Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 939159 - <net-misc/asterisk-{18.24.3,20.9.3,21.4.3}: denial of service (crash) bug
Summary: <net-misc/asterisk-{18.24.3,20.9.3,21.4.3}: denial of service (crash) bug
Status: CONFIRMED
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal normal
Assignee: Gentoo Security
URL: https://github.com/asterisk/asterisk/...
Whiteboard: B3 [glsa]
Keywords: PullRequest
Depends on: 940339
Blocks:
  Show dependency tree
 
Reported: 2024-09-06 06:17 UTC by Jaco Kroon
Modified: 2024-09-29 07:20 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Jaco Kroon 2024-09-06 06:17:44 UTC
As my one lecturer used to say ... most crashes due to malformed data can be used for code injection and execution.  This is harder on recent hardware where NX protection is properly used but still.  There are workarounds available too.

Reproducible: Always
Comment 1 Larry the Git Cow gentoo-dev 2024-09-27 05:57:01 UTC
The bug has been referenced in the following commit(s):

https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=f8939f531f32cf666ad9f07ec75a695e228f9913

commit f8939f531f32cf666ad9f07ec75a695e228f9913
Author:     Jaco Kroon <jaco@uls.co.za>
AuthorDate: 2024-09-06 06:41:18 +0000
Commit:     Eli Schwartz <eschwartz@gentoo.org>
CommitDate: 2024-09-27 05:55:57 +0000

    net-misc/asterisk: add 21.4.3, drop 21.4.2 (security)
    
    See-also: https://github.com/asterisk/asterisk/security/advisories/GHSA-v428-g3cw-7hv9
    Bug: https://bugs.gentoo.org/939159
    Signed-off-by: Jaco Kroon <jaco@uls.co.za>
    Closes: https://github.com/gentoo/gentoo/pull/38476
    Signed-off-by: Eli Schwartz <eschwartz@gentoo.org>

 net-misc/asterisk/Manifest                                           | 2 +-
 net-misc/asterisk/{asterisk-21.4.2.ebuild => asterisk-21.4.3.ebuild} | 0
 2 files changed, 1 insertion(+), 1 deletion(-)

https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=3e20fe91ef242dcf70bf3ed0bf9af684011c34b7

commit 3e20fe91ef242dcf70bf3ed0bf9af684011c34b7
Author:     Jaco Kroon <jaco@uls.co.za>
AuthorDate: 2024-09-06 06:40:14 +0000
Commit:     Eli Schwartz <eschwartz@gentoo.org>
CommitDate: 2024-09-27 05:55:57 +0000

    net-misc/asterisk: add 20.9.3, drop 20.9.2 (security)
    
    See-also: https://github.com/asterisk/asterisk/security/advisories/GHSA-v428-g3cw-7hv9
    Bug: https://bugs.gentoo.org/939159
    Signed-off-by: Jaco Kroon <jaco@uls.co.za>
    Signed-off-by: Eli Schwartz <eschwartz@gentoo.org>

 net-misc/asterisk/Manifest                                           | 2 +-
 net-misc/asterisk/{asterisk-20.9.2.ebuild => asterisk-20.9.3.ebuild} | 0
 2 files changed, 1 insertion(+), 1 deletion(-)

https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=3e58277c953cdde9bbdb321af088f9a40d946b58

commit 3e58277c953cdde9bbdb321af088f9a40d946b58
Author:     Jaco Kroon <jaco@uls.co.za>
AuthorDate: 2024-09-06 06:19:41 +0000
Commit:     Eli Schwartz <eschwartz@gentoo.org>
CommitDate: 2024-09-27 05:55:56 +0000

    net-misc/asterisk: add 18.24.3 (security)
    
    See-also: https://github.com/asterisk/asterisk/security/advisories/GHSA-v428-g3cw-7hv9
    Bug: https://bugs.gentoo.org/939159
    Signed-off-by: Jaco Kroon <jaco@uls.co.za>
    Signed-off-by: Eli Schwartz <eschwartz@gentoo.org>

 net-misc/asterisk/Manifest                |   1 +
 net-misc/asterisk/asterisk-18.24.3.ebuild | 371 ++++++++++++++++++++++++++++++
 2 files changed, 372 insertions(+)
Comment 2 Jaco Kroon 2024-09-28 12:51:35 UTC
My part is done, handing over to security team to make a call as to GLSA.

My personal opinion is that this is unlikely a remote take-over, however, it's unclear if the attacker needs to be authenticated or not in order to trigger this crash, even though the wording of the GHSA insinuates that it's only for valid endpoints (ie, authenticated users), and users who can manipulate the dialplan (trusted) and generate Originate() requests (which again, are trusted and authenticated users in the usual case).