{"id":"USN-8122-1","summary":"pjproject vulnerabilities","details":"Youngsung Kim discovered that PJSIP did not properly parse numeric header\nfields in SIP messages. A remote attacker could use this issue to cause\nPJSIP to crash, resulting in a denial of service, or possibly execute\narbitrary code. This issue only affected Ubuntu 16.04 LTS. (CVE-2017-16872)\n\nPeter Koletzki discovered that PJSIP did not properly handle certain\nconnection requests. A remote attacker could possibly use this issue to\ncause PJSIP to enter an unrecoverable state and reject further connections,\nresulting in a denial of service. This issue only affected Ubuntu 16.04\nLTS. (CVE-2017-16875)\n\nAlfred Farrugia, Sandro Gauci, and Kevin Harwell discovered that PJSIP did\nnot properly parse certain SDP messages. A remote attacker could possibly\nuse this issue to cause PJSIP to crash, resulting in a denial of service.\nThis issue only affected Ubuntu 16.04 LTS. (CVE-2018-1000098,\nCVE-2018-1000099)\n\nLauri Vänskä discovered that PJSIP did not verify hostnames when reusing\nTLS connections. If a remote attacker were able to intercept communication,\nthis flaw could possibly be exploited to view sensitive information.\n(CVE-2020-15260)\n\nIt was discovered that PJSIP did not properly handle certain sequences of\nSDP messages. A remote attacker could possibly use this issue to cause\nPJSIP to crash, resulting in a denial of service. (CVE-2021-21375)\n\nIt was discovered that the SSL socket implementation in PJSIP contained a\nrace condition. A remote attacker could possibly use this issue to cause\nPJSIP to crash, resulting in a denial of service. This issue was only\naddressed in Ubuntu 18.04 LTS. (CVE-2021-32686)\n\nIt was discovered that PJSIP did not properly parse certain STUN messages.\nA remote attacker could use this issue to cause PJSIP to crash, resulting\nin a denial of service, or possibly execute arbitrary code.\n(CVE-2021-37706)\n\nUriya Yavnieli discovered that PJSIP did not properly manage memory under\ncertain conditions. A remote attacker could use this issue to cause PJSIP\nto crash, resulting in a denial of service, or possibly execute arbitrary\ncode. (CVE-2021-43299, CVE-2021-43300, CVE-2021-43301, CVE-2021-43302,\nCVE-2021-43303)\n\nIt was discovered that PJSIP did not properly manage memory when processing\nICE session credentials. A remote attacker could use this issue to cause\nPJSIP to crash, resulting in a denial of service, or possibly execute\narbitrary code. (CVE-2026-25994)","modified":"2026-04-27T18:17:21.385863104Z","published":"2026-03-24T20:34:47Z","related":["UBUNTU-CVE-2017-16872","UBUNTU-CVE-2017-16875","UBUNTU-CVE-2018-1000098","UBUNTU-CVE-2018-1000099","UBUNTU-CVE-2020-15260","UBUNTU-CVE-2021-21375","UBUNTU-CVE-2021-32686","UBUNTU-CVE-2021-37706","UBUNTU-CVE-2021-43299","UBUNTU-CVE-2021-43300","UBUNTU-CVE-2021-43301","UBUNTU-CVE-2021-43302","UBUNTU-CVE-2021-43303","UBUNTU-CVE-2026-25994"],"upstream":["CVE-2017-16872","CVE-2017-16875","CVE-2018-1000098","CVE-2018-1000099","CVE-2020-15260","CVE-2021-21375","CVE-2021-32686","CVE-2021-37706","CVE-2021-43299","CVE-2021-43300","CVE-2021-43301","CVE-2021-43302","CVE-2021-43303","CVE-2026-25994","UBUNTU-CVE-2017-16872","UBUNTU-CVE-2017-16875","UBUNTU-CVE-2018-1000098","UBUNTU-CVE-2018-1000099","UBUNTU-CVE-2020-15260","UBUNTU-CVE-2021-21375","UBUNTU-CVE-2021-32686","UBUNTU-CVE-2021-37706","UBUNTU-CVE-2021-43299","UBUNTU-CVE-2021-43300","UBUNTU-CVE-2021-43301","UBUNTU-CVE-2021-43302","UBUNTU-CVE-2021-43303","UBUNTU-CVE-2026-25994"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-8122-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-16872"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-16875"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-1000098"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-1000099"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-15260"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-21375"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-32686"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-37706"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-43299"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-43300"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-43301"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-43302"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-43303"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2026-25994"}],"affected":[{"package":{"name":"pjproject","ecosystem":"Ubuntu:Pro:16.04:LTS","purl":"pkg:deb/ubuntu/pjproject@2.1.0.0.ast20130823-1+deb8u1ubuntu0.1~esm1?arch=source&distro=esm-apps/xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.1.0.0.ast20130823-1+deb8u1ubuntu0.1~esm1"}]}],"versions":["2.1.0.0.ast20130823-1","2.1.0.0.ast20130823-1+deb8u1build0.16.04.1"],"ecosystem_specific":{"availability":"Available