janus: CVE-2020-13898 CVE-2020-13899 CVE-2020-13900 CVE-2020-13901

Related Vulnerabilities: CVE-2020-13898   CVE-2020-13899   CVE-2020-13900   CVE-2020-13901  

Debian Bug report logs - #962680
janus: CVE-2020-13898 CVE-2020-13899 CVE-2020-13900 CVE-2020-13901

version graph

Reported by: Salvatore Bonaccorso <carnil@debian.org>

Date: Thu, 11 Jun 2020 20:54:02 UTC

Severity: grave

Tags: security, upstream

Found in version janus/0.10.0-1

Fixed in version janus/0.10.1-1

Done: Jonas Smedegaard <dr@jones.dk>

Forwarded to https://github.com/meetecho/janus-gateway/pull/2214

Reply or subscribe to this bug.

Toggle useless messages

View this report as an mbox folder, status mbox, maintainer mbox


Report forwarded to debian-bugs-dist@lists.debian.org, carnil@debian.org, team@security.debian.org, team@security.debian.org, Debian VoIP Team <pkg-voip-maintainers@lists.alioth.debian.org>:
Bug#962680; Package src:janus. (Thu, 11 Jun 2020 20:54:04 GMT) (full text, mbox, link).


Acknowledgement sent to Salvatore Bonaccorso <carnil@debian.org>:
New Bug report received and forwarded. Copy sent to carnil@debian.org, team@security.debian.org, team@security.debian.org, Debian VoIP Team <pkg-voip-maintainers@lists.alioth.debian.org>. (Thu, 11 Jun 2020 20:54:04 GMT) (full text, mbox, link).


Message #5 received at submit@bugs.debian.org (full text, mbox, reply):

From: Salvatore Bonaccorso <carnil@debian.org>
To: Debian Bug Tracking System <submit@bugs.debian.org>
Subject: janus: CVE-2020-13898 CVE-2020-13899 CVE-2020-13900 CVE-2020-13901
Date: Thu, 11 Jun 2020 22:50:50 +0200
Source: janus
Version: 0.10.0-1
Severity: grave
Tags: security upstream
Justification: user security hole
Forwarded: https://github.com/meetecho/janus-gateway/pull/2214

Hi,

The following vulnerabilities were published for janus.

CVE-2020-13898[0]:
| An issue was discovered in janus-gateway (aka Janus WebRTC Server)
| through 0.10.0. janus_sdp_process in sdp.c has a NULL pointer
| dereference.


CVE-2020-13899[1]:
| An issue was discovered in janus-gateway (aka Janus WebRTC Server)
| through 0.10.0. janus_process_incoming_request in janus.c discloses
| information from uninitialized stack memory.


CVE-2020-13900[2]:
| An issue was discovered in janus-gateway (aka Janus WebRTC Server)
| through 0.10.0. janus_sdp_preparse in sdp.c has a NULL pointer
| dereference.


CVE-2020-13901[3]:
| An issue was discovered in janus-gateway (aka Janus WebRTC Server)
| through 0.10.0. janus_sdp_merge in sdp.c has a stack-based buffer
| overflow.


If you fix the vulnerabilities please also make sure to include the
CVE (Common Vulnerabilities & Exposures) ids in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2020-13898
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13898
[1] https://security-tracker.debian.org/tracker/CVE-2020-13899
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13899
[2] https://security-tracker.debian.org/tracker/CVE-2020-13900
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13900
[3] https://security-tracker.debian.org/tracker/CVE-2020-13901
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13901
[4] https://github.com/meetecho/janus-gateway/pull/2214

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore



Reply sent to Jonas Smedegaard <dr@jones.dk>:
You have taken responsibility. (Fri, 12 Jun 2020 08:21:12 GMT) (full text, mbox, link).


Notification sent to Salvatore Bonaccorso <carnil@debian.org>:
Bug acknowledged by developer. (Fri, 12 Jun 2020 08:21:12 GMT) (full text, mbox, link).


Message #10 received at 962680-close@bugs.debian.org (full text, mbox, reply):

From: Debian FTP Masters <ftpmaster@ftp-master.debian.org>
To: 962680-close@bugs.debian.org
Subject: Bug#962680: fixed in janus 0.10.1-1
Date: Fri, 12 Jun 2020 08:19:35 +0000
Source: janus
Source-Version: 0.10.1-1
Done: Jonas Smedegaard <dr@jones.dk>

We believe that the bug you reported is fixed in the latest version of
janus, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 962680@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Jonas Smedegaard <dr@jones.dk> (supplier of updated janus package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Fri, 12 Jun 2020 10:09:25 +0200
Source: janus
Architecture: source
Version: 0.10.1-1
Distribution: unstable
Urgency: high
Maintainer: Debian VoIP Team <pkg-voip-maintainers@lists.alioth.debian.org>
Changed-By: Jonas Smedegaard <dr@jones.dk>
Closes: 962680
Changes:
 janus (0.10.1-1) unstable; urgency=high
 .
   [ upstream ]
   * new release
     + fixes security issues in SDP code
     closes: bug#962680
     (CVE-2020-13898, CVE-2020-13899, CVE-2020-13900, CVE-2020-13901),
     thanks to Salvatore Bonaccorso
 .
   [ Jonas Smedegaard ]
   * unfuzz patches, and extend to cover e2etest
   * set urgency=high, due to CVE fix
Checksums-Sha1:
 e50a69129f43046a92fd14c46e9c40f4aaee2e5f 2787 janus_0.10.1-1.dsc
 622aeadce32f58d7f2b1180a506bb99d779b4edb 6951415 janus_0.10.1.orig.tar.gz
 224f8ad18edd7c5a08cf99f07185ea57c6ac28e4 19740 janus_0.10.1-1.debian.tar.xz
 b7124c7890a93d72e5d65c41dba7df671a56d055 17198 janus_0.10.1-1_amd64.buildinfo
Checksums-Sha256:
 2df7cf2a33bfec3a0987dbd983b8c6d2dcaca5d2415ca78d9477728aac0cecbb 2787 janus_0.10.1-1.dsc
 731760e6911908bc523815809487e51320a738f3533f267d4beb83eaa725de85 6951415 janus_0.10.1.orig.tar.gz
 e4d32282289eb0259cc6af71ccff41e7da4e7a263f9949c2b1de363a9c3c2594 19740 janus_0.10.1-1.debian.tar.xz
 9c111ff5de33b06f6c21ab257520432f43bac9e407210dc17f4e3703359dc676 17198 janus_0.10.1-1_amd64.buildinfo
Files:
 a8e79f19a5343ebfa4fa370e7b4ce750 2787 comm optional janus_0.10.1-1.dsc
 fe634b824a41dcb2089d8bed73b57853 6951415 comm optional janus_0.10.1.orig.tar.gz
 88aa11307ce6ccc4fd96aedc16e898da 19740 comm optional janus_0.10.1-1.debian.tar.xz
 7a9ea1eb39eda78b480c1a1383189aa4 17198 comm optional janus_0.10.1-1_amd64.buildinfo

-----BEGIN PGP SIGNATURE-----
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=6TWA
-----END PGP SIGNATURE-----




Send a report that this bug log contains spam.


Debian bug tracking system administrator <owner@bugs.debian.org>. Last modified: Fri Jun 12 13:40:26 2020; Machine Name: beach

Debian Bug tracking system

Debbugs is free software and licensed under the terms of the GNU Public License version 2. The current version can be obtained from https://bugs.debian.org/debbugs-source/.

Copyright © 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson, 2005-2017 Don Armstrong, and many other contributors.