Summary: | <net-libs/pjproject-2.13.1: heap buffer overflow when parsing DNS packet | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | John Helmert III <ajak> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | CONFIRMED --- | ||
Severity: | normal | CC: | jaco, proxy-maint |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | https://github.com/pjsip/pjproject/security/advisories/GHSA-q9cp-8wcq-7pfr | ||
Whiteboard: | B2 [glsa+ cleanup] | ||
Package list: | Runtime testing required: | --- | |
Bug Depends on: | 917659 | ||
Bug Blocks: |
Description
John Helmert III
![]() ![]() ![]() ![]() The bug has been referenced in the following commit(s): https://gitweb.gentoo.org/data/glsa.git/commit/?id=c0d221f307147d6e10c6f7292b4607f41d713ba4 commit c0d221f307147d6e10c6f7292b4607f41d713ba4 Author: GLSAMaker <glsamaker@gentoo.org> AuthorDate: 2024-09-22 06:00:29 +0000 Commit: Hans de Graaff <graaff@gentoo.org> CommitDate: 2024-09-22 06:00:37 +0000 [ GLSA 202409-05 ] PJSIP: Heap Buffer Overflow Bug: https://bugs.gentoo.org/917463 Signed-off-by: GLSAMaker <glsamaker@gentoo.org> Signed-off-by: Hans de Graaff <graaff@gentoo.org> glsa-202409-05.xml | 42 ++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 42 insertions(+) |