with Ubuntu Pro: https://ubuntu.com/pro","binaries":[{"binary_name":"libpj2","binary_version":"2.1.0.0.ast20130823-1+deb8u1ubuntu0.1~esm1"},{"binary_name":"libpjlib-util2","binary_version":"2.1.0.0.ast20130823-1+deb8u1ubuntu0.1~esm1"},{"binary_name":"libpjmedia-audiodev2","binary_version":"2.1.0.0.ast20130823-1+deb8u1ubuntu0.1~esm1"},{"binary_name":"libpjmedia-codec2","binary_version":"2.1.0.0.ast20130823-1+deb8u1ubuntu0.1~esm1"},{"binary_name":"libpjmedia-videodev2","binary_version":"2.1.0.0.ast20130823-1+deb8u1ubuntu0.1~esm1"},{"binary_name":"libpjmedia2","binary_version":"2.1.0.0.ast20130823-1+deb8u1ubuntu0.1~esm1"},{"binary_name":"libpjnath2","binary_version":"2.1.0.0.ast20130823-1+deb8u1ubuntu0.1~esm1"},{"binary_name":"libpjsip-simple2","binary_version":"2.1.0.0.ast20130823-1+deb8u1ubuntu0.1~esm1"},{"binary_name":"libpjsip-ua2","binary_version":"2.1.0.0.ast20130823-1+deb8u1ubuntu0.1~esm1"},{"binary_name":"libpjsip2","binary_version":"2.1.0.0.ast20130823-1+deb8u1ubuntu0.1~esm1"},{"binary_name":"libpjsua2","binary_version":"2.1.0.0.ast20130823-1+deb8u1ubuntu0.1~esm1"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-8122-1.json","cves_map":{"cves":[{"id":"CVE-2017-16872","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2017-16875","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2018-1000098","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2018-1000099","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2020-15260","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2021-21375","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2021-37706","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2021-43299","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2021-43300","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2021-43301","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2021-43302","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2021-43303","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2026-25994","severity":[{"type":"CVSS_V4","score":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"high"}]}],"ecosystem":"Ubuntu:Pro:16.04:LTS"}}},{"package":{"name":"pjproject","ecosystem":"Ubuntu:Pro:18.04:LTS","purl":"pkg:deb/ubuntu/pjproject@2.7.2~dfsg-1ubuntu0.1~esm1?arch=source&distro=esm-apps/bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.7.2~dfsg-1ubuntu0.1~esm1"}]}],"versions":["2.6~dfsg-2","2.7~dfsg-1","2.7.1~dfsg-1","2.7.1~dfsg-1build1","2.7.2~dfsg-1"],"ecosystem_specific":{"availability":"Available with Ubuntu Pro: https://ubuntu.com/pro","binaries":[{"binary_name":"libpj2","binary_version":"2.7.2~dfsg-1ubuntu0.1~esm1"},{"binary_name":"libpjlib-util2","binary_version":"2.7.2~dfsg-1ubuntu0.1~esm1"},{"binary_name":"libpjmedia-audiodev2","binary_version":"2.7.2~dfsg-1ubuntu0.1~esm1"},{"binary_name":"libpjmedia-codec2","binary_version":"2.7.2~dfsg-1ubuntu0.1~esm1"},{"binary_name":"libpjmedia-videodev2","binary_version":"2.7.2~dfsg-1ubuntu0.1~esm1"},{"binary_name":"libpjmedia2","binary_version":"2.7.2~dfsg-1ubuntu0.1~esm1"},{"binary_name":"libpjnath2","binary_version":"2.7.2~dfsg-1ubuntu0.1~esm1"},{"binary_name":"libpjsip-simple2","binary_version":"2.7.2~dfsg-1ubuntu0.1~esm1"},{"binary_name":"libpjsip-ua2","binary_version":"2.7.2~dfsg-1ubuntu0.1~esm1"},{"binary_name":"libpjsip2","binary_version":"2.7.2~dfsg-1ubuntu0.1~esm1"},{"binary_name":"libpjsua2","binary_version":"2.7.2~dfsg-1ubuntu0.1~esm1"},{"binary_name":"libpjsua2-2v5","binary_version":"2.7.2~dfsg-1ubuntu0.1~esm1"},{"binary_name":"python-pjproject","binary_version":"2.7.2~dfsg-1ubuntu0.1~esm1"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-8122-1.json","cves_map":{"cves":[{"id":"CVE-2020-15260","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2021-21375","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2021-32686","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2021-37706","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2021-43299","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2021-43300","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2021-43301","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2021-43302","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2021-43303","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2026-25994","severity":[{"type":"CVSS_V4","score":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"high"}]}],"ecosystem":"Ubuntu:Pro:18.04:LTS"}}}],"schema_version":"1.7.5"}