Buffer Overflow Affecting ring package, versions <20190215.1.f152c98~ds1-1+deb10u2build0.20.04.1


Severity

Recommended
medium

Based on Ubuntu security rating.

Threat Intelligence

EPSS
0.29% (69th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-UBUNTU2004-RING-5952053
  • published15 Mar 2022
  • disclosed11 Mar 2022

Introduced: 11 Mar 2022

CVE-2022-24754  (opens in a new tab)
CWE-120  (opens in a new tab)

How to fix?

Upgrade Ubuntu:20.04 ring to version 20190215.1.f152c98~ds1-1+deb10u2build0.20.04.1 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream ring package and not the ring package as distributed by Ubuntu. See How to fix? for Ubuntu:20.04 relevant fixed versions and status.

PJSIP is a free and open source multimedia communication library written in C language. In versions prior to and including 2.12 PJSIP there is a stack-buffer overflow vulnerability which only impacts PJSIP users who accept hashed digest credentials (credentials with data_type PJSIP_CRED_DATA_DIGEST). This issue has been patched in the master branch of the PJSIP repository and will be included with the next release. Users unable to upgrade need to check that the hashed digest data length must be equal to PJSIP_MD5STRLEN before passing to PJSIP.

CVSS Scores

version 3.1