### Description
The master branch of the Kamailio project contains unpatched sources from 
OpenSIPS, in which 
[CVE-2023-28098](https://github.com/OpenSIPS/opensips/security/advisories/GHSA-jrqg-vppj-hr2h)
 was reported. The function `parse_param_name()` from 
`kamailio/src/core/parser/digest/param_parser.c` does not include security 
patches and updates available in newer versions of OpenSIPS. The fix for CVE 
can be found in this commit: [OpenSIPS Commit 
dd9141b6](https://github.com/OpenSIPS/opensips/commit/dd9141b6f67d7df4072f3430f628d4b73df5e102)

### Possible Solutions
I strongly recommend updating the sources from OpenSIPS to the latest version 
available.

### Report Origin
The bug is detected by a tool developed at [CAST](https://castech.am/).

-- 
Reply to this email directly or view it on GitHub:
https://github.com/kamailio/kamailio/issues/3911
You are receiving this because you are subscribed to this thread.

Message ID: <kamailio/kamailio/issues/3...@github.com>
_______________________________________________
Kamailio (SER) - Development Mailing List
To unsubscribe send an email to sr-dev-le...@lists.kamailio.org

Reply via email to