Search for packages
Package details: pkg:deb/debian/ring@20230206.0~ds2-1.1%2Bdeb12u1
purl pkg:deb/debian/ring@20230206.0~ds2-1.1%2Bdeb12u1
Vulnerabilities affecting this package (0)
Vulnerability Summary Fixed by
This package is not known to be affected by vulnerabilities.
Vulnerabilities fixed by this package (13)
Vulnerability Summary Aliases
VCID-4b2x-qkf9-ebbv PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In PJSIP before version 2.11.1, there are a couple of issues found in the SSL socket. First, a race condition between callback and destroy, due to the accepted socket having no group lock. Second, the SSL socket parent/listener may get destroyed during handshake. Both issues were reported to happen intermittently in heavy load TLS connections. They cause a crash, resulting in a denial of service. These are fixed in version 2.11.1. CVE-2021-32686
VCID-5p64-sz1a-qugh PJSIP is a free and open source multimedia communication library written in C. A denial-of-service vulnerability affects applications on a 32-bit systems that use PJSIP versions 2.12 and prior to play/read invalid WAV files. The vulnerability occurs when reading WAV file data chunks with length greater than 31-bit integers. The vulnerability does not affect 64-bit apps and should not affect apps that only plays trusted WAV files. A patch is available on the `master` branch of the `pjsip/project` GitHub repository. As a workaround, apps can reject a WAV file received from an unknown source or validate the file first. CVE-2022-24792
VCID-79n7-nh9b-33gc Buffer overflow in PJSUA API when calling pjsua_call_dump. An attacker-controlled 'buffer' argument may cause a buffer overflow, since supplying an output buffer smaller than 128 characters may overflow the output buffer, regardless of the 'maxlen' argument supplied CVE-2021-43303
VCID-dbsm-9e6m-ubhb Read out-of-bounds in PJSUA API when calling pjsua_recorder_create. An attacker-controlled 'filename' argument may cause an out-of-bounds read when the filename is shorter than 4 characters. CVE-2021-43302
VCID-dftu-cfg3-ducw PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In affected versions if the incoming STUN message contains an ERROR-CODE attribute, the header length is not checked before performing a subtraction operation, potentially resulting in an integer underflow scenario. This issue affects all users that use STUN. A malicious actor located within the victim’s network may forge and send a specially crafted UDP (STUN) message that could remotely execute arbitrary code on the victim’s machine. Users are advised to upgrade as soon as possible. There are no known workarounds. CVE-2021-37706
VCID-eran-kpag-kqeh Stack overflow in PJSUA API when calling pjsua_player_create. An attacker-controlled 'filename' argument may cause a buffer overflow since it is copied to a fixed-size stack buffer without any size validation. CVE-2021-43299
VCID-eus2-xch4-ryb8 PJSIP is a free and open source multimedia communication library written in C. A buffer overflow vulnerability in versions 2.12 and prior affects applications that use PJSIP DNS resolution. It doesn't affect PJSIP users who utilize an external resolver. This vulnerability is related to CVE-2023-27585. The difference is that this issue is in parsing the query record `parse_rr()`, while the issue in CVE-2023-27585 is in `parse_query()`. A patch is available in the `master` branch of the `pjsip/pjproject` GitHub repository. A workaround is to disable DNS resolution in PJSIP config (by setting `nameserver_count` to zero) or use an external resolver instead. CVE-2022-24793
VCID-j2fn-agvf-3qf1 PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In version 2.11.1 and prior, there are various cases where it is possible that certain incoming RTP/RTCP packets can potentially cause out-of-bound read access. This issue affects all users that use PJMEDIA and accept incoming RTP/RTCP. A patch is available as a commit in the `master` branch. There are no known workarounds. CVE-2022-21722
VCID-k9ws-qhhf-fkef Stack overflow in PJSUA API when calling pjsua_recorder_create. An attacker-controlled 'filename' argument may cause a buffer overflow since it is copied to a fixed-size stack buffer without any size validation. CVE-2021-43300
VCID-mcy1-7jby-bbcr PJSIP is a free and open source multimedia communication library written in C. PJSIP versions 2.12 and prior do not parse incoming RTCP feedback RPSI (Reference Picture Selection Indication) packet, but any app that directly uses pjmedia_rtcp_fb_parse_rpsi() will be affected. A patch is available in the `master` branch of the `pjsip/pjproject` GitHub repository. There are currently no known workarounds. CVE-2022-24786
VCID-qhsa-mzc9-2fc2 PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In affected versions if the incoming RTCP BYE message contains a reason's length, this declared length is not checked against the actual received packet size, potentially resulting in an out-of-bound read access. This issue affects all users that use PJMEDIA and RTCP. A malicious actor can send a RTCP BYE message with an invalid reason length. Users are advised to upgrade as soon as possible. There are no known workarounds. CVE-2021-43804
VCID-rvfq-jqny-gqfh PJSIP is a free and open source multimedia communication library written in the C language. Versions 2.12 and prior contain a denial-of-service vulnerability that affects PJSIP users that consume PJSIP's XML parsing in their apps. Users are advised to update. There are no known workarounds. CVE-2022-24763
VCID-t8q7-3fhv-zugn Stack overflow in PJSUA API when calling pjsua_playlist_create. An attacker-controlled 'file_names' argument may cause a buffer overflow since it is copied to a fixed-size stack buffer without any size validation. CVE-2021-43301

Date Actor Action Vulnerability Source VulnerableCode Version
2025-09-10T04:43:20.575345+00:00 Debian Oval Importer Fixing VCID-79n7-nh9b-33gc https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-09-10T04:23:04.814539+00:00 Debian Oval Importer Fixing VCID-dftu-cfg3-ducw https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-09-10T04:00:19.643237+00:00 Debian Oval Importer Fixing VCID-eran-kpag-kqeh https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-09-10T01:06:37.330933+00:00 Debian Oval Importer Fixing VCID-4b2x-qkf9-ebbv https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-09-09T23:39:11.993406+00:00 Debian Oval Importer Fixing VCID-qhsa-mzc9-2fc2 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-09-09T23:00:23.754161+00:00 Debian Oval Importer Fixing VCID-dbsm-9e6m-ubhb https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-09-09T22:56:30.064057+00:00 Debian Oval Importer Fixing VCID-j2fn-agvf-3qf1 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-09-09T22:09:37.186219+00:00 Debian Oval Importer Fixing VCID-eus2-xch4-ryb8 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-09-09T22:00:30.664057+00:00 Debian Oval Importer Fixing VCID-rvfq-jqny-gqfh https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-09-09T21:16:27.269938+00:00 Debian Oval Importer Fixing VCID-k9ws-qhhf-fkef https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-09-09T20:34:34.914873+00:00 Debian Importer Fixing VCID-5p64-sz1a-qugh https://security-tracker.debian.org/tracker/data/json 37.0.0
2025-09-09T20:25:47.658539+00:00 Debian Oval Importer Fixing VCID-t8q7-3fhv-zugn https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-09-09T19:28:40.748674+00:00 Debian Importer Fixing VCID-mcy1-7jby-bbcr https://security-tracker.debian.org/tracker/data/json 37.0.0