Search for packages
Package details: pkg:deb/debian/ring@20161221.2.7bd7d91~dfsg1-1
purl pkg:deb/debian/ring@20161221.2.7bd7d91~dfsg1-1
Next non-vulnerable version 20230206.0~ds2-1.1
Latest non-vulnerable version 20230206.0~ds2-1.1
Risk 4.4
Vulnerabilities affecting this package (23)
Vulnerability Summary Fixed by
VCID-4b2x-qkf9-ebbv
Aliases:
CVE-2021-32686
PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In PJSIP before version 2.11.1, there are a couple of issues found in the SSL socket. First, a race condition between callback and destroy, due to the accepted socket having no group lock. Second, the SSL socket parent/listener may get destroyed during handshake. Both issues were reported to happen intermittently in heavy load TLS connections. They cause a crash, resulting in a denial of service. These are fixed in version 2.11.1.
20230206.0~ds2-1.1
Affected by 0 other vulnerabilities.
VCID-4rc8-g9hk-mbe4
Aliases:
CVE-2022-23537
PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. Buffer overread is possible when parsing a specially crafted STUN message with unknown attribute. The vulnerability affects applications that uses STUN including PJNATH and PJSUA-LIB. The patch is available as a commit in the master branch (2.13.1).
20230206.0~ds2-1.1
Affected by 0 other vulnerabilities.
VCID-6smm-fs61-ykex
Aliases:
CVE-2021-43845
PJSIP is a free and open source multimedia communication library. In version 2.11.1 and prior, if incoming RTCP XR message contain block, the data field is not checked against the received packet size, potentially resulting in an out-of-bound read access. This affects all users that use PJMEDIA and RTCP XR. A malicious actor can send a RTCP XR message with an invalid packet size.
20230206.0~ds2-1.1
Affected by 0 other vulnerabilities.
VCID-79n7-nh9b-33gc
Aliases:
CVE-2021-43303
Buffer overflow in PJSUA API when calling pjsua_call_dump. An attacker-controlled 'buffer' argument may cause a buffer overflow, since supplying an output buffer smaller than 128 characters may overflow the output buffer, regardless of the 'maxlen' argument supplied
20230206.0~ds2-1.1
Affected by 0 other vulnerabilities.
VCID-838t-v84y-6fgb
Aliases:
CVE-2021-21375
PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In PJSIP version 2.10 and earlier, after an initial INVITE has been sent, when two 183 responses are received, with the first one causing negotiation failure, a crash will occur. This results in a denial of service.
20210112.2.b757bac~ds1-1
Affected by 23 other vulnerabilities.
VCID-99w2-jme2-u7fb
Aliases:
CVE-2022-24754
PJSIP is a free and open source multimedia communication library written in C language. In versions prior to and including 2.12 PJSIP there is a stack-buffer overflow vulnerability which only impacts PJSIP users who accept hashed digest credentials (credentials with data_type `PJSIP_CRED_DATA_DIGEST`). This issue has been patched in the master branch of the PJSIP repository and will be included with the next release. Users unable to upgrade need to check that the hashed digest data length must be equal to `PJSIP_MD5STRLEN` before passing to PJSIP.
20230206.0~ds2-1.1
Affected by 0 other vulnerabilities.
VCID-aadz-dq2p-1bbm
Aliases:
CVE-2022-24764
PJSIP is a free and open source multimedia communication library written in C. Versions 2.12 and prior contain a stack buffer overflow vulnerability that affects PJSUA2 users or users that call the API `pjmedia_sdp_print(), pjmedia_sdp_media_print()`. Applications that do not use PJSUA2 and do not directly call `pjmedia_sdp_print()` or `pjmedia_sdp_media_print()` should not be affected. A patch is available on the `master` branch of the `pjsip/pjproject` GitHub repository. There are currently no known workarounds.
20230206.0~ds2-1.1
Affected by 0 other vulnerabilities.
VCID-az3a-8gfw-jugd
Aliases:
CVE-2022-21723
PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In versions 2.11.1 and prior, parsing an incoming SIP message that contains a malformed multipart can potentially cause out-of-bound read access. This issue affects all PJSIP users that accept SIP multipart. The patch is available as commit in the `master` branch. There are no known workarounds.
20230206.0~ds2-1.1
Affected by 0 other vulnerabilities.
VCID-b3n8-u3xd-uqdu
Aliases:
CVE-2022-23547
PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. This issue is similar to GHSA-9pfh-r8x4-w26w. Possible buffer overread when parsing a certain STUN message. The vulnerability affects applications that uses STUN including PJNATH and PJSUA-LIB. The patch is available as commit in the master branch.
20230206.0~ds2-1.1
Affected by 0 other vulnerabilities.
