Bug 2067032 (CVE-2022-24764) - CVE-2022-24764 fedora: PJSIP contains a stack buffer overflow vulnerability that affects PJSUA2 users
Summary: CVE-2022-24764 fedora: PJSIP contains a stack buffer overflow vulnerability t...
Keywords:
Status: NEW
Alias: CVE-2022-24764
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Nobody
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2022-03-23 05:57 UTC by Rohit Keshri
Modified: 2023-07-07 08:34 UTC (History)
1 user (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description Rohit Keshri 2022-03-23 05:57:06 UTC
PJSIP is a free and open source multimedia communication library written in C. Versions 2.12 and prior contain a stack buffer overflow vulnerability that affects PJSUA2 users or users that call the API `pjmedia_sdp_print(), pjmedia_sdp_media_print()`. Applications that do not use PJSUA2 and do not directly call `pjmedia_sdp_print()` or `pjmedia_sdp_media_print()` should not be affected. A patch is available on the `master` branch of the `pjsip/pjproject` GitHub repository. There are currently no known workarounds.

https://github.com/pjsip/pjproject/commit/560a1346f87aabe126509bb24930106dea292b00
https://github.com/pjsip/pjproject/security/advisories/GHSA-f5qg-pqcg-765m


Note You need to log in before you can comment on or make changes to this bug.