Description
PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In versions up to and including 2.11.1 when in a dialog set (or forking) scenario, a hash key shared by multiple UAC dialogs can potentially be prematurely freed when one of the dialogs is destroyed . The issue may cause a dialog set to be registered in the hash table multiple times (with different hash keys) leading to undefined behavior such as dialog list collision which eventually leading to endless loop. A patch is available in commit db3235953baa56d2fb0e276ca510fefca751643f which will be included in the next release. There are no known workarounds for this issue.
Published: 2022-02-22
Score: 8.1 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DLA Debian DLA DLA-2962-1 pjproject security update
Debian DLA Debian DLA DLA-2962-2 pjproject regression update
Debian DLA Debian DLA DLA-3194-1 asterisk security update
Debian DLA Debian DLA DLA-3549-1 ring security update
Debian DLA Debian DLA DLA-3887-1 ring security update
Debian DSA Debian DSA DSA-5285-1 asterisk security update
EUVD EUVD EUVD-2022-28577 PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In versions up to and including 2.11.1 when in a dialog set (or forking) scenario, a hash key shared by multiple UAC dialogs can potentially be prematurely freed when one of the dialogs is destroyed . The issue may cause a dialog set to be registered in the hash table multiple times (with different hash keys) leading to undefined behavior such as dialog list collision which eventually leading to endless loop. A patch is available in commit db3235953baa56d2fb0e276ca510fefca751643f which will be included in the next release. There are no known workarounds for this issue.
Ubuntu USN Ubuntu USN USN-6422-1 Ring vulnerabilities
History

Tue, 04 Nov 2025 16:30:00 +0000

Type Values Removed Values Added
References

Sun, 13 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00376}

epss

{'score': 0.00354}


Wed, 23 Apr 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Subscriptions

Asterisk Certified Asterisk
Debian Debian Linux
Sangoma Asterisk
Teluu Pjsip
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2025-11-04T16:09:34.819Z

Reserved: 2022-01-19T00:00:00.000Z

Link: CVE-2022-23608

cve-icon Vulnrichment

Updated: 2025-11-04T16:09:34.819Z

cve-icon NVD

Status : Modified

Published: 2022-02-22T20:15:07.693

Modified: 2025-11-04T16:15:47.087

Link: CVE-2022-23608

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses