| Type | URI |
|---|---|
| cve@mitre.org | https://github.com/EnableSecurity/advisories/tree/master/ES2025-01-rtpengine-improper-behavior-bleed-inject |
| cve@mitre.org | https://github.com/sipwise/rtpengine/commits/rfuchs/security/ |
| cve@mitre.org | https://github.com/sipwise/rtpengine/releases/tag/mr13.4.1.1 |
| cve@mitre.org | https://www.openwall.com/lists/oss-security/2025/07/31/1 |
| af854a3a-2127-422b-91ae-364da2661108 | http://seclists.org/fulldisclosure/2025/Aug/1 |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2025/07/31/1 |
| CPE URI | Source package | Min version | Max version |
|---|---|---|---|
|
rtpengine | >= 0 | < 13.4.1.1 |
| Source package | Branch | Version | Maintainer | Status |
|---|---|---|---|---|
| rtpengine | edge-community | 12.2.1.4-r0 | Leonardo Arena <rnalrd@alpinelinux.org> | possibly vulnerable |
| rtpengine | edge-community | 12.2.1.4-r1 | Leonardo Arena <rnalrd@alpinelinux.org> | possibly vulnerable |
| rtpengine | 3.22-community | 12.2.1.4-r0 | Leonardo Arena <rnalrd@alpinelinux.org> | possibly vulnerable |
| rtpengine | 3.22-community | 12.2.1.4-r1 | Leonardo Arena <rnalrd@alpinelinux.org> | possibly vulnerable |
| rtpengine | edge-community | 12.2.1.4-r2 | Leonardo Arena <rnalrd@alpinelinux.org> | possibly vulnerable |