ua/stun/stun_common.c sofia-sip-1.12.11+20110422.1/libsofia-sip-ua/stun/stun_common.c --- sofia-sip-1.12.11+20110422.1/libsofia-sip-ua/stun/stun_common.c +++ sofia-sip-1.12.11+20110422.1/libsofia-sip-ua/stun/stun_common.c @@ -250,6 +250,10 @@ uint32_t tmp; stun_attr_errorcode_t *error; + if (len < 4) { + return -1; + } + memcpy(&tmp, p, sizeof(uint32_t)); tmp = ntohl(tmp); error = (stun_attr_errorcode_t *) malloc(sizeof(*error)); @@ -271,6 +275,11 @@ { uint32_t tmp; stun_attr_changerequest_t *cr; + + if (len < 4) { + return -1; + } + cr = (stun_attr_changerequest_t *) malloc(sizeof(*cr)); memcpy(&tmp, p, sizeof(uint32_t)); cr->value = ntohl(tmp);