lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20161025204834.5lxp2k5riz5v6m7h@pisco.westfalen.local>
Date: Tue, 25 Oct 2016 22:48:34 +0200
From: Moritz Muehlenhoff <jmm@...ian.org>
To: bugtraq@...urityfocus.com
Subject: [SECURITY] [DSA 3700-1] asterisk security update

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3700-1                   security@...ian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
October 25, 2016                      https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : asterisk
CVE ID         : CVE-2015-3008 CVE-2016-2232 CVE-2016-2316 CVE-2016-7551

Multiple vulnerabilities have been discovered in Asterisk, an open source
PBX and telephony toolkit, which may result in denial of service or
incorrect certificate validation.

For the stable distribution (jessie), these problems have been fixed in
version 1:11.13.1~dfsg-2+deb8u1.

For the unstable distribution (sid), these problems will be fixed soon.

We recommend that you upgrade your asterisk packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@...ts.debian.org
-----BEGIN PGP SIGNATURE-----
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=391k
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