Bug 2449569 (CVE-2026-33069)

Summary: CVE-2026-33069 PJSIP: PJSIP: Information disclosure vulnerability in SIP message processing
Product: [Other] Security Response Reporter: OSIDB Bzimport <bzimport>
Component: vulnerabilityAssignee: Product Security DevOps Team <prodsec-dev>
Status: NEW --- QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedKeywords: Security
Target Milestone: ---   
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: ---
Doc Text:
A flaw was found in PJSIP, a multimedia communication library. A remote attacker could exploit a vulnerability in the `pjsip_multipart_parse()` function when processing incoming Session Initiation Protocol (SIP) messages. This flaw, an out-of-bounds heap read, allows for the disclosure of a small amount of sensitive information from adjacent memory, impacting applications that handle multipart SIP bodies or Session Description Protocol (SDP) content.
Story Points: ---
Clone Of: Environment:
Last Closed: Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2449705, 2449708    
Bug Blocks:    

Description OSIDB Bzimport 2026-03-20 09:03:11 UTC
PJSIP is a free and open source multimedia communication library written in C. Versions 2.16 and below have a cascading out-of-bounds heap read in pjsip_multipart_parse(). After boundary string matching, curptr is advanced past the delimiter without verifying it has not reached the buffer end. This allows 1-2 bytes of adjacent heap memory to be read. All applications that process incoming SIP messages with multipart bodies or SDP content are potentially affected. This issue is resolved in version 2.17.