{"api_version":"1","generated_at":"2026-04-23T07:00:06+00:00","cve":"CVE-2021-41141","urls":{"html":"https://cve.report/CVE-2021-41141","api":"https://cve.report/api/cve/CVE-2021-41141.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2021-41141","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2021-41141"},"summary":{"title":"CVE-2021-41141","description":"PJSIP is a free and open source multimedia communication library written in the C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In various parts of PJSIP, when error/failure occurs, it is found that the function returns without releasing the currently held locks. This could result in a system deadlock, which cause a denial of service for the users. No release has yet been made which contains the linked fix commit. All versions up to an including 2.11.1 are affected. Users may need to manually apply the patch.","state":"PUBLIC","assigner":"security-advisories@github.com","published_at":"2022-01-04 19:15:00","updated_at":"2022-11-16 19:07:00"},"problem_types":["CWE-667"],"metrics":[],"references":[{"url":"https://lists.debian.org/debian-lts-announce/2022/03/msg00035.html","name":"[debian-lts-announce] 20220328 [SECURITY] [DLA 2962-1] pjproject security update","refsource":"MLIST","tags":[],"title":"[SECURITY] [DLA 2962-1] pjproject security update","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://security.gentoo.org/glsa/202210-37","name":"GLSA-202210-37","refsource":"GENTOO","tags":[],"title":"PJSIP: Multiple Vulnerabilities (GLSA 202210-37) — Gentoo security","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/pjsip/pjproject/commit/1aa2c0e0fb60a1b0bf793e0d834073ffe50fb196","name":"https://github.com/pjsip/pjproject/commit/1aa2c0e0fb60a1b0bf793e0d834073ffe50fb196","refsource":"MISC","tags":[],"title":"Merge pull request from GHSA-8fmx-hqw7-6gmc · pjsip/pjproject@1aa2c0e · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/pjsip/pjproject/security/advisories/GHSA-8fmx-hqw7-6gmc","name":"https://github.com/pjsip/pjproject/security/advisories/GHSA-8fmx-hqw7-6gmc","refsource":"CONFIRM","tags":[],"title":"Missing unreleased of locks in failure cases · Advisory · pjsip/pjproject · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2021-41141","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-41141","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2021","cve_id":"41141","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"debian","cpe5":"debian_linux","cpe6":"9.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"41141","vulnerable":"1","versionEndIncluding":"2.11.1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"teluu","cpe5":"pjsip","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2021-41141","qid":"179161","title":"Debian Security Update for pjproject (DLA 2962-1)"},{"cve":"CVE-2021-41141","qid":"502231","title":"Alpine Linux Security Update for pjproject"},{"cve":"CVE-2021-41141","qid":"504292","title":"Alpine Linux Security Update for pjproject"},{"cve":"CVE-2021-41141","qid":"710674","title":"Gentoo Linux PJSIP Multiple Vulnerabilities (GLSA 202210-37)"}]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"security-advisories@github.com","ID":"CVE-2021-41141","STATE":"PUBLIC","TITLE":"Missing release of locks in PJSIP"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"pjproject","version":{"version_data":[{"version_value":"<= 2.11.1"}]}}]},"vendor_name":"pjsip"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"PJSIP is a free and open source multimedia communication library written in the C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In various parts of PJSIP, when error/failure occurs, it is found that the function returns without releasing the currently held locks. This could result in a system deadlock, which cause a denial of service for the users. No release has yet been made which contains the linked fix commit. All versions up to an including 2.11.1 are affected. Users may need to manually apply the patch."}]},"impact":{"cvss":{"attackComplexity":"HIGH","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":5.9,"baseSeverity":"MEDIUM","confidentialityImpact":"NONE","integrityImpact":"NONE","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H","version":"3.1"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-667: Improper Locking"}]}]},"references":{"reference_data":[{"name":"https://github.com/pjsip/pjproject/security/advisories/GHSA-8fmx-hqw7-6gmc","refsource":"CONFIRM","url":"https://github.com/pjsip/pjproject/security/advisories/GHSA-8fmx-hqw7-6gmc"},{"name":"https://github.com/pjsip/pjproject/commit/1aa2c0e0fb60a1b0bf793e0d834073ffe50fb196","refsource":"MISC","url":"https://github.com/pjsip/pjproject/commit/1aa2c0e0fb60a1b0bf793e0d834073ffe50fb196"},{"refsource":"MLIST","name":"[debian-lts-announce] 20220328 [SECURITY] [DLA 2962-1] pjproject security update","url":"https://lists.debian.org/debian-lts-announce/2022/03/msg00035.html"},{"refsource":"GENTOO","name":"GLSA-202210-37","url":"https://security.gentoo.org/glsa/202210-37"}]},"source":{"advisory":"GHSA-8fmx-hqw7-6gmc","discovery":"UNKNOWN"}},"nvd":{"publishedDate":"2022-01-04 19:15:00","lastModifiedDate":"2022-11-16 19:07:00","problem_types":["CWE-667"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH","baseScore":7.5,"baseSeverity":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:C","accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"COMPLETE","baseScore":7.8},"severity":"HIGH","exploitabilityScore":10,"impactScore":6.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:teluu:pjsip:*:*:*:*:*:*:*:*","versionEndIncluding":"2.11.1","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2021","CveId":"41141","Ordinal":"217012","Title":"CVE-2021-41141","CVE":"CVE-2021-41141","Year":"2021"},"notes":[{"CveYear":"2021","CveId":"41141","Ordinal":"1","NoteData":"PJSIP is a free and open source multimedia communication library written in the C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In various parts of PJSIP, when error/failure occurs, it is found that the function returns without releasing the currently held locks. This could result in a system deadlock, which cause a denial of service for the users. No release has yet been made which contains the linked fix commit. All versions up to an including 2.11.1 are affected. Users may need to manually apply the patch.","Type":"Description","Title":null},{"CveYear":"2021","CveId":"41141","Ordinal":"2","NoteData":"2022-01-04","Type":"Other","Title":"Published"},{"CveYear":"2021","CveId":"41141","Ordinal":"3","NoteData":"2022-01-04","Type":"Other","Title":"Modified"}]}}}