DEBIAN-CVE-2022-31002

Source
https://security-tracker.debian.org/tracker/CVE-2022-31002
Import Source
https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2022-31002.json
JSON Data
https://api.test.osv.dev/v1/vulns/DEBIAN-CVE-2022-31002
Upstream
Published
2022-05-31T19:15:07Z
Modified
2025-09-19T07:32:19.816985Z
Summary
[none]
Details

Sofia-SIP is an open-source Session Initiation Protocol (SIP) User-Agent library. Prior to version 1.13.8, an attacker can send a message with evil sdp to FreeSWITCH, which may cause a crash. This type of crash may be caused by a URL ending with %. Version 1.13.8 contains a patch for this issue.

References

Affected packages

Debian:11 / sofia-sip

Package

Name
sofia-sip
Purl
pkg:deb/debian/sofia-sip?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.12.11+20110422.1-2.1+deb11u1

Affected versions

1.*

1.12.11+20110422.1-2.1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / sofia-sip

Package

Name
sofia-sip
Purl
pkg:deb/debian/sofia-sip?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.12.11+20110422.1+1e14eea~dfsg-3

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / sofia-sip

Package

Name
sofia-sip
Purl
pkg:deb/debian/sofia-sip?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.12.11+20110422.1+1e14eea~dfsg-3

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:14 / sofia-sip

Package

Name
sofia-sip
Purl
pkg:deb/debian/sofia-sip?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.12.11+20110422.1+1e14eea~dfsg-3

Ecosystem specific

{
    "urgency": "not yet assigned"
}