[BUG]Vulnerable shared libraries might make azure-communication-calling vulnerable. Can you help upgrade to patch versions? #1090
Labels
Communication - Calling Server
customer-reported
Issues that are reported by GitHub users external to the Azure organization.
needs-team-attention
Workflow: This issue needs attention from Azure service team or SDK team
Hi, @anuchandy , @vcolin7, I'd like to report a vulnerability issue in com.azure.android:azure-communication-calling:2.1.0-beta.1.
Issue Description
com.azure.android:azure-communication-calling:2.1.0-beta.1 directly or transitively depends on 23 C libraries (.so) cross many platforms(such as x86-64, x86, arm64, armhf). However, I noticed that some C libraries are vulnerable, containing the following CVEs:
llibskypert.so
from C project openssl(version:1.1.1i) exposed 2 vulnerabilities:CVE-2021-3711, CVE-2021-3712
libxeengine.so
from C project libpng(version:1.6.16) exposed 4 vulnerabilities:CVE-2017-12652, CVE-2015-8472, CVE-2016-10087, CVE-2016-3751
Furthermore, the vulnerable methods in the vulnerable shared libraries can be actually invoked by Java code. For instance, following call chains can reach the vulnerable method(C code) EC_GROUP_new_from_ecparameters() in file
crypto/ec/ec_asn1.c
reported by CVE-2021-3712.Suggested Vulnerability Patch Versions
openssl has fixed the vulnerabilities in versions >=1.1.1l
libpng has fixed the vulnerabilities in versions >=1.6.37
Java build tools cannot report vulnerable C libraries, which may induce potential security issues to many downstream Java projects.
Could you please upgrade the above shared libraries to their patch versions?
Thanks for your help~
Best regards,
Helen Parr
The text was updated successfully, but these errors were encountered: