vulnerability
Ubuntu: USN-6422-1 (CVE-2022-31031): Ring vulnerabilities
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
7 | (AV:N/AC:M/Au:N/C:P/I:P/A:P) | Jun 9, 2022 | Oct 10, 2023 | Jan 23, 2025 |
Severity
7
CVSS
(AV:N/AC:M/Au:N/C:P/I:P/A:P)
Published
Jun 9, 2022
Added
Oct 10, 2023
Modified
Jan 23, 2025
Description
PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In versions prior to and including 2.12.1 a stack buffer overflow vulnerability affects PJSIP users that use STUN in their applications, either by: setting a STUN server in their account/media config in PJSUA/PJSUA2 level, or directly using `pjlib-util/stun_simple` API. A patch is available in commit 450baca which should be included in the next release. There are no known workarounds for this issue.
Solution(s)
ubuntu-pro-upgrade-jamiubuntu-pro-upgrade-jami-daemonubuntu-pro-upgrade-ringubuntu-pro-upgrade-ring-daemon

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.