pjproject is vulnerable to out of bounds read. The vulnerability exists due to a lack of validation of incoming RTP/RTCP packets.
github.com/pjsip/pjproject/commit/22af44e68a0c7d190ac1e25075e1382f77e9397a
github.com/pjsip/pjproject/security/advisories/GHSA-m66q-q64c-hv36
lists.debian.org/debian-lts-announce/2022/03/msg00035.html
lists.debian.org/debian-lts-announce/2022/11/msg00021.html
secdb.alpinelinux.org/edge/main.yaml
security.gentoo.org/glsa/202210-37
www.debian.org/security/2022/dsa-5285