VCID-cq1n-wwv5-qkcx
Aliases:
CVE-2023-27585
PJSIP is a free and open source multimedia communication library written in C. A buffer overflow vulnerability in versions 2.13 and prior affects applications that use PJSIP DNS resolver. It doesn't affect PJSIP users who do not utilise PJSIP DNS resolver. This vulnerability is related to CVE-2022-24793. The difference is that this issue is in parsing the query record `parse_query()`, while the issue in CVE-2022-24793 is in `parse_rr()`. A patch is available as commit `d1c5e4d` in the `master` branch. A workaround is to disable DNS resolution in PJSIP config (by setting `nameserver_count` to zero) or use an external resolver implementation instead.
20230206.0~ds2-1.1
Affected by 0 other vulnerabilities.
VCID-dbsm-9e6m-ubhb
Aliases:
CVE-2021-43302
Read out-of-bounds in PJSUA API when calling pjsua_recorder_create. An attacker-controlled 'filename' argument may cause an out-of-bounds read when the filename is shorter than 4 characters.
20230206.0~ds2-1.1
Affected by 0 other vulnerabilities.
VCID-dftu-cfg3-ducw
Aliases:
CVE-2021-37706
PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In affected versions if the incoming STUN message contains an ERROR-CODE attribute, the header length is not checked before performing a subtraction operation, potentially resulting in an integer underflow scenario. This issue affects all users that use STUN. A malicious actor located within the victim’s network may forge and send a specially crafted UDP (STUN) message that could remotely execute arbitrary code on the victim’s machine. Users are advised to upgrade as soon as possible. There are no known workarounds.
20230206.0~ds2-1.1
Affected by 0 other vulnerabilities.
VCID-eran-kpag-kqeh
Aliases:
CVE-2021-43299
Stack overflow in PJSUA API when calling pjsua_player_create. An attacker-controlled 'filename' argument may cause a buffer overflow since it is copied to a fixed-size stack buffer without any size validation.
20230206.0~ds2-1.1
Affected by 0 other vulnerabilities.
VCID-eus2-xch4-ryb8
Aliases:
CVE-2022-24793
PJSIP is a free and open source multimedia communication library written in C. A buffer overflow vulnerability in versions 2.12 and prior affects applications that use PJSIP DNS resolution. It doesn't affect PJSIP users who utilize an external resolver. This vulnerability is related to CVE-2023-27585. The difference is that this issue is in parsing the query record `parse_rr()`, while the issue in CVE-2023-27585 is in `parse_query()`. A patch is available in the `master` branch of the `pjsip/pjproject` GitHub repository. A workaround is to disable DNS resolution in PJSIP config (by setting `nameserver_count` to zero) or use an external resolver instead.
20230206.0~ds2-1.1
Affected by 0 other vulnerabilities.
VCID-f8c6-z25e-b7gp
Aliases:
CVE-2022-39244
PJSIP is a free and open source multimedia communication library written in C. In versions of PJSIP prior to 2.13 the PJSIP parser, PJMEDIA RTP decoder, and PJMEDIA SDP parser are affeced by a buffer overflow vulnerability. Users connecting to untrusted clients are at risk. This issue has been patched and is available as commit c4d3498 in the master branch and will be included in releases 2.13 and later. Users are advised to upgrade. There are no known workarounds for this issue.
20230206.0~ds2-1.1
Affected by 0 other vulnerabilities.
VCID-j2fn-agvf-3qf1
Aliases:
CVE-2022-21722
PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In version 2.11.1 and prior, there are various cases where it is possible that certain incoming RTP/RTCP packets can potentially cause out-of-bound read access. This issue affects all users that use PJMEDIA and accept incoming RTP/RTCP. A patch is available as a commit in the `master` branch. There are no known workarounds.
20230206.0~ds2-1.1
Affected by 0 other vulnerabilities.
VCID-k9ws-qhhf-fkef
Aliases:
CVE-2021-43300
Stack overflow in PJSUA API when calling pjsua_recorder_create. An attacker-controlled 'filename' argument may cause a buffer overflow since it is copied to a fixed-size stack buffer without any size validation.
20230206.0~ds2-1.1
Affected by 0 other vulnerabilities.
VCID-qhj3-hekm-nkdx
Aliases:
CVE-2020-15260
PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In version 2.10 and earlier, PJSIP transport can be reused if they have the same IP address + port + protocol. However, this is insufficient for secure transport since it lacks remote hostname authentication. Suppose we have created a TLS connection to `sip.foo.com`, which has an IP address `100.1.1.1`. If we want to create a TLS connection to another hostname, say `sip.bar.com`, which has the same IP address, then it will reuse that existing connection, even though `100.1.1.1` does not have certificate to authenticate as `sip.bar.com`. The vulnerability allows for an insecure interaction without user awareness. It affects users who need access to connections to different destinations that translate to the same address, and allows man-in-the-middle attack if attacker can route a connection to another destination such as in the case of DNS spoofing.
20210112.2.b757bac~ds1-1
Affected by 23 other vulnerabilities.
VCID-qhsa-mzc9-2fc2
Aliases:
CVE-2021-43804
PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In affected versions if the incoming RTCP BYE message contains a reason's length, this declared length is not checked against the actual received packet size, potentially resulting in an out-of-bound read access. This issue affects all users that use PJMEDIA and RTCP. A malicious actor can send a RTCP BYE message with an invalid reason length. Users are advised to upgrade as soon as possible. There are no known workarounds.
