openSUSE-SU-2024:0106-1: moderate: Security update for sngrep
openSUSE Security Update: Security update for sngrep ______________________________________________________________________________ Announcement ID: openSUSE-SU-2024:0106-1 Rating: moderate References: Cross-References: CVE-2024-3119 CVE-2024-3120 Affected Products: openSUSE Backports SLE-15-SP5 ______________________________________________________________________________ An update that fixes two vulnerabilities is now available. Description: This update for sngrep fixes the following issues: - Update to version 1.8.1 * Fix CVE-2024-3119: sngrep: buffer overflow due to improper handling of 'Call-ID' and 'X-Call-ID' SIP headers. * Fix CVE-2024-3120: sngrep: stack-buffer overflow due to inadequate bounds checking when copying 'Content-Length' and 'Warning' headers into fixed-size buffers. - Update to versino 1.8.0 * fix typo in message, thanks to lintian. * fix compiler warnings about unused variables. * Fixed a typo in comment line in filter.c * Redefine usage of POSIX signals. * Support for building sngrep using CMake added. - Update to version 1.7.0 * save: add option --text to save captured data to plain text * capture: fix memory overflows while parsing IP headers * hep: fix hep listener enabled in offline mode * core: stop sngrep when parent process has ended * ssl: fix decrypt with AES256 GCM SHA384 cipher Patch Instructions: To install this openSUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - openSUSE Backports SLE-15-SP5: zypper in -t patch openSUSE-2024-106=1 Package List: - openSUSE Backports SLE-15-SP5 (aarch64 i586 ppc64le s390x x86_64): sngrep-1.8.1-bp155.2.3.1 References: https://www.suse.com/security/cve/CVE-2024-3119.html https://www.suse.com/security/cve/CVE-2024-3120.html
participants (1)
-
opensuse-security@opensuse.org