PJSIP is a free and open source multimedia communication library written in C. Versions 2.12 and prior contain a stack buffer overflow vulnerability that affects PJSUA2 users or users that call the API `pjmedia_sdp_print(), pjmedia_sdp_media_print()`. Applications that do not use PJSUA2 and do not directly call `pjmedia_sdp_print()` or `pjmedia_sdp_media_print()` should not be affected. A patch is available on the `master` branch of the `pjsip/pjproject` GitHub repository. There are currently no known workarounds. https://github.com/pjsip/pjproject/commit/560a1346f87aabe126509bb24930106dea292b00 https://github.com/pjsip/pjproject/security/advisories/GHSA-f5qg-pqcg-765m
Created pjproject tracking bugs for this issue: Affects: epel-all [bug 2242356] Affects: fedora-all [bug 2242357]
This CVE Bugzilla entry is for community support informational purposes only as it does not affect a package in a commercially supported Red Hat product. Refer to the dependent bugs for status of those individual community products.