Bug#435521: closed by Mark Purcell <msp at debian.org> (Re: Asterisk SIP DOS Vulnerability)
Mark Purcell
msp at debian.org
Wed Aug 8 17:28:09 UTC 2007
On Wed, 8 Aug 2007, Lionel Elie Mamane wrote:
> Yes, but we should still fix that in stable, not only unstable.
Yes I wasn't suggesting that we don't fix it in stable, but rather that a
fix was available and had been uploaded to Debian (unstable). The BTS
supports version tracking and even though the bug maybe closed, these
security issues are still listed as open for asterisk in etch.
Of course if we have a way of testing the fix in unstable is is valid
that's even better.
Of course fixing the plethora of security fixes against asterisk 1.2 is an
issue and a fair amount of work. Whilst digium continues to provide supported
releases of 1.2.x with bug fixes, by rights we should be only taking
the diff's and applying them to debian stable via the debian security team, which
is a job in itself.
We are maintaining uptodate asterisk 1.2 packages built against stable (etch) via
http://buildserver.net, but that is using the latest asterisk 1.2 upstream
release and isn't a suitable security fix for upload to stable. (but would be a lot
less work and would get the fixes into stable v.quickly)
security team. This is an issue, we (pkg-voip) are aware we are well behind the
curve on this, but were wondering if you have any ideas on a way to better manage?
Mark
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 189 bytes
Desc: This is a digitally signed message part.
Url : http://lists.alioth.debian.org/pipermail/pkg-voip-maintainers/attachments/20070808/07d17fa0/attachment.pgp
More information about the Pkg-voip-maintainers
mailing list