[ Dave Walker (Daviey) ]
* SECURITY UPDATE: ACL not respected on SIP INVITE (LP: #491632).
- debian/patches/AST-2009-007: Additional check in channels/chan_sip.c to
check ACL for handling SIP INVITEs. This blocks calls on networks
intended to be prohibited, by configuration. Based on upstream patch.
- AST-2009-007
- CVE-2009-3723
* SECURITY UPDATE: SIP responses expose valid usernames (LP: #491637).
- debian/patches/AST-2009-008: Sanitise certain return of REGISTER message
to stop a specially crafted series of requests returning valid usernames.
Based on upstream patch.
- AST-2009-008
- CVE-2009-3727
* SECURITY UPDATE: RTP Remote Crash Vulnerability (LP: #493555).
- debian/patches/AST-2009-010: Stops Asterisk from crashing when an RTP
comfort noise payload containing 24 bytes or greater is recieved.
- AST-2009-010
- CVE-2009-4055
[ Roberto D'Auria ]
* debian/patches/iax2-heavy-traffic-fix: Stops asterisk crashing on
heavy traffic on iax2 channel, editing channels/chan_iax2.c.
Based on upstream patch. (LP: #501116)
-- Roberto D'Auria <email address hidden> Wed, 30 Dec 2009 14:49:24 +0100
This bug was fixed in the package asterisk - 1:1.6.2. 0~rc2-0ubuntu2
--------------- 2.0~rc2- 0ubuntu2) lucid; urgency=low
asterisk (1:1.6.
[ Dave Walker (Daviey) ] patches/ AST-2009- 007: Additional check in channels/chan_sip.c to patches/ AST-2009- 008: Sanitise certain return of REGISTER message patches/ AST-2009- 010: Stops Asterisk from crashing when an RTP
* SECURITY UPDATE: ACL not respected on SIP INVITE (LP: #491632).
- debian/
check ACL for handling SIP INVITEs. This blocks calls on networks
intended to be prohibited, by configuration. Based on upstream patch.
- AST-2009-007
- CVE-2009-3723
* SECURITY UPDATE: SIP responses expose valid usernames (LP: #491637).
- debian/
to stop a specially crafted series of requests returning valid usernames.
Based on upstream patch.
- AST-2009-008
- CVE-2009-3727
* SECURITY UPDATE: RTP Remote Crash Vulnerability (LP: #493555).
- debian/
comfort noise payload containing 24 bytes or greater is recieved.
- AST-2009-010
- CVE-2009-4055
[ Roberto D'Auria ] patches/ iax2-heavy- traffic- fix: Stops asterisk crashing on chan_iax2. c.
* debian/
heavy traffic on iax2 channel, editing channels/
Based on upstream patch. (LP: #501116)
-- Roberto D'Auria <email address hidden> Wed, 30 Dec 2009 14:49:24 +0100