Name | CVE-2022-31031 |
Description | PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In versions prior to and including 2.12.1 a stack buffer overflow vulnerability affects PJSIP users that use STUN in their applications, either by: setting a STUN server in their account/media config in PJSUA/PJSUA2 level, or directly using `pjlib-util/stun_simple` API. A patch is available in commit 450baca which should be included in the next release. There are no known workarounds for this issue. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
References | DLA-3335-1, DLA-3549-1, DLA-3887-1, DSA-5358-1 |
Debian Bugs | 1017004, 1017005 |
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|---|---|---|
asterisk (PTS) | bullseye | 1:16.28.0~dfsg-0+deb11u4 | fixed |
bullseye (security) | 1:16.28.0~dfsg-0+deb11u5 | fixed | |
sid | 1:22.0.0~dfsg+~cs6.14.60671435-1 | fixed | |
ring (PTS) | bullseye | 20210112.2.b757bac~ds1-1 | vulnerable |
bullseye (security) | 20210112.2.b757bac~ds1-1+deb11u1 | fixed | |
bookworm | 20230206.0~ds2-1.1 | fixed | |
sid | 20231201.0~ds1-1 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
asterisk | source | buster | 1:16.28.0~dfsg-0+deb10u2 | DLA-3335-1 | ||
asterisk | source | bullseye | 1:16.28.0~dfsg-0+deb11u2 | DSA-5358-1 | ||
asterisk | source | (unstable) | 1:20.0.1~dfsg+~cs6.12.40431414-1 | 1017004 | ||
pjproject | source | (unstable) | (unfixed) | |||
ring | source | buster | 20190215.1.f152c98~ds1-1+deb10u2 | DLA-3549-1 | ||
ring | source | bullseye | 20210112.2.b757bac~ds1-1+deb11u1 | DLA-3887-1 | ||
ring | source | (unstable) | 20230206.0~ds1-1 | 1017005 |
https://github.com/pjsip/pjproject/security/advisories/GHSA-26j7-ww69-c4qj
https://github.com/pjsip/pjproject/commit/450baca94f475345542c6953832650c390889202