20230206.0~ds2-1.1
Affected by 0 other vulnerabilities.
VCID-r9fg-q9t2-x7hp
Aliases:
CVE-2022-23608
PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In versions up to and including 2.11.1 when in a dialog set (or forking) scenario, a hash key shared by multiple UAC dialogs can potentially be prematurely freed when one of the dialogs is destroyed . The issue may cause a dialog set to be registered in the hash table multiple times (with different hash keys) leading to undefined behavior such as dialog list collision which eventually leading to endless loop. A patch is available in commit db3235953baa56d2fb0e276ca510fefca751643f which will be included in the next release. There are no known workarounds for this issue.
20230206.0~ds2-1.1
Affected by 0 other vulnerabilities.
VCID-rvfq-jqny-gqfh
Aliases:
CVE-2022-24763
PJSIP is a free and open source multimedia communication library written in the C language. Versions 2.12 and prior contain a denial-of-service vulnerability that affects PJSIP users that consume PJSIP's XML parsing in their apps. Users are advised to update. There are no known workarounds.
20230206.0~ds2-1.1
Affected by 0 other vulnerabilities.
VCID-t8q7-3fhv-zugn
Aliases:
CVE-2021-43301
Stack overflow in PJSUA API when calling pjsua_playlist_create. An attacker-controlled 'file_names' argument may cause a buffer overflow since it is copied to a fixed-size stack buffer without any size validation.
20230206.0~ds2-1.1
Affected by 0 other vulnerabilities.
VCID-vy2p-vaj9-kbgn
Aliases:
CVE-2022-31031
PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In versions prior to and including 2.12.1 a stack buffer overflow vulnerability affects PJSIP users that use STUN in their applications, either by: setting a STUN server in their account/media config in PJSUA/PJSUA2 level, or directly using `pjlib-util/stun_simple` API. A patch is available in commit 450baca which should be included in the next release. There are no known workarounds for this issue.
20230206.0~ds2-1.1
Affected by 0 other vulnerabilities.
Vulnerabilities fixed by this package (0)
Vulnerability Summary Aliases
This package is not known to fix vulnerabilities.

Date Actor Action Vulnerability Source VulnerableCode Version
2025-08-01T19:49:34.968373+00:00 Debian Oval Importer Affected by VCID-b3n8-u3xd-uqdu https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T19:45:41.443314+00:00 Debian Oval Importer Affected by VCID-az3a-8gfw-jugd https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T19:30:53.285953+00:00 Debian Oval Importer Affected by VCID-f8c6-z25e-b7gp https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T19:14:29.288449+00:00 Debian Oval Importer Affected by VCID-6smm-fs61-ykex https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T19:12:43.738616+00:00 Debian Oval Importer Affected by VCID-vy2p-vaj9-kbgn https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T18:53:24.154429+00:00 Debian Oval Importer Affected by VCID-4rc8-g9hk-mbe4 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T18:47:22.788496+00:00 Debian Oval Importer Affected by VCID-99w2-jme2-u7fb https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T18:27:03.319775+00:00 Debian Oval Importer Affected by VCID-cq1n-wwv5-qkcx https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T17:57:59.657286+00:00 Debian Oval Importer Affected by VCID-r9fg-q9t2-x7hp https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T17:53:45.619370+00:00 Debian Oval Importer Affected by VCID-aadz-dq2p-1bbm https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T17:33:34.134644+00:00 Debian Oval Importer Affected by VCID-79n7-nh9b-33gc https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T17:14:35.607011+00:00 Debian Oval Importer Affected by VCID-dftu-cfg3-ducw https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T17:00:20.638946+00:00 Debian Oval Importer Affected by VCID-eran-kpag-kqeh https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T16:57:08.128572+00:00 Debian Oval Importer Affected by VCID-qhj3-hekm-nkdx https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T15:34:40.622097+00:00 Debian Oval Importer Affected by VCID-4b2x-qkf9-ebbv https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T14:33:11.684191+00:00 Debian Oval Importer Affected by VCID-qhsa-mzc9-2fc2 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T14:08:04.209811+00:00 Debian Oval Importer Affected by VCID-dbsm-9e6m-ubhb https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T14:05:47.900893+00:00 Debian Oval Importer Affected by VCID-j2fn-agvf-3qf1 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T13:49:12.576708+00:00 Debian Oval Importer Affected by VCID-838t-v84y-6fgb https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T13:34:57.615306+00:00 Debian Oval Importer Affected by VCID-eus2-xch4-ryb8 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T13:29:14.968007+00:00 Debian Oval Importer Affected by VCID-rvfq-jqny-gqfh https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T12:53:44.393670+00:00 Debian Oval Importer Affected by VCID-k9ws-qhhf-fkef https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T12:21:27.386351+00:00 Debian Oval Importer Affected by VCID-t8q7-3fhv-zugn https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0