Bug#697230: asterisk: Two security issues: AST-2012-014 / AST-2012-015
Tzafrir Cohen
tzafrir.cohen at xorcom.com
Tue Jan 8 00:45:59 UTC 2013
Hi,
On Wed, Jan 02, 2013 at 10:56:43PM +0100, Salvatore Bonaccorso wrote:
> Package: asterisk
> Severity: grave
> Tags: security
> Justification: user security hole
>
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA512
>
> Hi,
>
> the following vulnerabilities were published for asterisk.
>
> CVE-2012-5976[0]:
> Crashes due to large stack allocations when using TCP
>
> CVE-2012-5977[1]:
> Denial of Service Through Exploitation of Device State Caching
>
> If you fix the vulnerabilities please also make sure to include the
> CVE (Common Vulnerabilities & Exposures) ids in your changelog entry.
>
> For further information see:
>
> [0] http://security-tracker.debian.org/tracker/CVE-2012-5976
> [1] http://security-tracker.debian.org/tracker/CVE-2012-5977
>
> Please adjust the affected versions in the BTS as needed.
>
> According to the advisories all 1.8.x versions seems affected.
Likewise is version 1.6.2 from Stable. I have fixes ready.
On a side note, I'm not sure why
https://security-tracker.debian.org/tracker/CVE-2011-2666 is listed as
open. The respective bug has been closed:
As I mentioned before, I can change the default for alwaysauthreject,
I'm just not sure this should be done on a Stable package.
--
Tzafrir Cohen
icq#16849755 jabber:tzafrir.cohen at xorcom.com
+972-50-7952406 mailto:tzafrir.cohen at xorcom.com
http://www.xorcom.com iax:guest at local.xorcom.com/tzafrir
More information about the Pkg-voip-maintainers
mailing list