5ed26bb378
Fix the following security issues (i.e. CVE-2021-37706, CVE-2021-41141, CVE-2021-43804, CVE-2021-43845, CVE-2022-21722 and CVE-2022-21723): - Potential integer underflow upon receiving STUN message (GHSA-2qpg-f6wf-w984) - Use after free of dialog set (GHSA-ffff-m5fm-qm62) - Missing unreleased of locks in failure cases (GHSA-8fmx-hqw7-6gmc) - Potential out-of-bounds read when parsing RTCP BYE message (GHSA-3qx3-cg72-wrh9) - Prevent OOB read for RTCP XR block (GHSA-r374-qrwv-86hh) - Potential buffer overflow in pjsua_player_create(), pjsua_recorder_create(), pjmedia_wav_player_create(), and pjsua_call_dump() (GHSA-qcvw-h34v-c7r9) - Potential out-of-bound read during RTP/RTCP parsing (GHSA-m66q-q64c-hv36) - Prevent OOB read in multipart parsing (GHSA-7fw8-54cv-r7pm) - Use after free of dialog set (GHSA-ffff-m5fm-qm62) https://github.com/pjsip/pjproject/releases/tag/2.12 Signed-off-by: Fabrice Fontaine <fontaine.fabrice@gmail.com> Signed-off-by: Peter Korsgaard <peter@korsgaard.com> |
||
---|---|---|
.. | ||
Config.in | ||
libpjsip.hash | ||
libpjsip.mk |