Bug 2441242 (CVE-2026-26967) - CVE-2026-26967 pjsip: PJSIP: Arbitrary code execution via H.264 unpacketizer heap-based buffer overflow
Summary: CVE-2026-26967 pjsip: PJSIP: Arbitrary code execution via H.264 unpacketizer ...
Keywords:
Status: NEW
Alias: CVE-2026-26967
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On: 2441255 2441256
Blocks:
TreeView+ depends on / blocked
 
Reported: 2026-02-20 01:01 UTC by OSIDB Bzimport
Modified: 2026-02-20 02:16 UTC (History)
0 users

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2026-02-20 01:01:25 UTC
PJSIP is a free and open source multimedia communication library written in C. In versions 2.16 and below, there is a critical Heap-based Buffer Overflow vulnerability in PJSIP's H.264 unpacketizer. The bug occurs when processing malformed SRTP packets, where the unpacketizer reads a 2-byte NAL unit size field without validating that both bytes are within the payload buffer bounds. The vulnerability affects applications that receive video using H.264. A patch is available at https://github.com/pjsip/pjproject/commit/f821c214e52b11bae11e4cd3c7f0864538fb5491.


Note You need to log in before you can comment on or make changes to this bug.