CVE-2022-23608

NameCVE-2022-23608
DescriptionPJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In versions up to and including 2.11.1 when in a dialog set (or forking) scenario, a hash key shared by multiple UAC dialogs can potentially be prematurely freed when one of the dialogs is destroyed . The issue may cause a dialog set to be registered in the hash table multiple times (with different hash keys) leading to undefined behavior such as dialog list collision which eventually leading to endless loop. A patch is available in commit db3235953baa56d2fb0e276ca510fefca751643f which will be included in the next release. There are no known workarounds for this issue.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-2962-1, DLA-3194-1, DLA-3549-1, DLA-3887-1, DSA-5285-1
Debian Bugs1014998

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
asterisk (PTS)jessie, jessie (lts)1:11.13.1~dfsg-2+deb8u8vulnerable
stretch (security)1:13.14.1~dfsg-2+deb9u6fixed
stretch (lts), stretch1:13.14.1~dfsg-2+deb9u10fixed
buster, buster (lts)1:16.28.0~dfsg-0+deb10u5fixed
buster (security)1:16.28.0~dfsg-0+deb10u4fixed
bullseye1:16.28.0~dfsg-0+deb11u4fixed
bullseye (security)1:16.28.0~dfsg-0+deb11u5fixed
sid1:22.0.0~dfsg+~cs6.14.60671435-1fixed
pjproject (PTS)jessie, jessie (lts)2.1.0.0.ast20130823-1+deb8u1vulnerable
stretch (security)2.5.5~dfsg-6+deb9u5fixed
stretch (lts), stretch2.5.5~dfsg-6+deb9u9fixed
ring (PTS)stretch (security), stretch (lts), stretch20161221.2.7bd7d91~dfsg1-1+deb9u1vulnerable
buster (security), buster, buster (lts)20190215.1.f152c98~ds1-1+deb10u2fixed
bullseye20210112.2.b757bac~ds1-1vulnerable
bullseye (security)20210112.2.b757bac~ds1-1+deb11u1fixed
bookworm20230206.0~ds2-1.1fixed
sid20231201.0~ds1-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
asterisksourcejessie(unfixed)end-of-life
asterisksourcestretch(not affected)
asterisksourcebuster1:16.28.0~dfsg-0+deb10u1DLA-3194-1
asterisksourcebullseye1:16.28.0~dfsg-0+deb11u1DSA-5285-1
asterisksource(unstable)1:18.10.1~dfsg+~cs6.10.40431411-1
pjprojectsourcejessie(unfixed)end-of-life
pjprojectsourcestretch2.5.5~dfsg-6+deb9u3DLA-2962-1
pjprojectsource(unstable)(unfixed)
ringsourcestretch(unfixed)end-of-life
ringsourcebuster20190215.1.f152c98~ds1-1+deb10u2DLA-3549-1
ringsourcebullseye20210112.2.b757bac~ds1-1+deb11u1DLA-3887-1
ringsource(unstable)20230206.0~ds1-11014998

Notes

[stretch] - asterisk <not-affected> (Vulnerable code not present)
https://issues.asterisk.org/jira/browse/ASTERISK-29945
https://downloads.asterisk.org/pub/security/AST-2022-005.html
https://github.com/pjsip/pjproject/security/advisories/GHSA-ffff-m5fm-qm62
https://github.com/pjsip/pjproject/commit/db3235953baa56d2fb0e276ca510fefca751643f

Search for package or bug name: Reporting problems