[Secure-testing-commits] r39487 - data/CVE

Antoine Beaupré anarcat at moszumanska.debian.org
Fri Feb 5 18:38:31 UTC 2016


Author: anarcat
Date: 2016-02-05 18:38:31 +0000 (Fri, 05 Feb 2016)
New Revision: 39487

Modified:
   data/CVE/list
Log:
Summary: more more patch and version information for asterisk


Modified: data/CVE/list
===================================================================
--- data/CVE/list	2016-02-05 18:14:43 UTC (rev 39486)
+++ data/CVE/list	2016-02-05 18:38:31 UTC (rev 39487)
@@ -56,20 +56,22 @@
 	- asterisk <unfixed>
 	NOTE: http://downloads.asterisk.org/pub/security/AST-2016-003.html
 	NOTE: https://issues.asterisk.org/jira/browse/ASTERISK-25603
-	NOTE: all versions down to 1.8 (wheezy) are vulnerable
-	TODO: see if squeeze (1.6) is vulnerable
+	NOTE: issue was introduced in 2006 with commit 0f5e4e47, so squeeze and previous also vulnerable
+	NOTE: patch for 11 / jessie: https://code.asterisk.org/code/changelog/asterisk?cs=da2573a3779425654543d6ac4c4dd6871ce16720
+	NOTE: all versions vulnerable, backport required for wheezy and squeeze-LTS
 CVE-2016-XXXX [AST-2016-002: File descriptor exhaustion in chan_sip]
 	- asterisk <unfixed>
 	NOTE: http://downloads.asterisk.org/pub/security/AST-2016-002.html
 	NOTE: https://issues.asterisk.org/jira/browse/ASTERISK-25397
-	NOTE: all versions down to 1.8 (wheezy) are vulnerable
-	TODO: see if squeeze (1.6) is vulnerable
+	NOTE: issue introduced in ~2008 with the SIP timer support implementation (https://issues.asterisk.org/jira/browse/ASTERISK-4257 https://issues.asterisk.org/jira/browse/ASTERISK-5187), so squeeze also vulnerable
+	NOTE: patch for jessie / 11: https://code.asterisk.org/code/changelog/asterisk?cs=882e85388295eac8eebd0b82e71a9af0a769b41f
+	NOTE: all versions vulnerable, backport required for wheezy and squeeze-LTS
 CVE-2016-XXXX [AST-2016-001: BEAST vulnerability in HTTP server]
 	- asterisk <unfixed>
 	NOTE: http://downloads.digium.com/pub/security/AST-2016-001.html
 	NOTE: https://issues.asterisk.org/jira/browse/ASTERISK-24972
-	NOTE: all versions down to 1.8 (wheezy) are vulnerable
-	TODO: see if squeeze (1.6) is vulnerable
+	NOTE: patch for 11 (jessie): https://code.asterisk.org/code/changelog/asterisk?cs=f233bcd81d85626ce5bdd27b05bc95d131faf3e4
+	NOTE: all versions vulnerable, backport required for wheezy and squeeze-LTS
 CVE-2016-XXXX [simpleid: passwords are stored as MD5]
 	- simpleid <unfixed> (bug #813611)
 CVE-2016-XXXX [XSS in Horde_Core_VarRenderer_Html]




More information about the Secure-testing-commits mailing list