Bug 2467812 (CVE-2026-42225) - CVE-2026-42225 pjsip: pjproject: GnuTLS backend silently skips certificate chain verification when verify_peer is false
Summary: CVE-2026-42225 pjsip: pjproject: GnuTLS backend silently skips certificate ch...
Keywords:
Status: NEW
Alias: CVE-2026-42225
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 2468336 2468337 2468338 2468339
Blocks:
TreeView+ depends on / blocked
 
Reported: 2026-05-07 20:01 UTC by OSIDB Bzimport
Modified: 2026-05-08 19:29 UTC (History)
0 users

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2026-05-07 20:01:24 UTC
PJSIP is a free and open source multimedia communication library written in C. Prior to version 2.17, on GnuTLS builds, the SIP TLS transport (sip_transport_tls) can accept connections with invalid or untrusted certificates even when the application explicitly enables certificate verification via verify_server = PJ_TRUE or verify_client = PJ_TRUE. This issue has been patched in version 2.17.


Note You need to log in before you can comment on or make changes to this bug.