Stack overflow in PJSUA API when calling pjsua_playlist_create. An attacker-controlled 'file_names' argument may cause a buffer overflow since it is copied to a fixed-size stack buffer without any size validation.
References
| Link | Resource |
|---|---|
| https://github.com/pjsip/pjproject/security/advisories/GHSA-qcvw-h34v-c7r9 | Patch Third Party Advisory |
| https://lists.debian.org/debian-lts-announce/2022/03/msg00035.html | Mailing List Third Party Advisory |
| https://lists.debian.org/debian-lts-announce/2022/11/msg00021.html | Mailing List Third Party Advisory |
| https://lists.debian.org/debian-lts-announce/2023/08/msg00038.html | |
| https://www.debian.org/security/2022/dsa-5285 | Third Party Advisory |
| https://github.com/pjsip/pjproject/security/advisories/GHSA-qcvw-h34v-c7r9 | Patch Third Party Advisory |
| https://lists.debian.org/debian-lts-announce/2022/03/msg00035.html | Mailing List Third Party Advisory |
| https://lists.debian.org/debian-lts-announce/2022/11/msg00021.html | Mailing List Third Party Advisory |
| https://lists.debian.org/debian-lts-announce/2023/08/msg00038.html | |
| https://lists.debian.org/debian-lts-announce/2024/09/msg00030.html | |
| https://www.debian.org/security/2022/dsa-5285 | Third Party Advisory |
Configurations
History
04 Nov 2025, 16:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
21 Nov 2024, 06:29
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/pjsip/pjproject/security/advisories/GHSA-qcvw-h34v-c7r9 - Patch, Third Party Advisory | |
| References | () https://lists.debian.org/debian-lts-announce/2022/03/msg00035.html - Mailing List, Third Party Advisory | |
| References | () https://lists.debian.org/debian-lts-announce/2022/11/msg00021.html - Mailing List, Third Party Advisory | |
| References | () https://lists.debian.org/debian-lts-announce/2023/08/msg00038.html - | |
| References | () https://www.debian.org/security/2022/dsa-5285 - Third Party Advisory |
18 Nov 2022, 16:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
03 Jun 2022, 13:32
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:* | |
| References | (MLIST) https://lists.debian.org/debian-lts-announce/2022/03/msg00035.html - Mailing List, Third Party Advisory |
28 Mar 2022, 17:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
25 Feb 2022, 00:50
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | CWE-787 | |
| CVSS |
v2 : v3 : |
v2 : 7.5
v3 : 9.8 |
| References | (MISC) https://github.com/pjsip/pjproject/security/advisories/GHSA-qcvw-h34v-c7r9 - Patch, Third Party Advisory | |
| CPE | cpe:2.3:a:teluu:pjsip:*:*:*:*:*:*:*:* |
16 Feb 2022, 22:30
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2022-02-16 21:15
Updated : 2025-11-04 16:15
NVD link : CVE-2021-43301
Mitre link : CVE-2021-43301
CVE.ORG link : CVE-2021-43301
JSON object : View
Products Affected
teluu
- pjsip
debian
- debian_linux
