Name : asterisk Product : Fedora 17 Version : 10.5.2 Release : 1.fc17 URL : http://www.asterisk.org/ Summary : The Open Source PBX Description : Asterisk is a complete PBX in software. It runs on Linux and provides all of the features you would expect from a PBX and more. Asterisk does voice over IP in three protocols, and can interoperate with almost all standards-based telephony equipment using relatively inexpensive hardware.
------------------------------------------------------------------------------- - Update Information:
The Asterisk Development Team has announced security releases for Certified
Asterisk 1.8.11 and Asterisk 1.8 and 10. The available security releases are
released as versions 1.8.11-cert4, 1.8.13.1, 10.5.2, and 10.5.2-digiumphones.
These releases are available for immediate download at
http://downloads.asterisk.org/pub/telephony/asterisk/releases
The release of Asterisk 1.8.11-cert4, 1.8.13.1, 10.5.2, and 10.5.2-digiumphones
resolve the following two issues:
* If Asterisk sends a re-invite and an endpoint responds to the re-invite with
a provisional response but never sends a final response, then the SIP dialog
structure is never freed and the RTP ports for the call are never released. If
an attacker has the ability to place a call, they could create a denial of
service by using all available RTP ports.
* If a single voicemail account is manipulated by two parties simultaneously,
a condition can occur where memory is freed twice causing a crash.
These issues and their resolution are described in the security advisories.
For more information about the details of these vulnerabilities, please read
security advisories AST-2012-010 and AST-2012-011, which were released at the
same time as this announcement.
For a full list of changes in the current releases, please see the ChangeLogs:
ChangeLog-1.8.11-cert4 ChangeLog-1.8.13.1 http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-10.5.2
ChangeLog-10.5.2-digiumphones
The security advisories are available at:
* http://downloads.asterisk.org/pub/security/AST-2012-010.pdf
* http://downloads.asterisk.org/pub/security/AST-2012-011.pdf ------------------------------------------------------------------------------- - ChangeLog:
* Thu Jul 5 2012 Jeffrey Ollie <jeff@ocjtech.us> - 10.5.2-1: - The Asterisk Development Team has announced security releases for Certified - Asterisk 1.8.11 and Asterisk 1.8 and 10. The available security releases are - released as versions 1.8.11-cert4, 1.8.13.1, 10.5.2, and 10.5.2-digiumphones. - - These releases are available for immediate download at - http://downloads.asterisk.org/pub/telephony/asterisk/releases - - The release of Asterisk 1.8.11-cert4, 1.8.13.1, 10.5.2, and 10.5.2-digiumphones - resolve the following two issues: - - * If Asterisk sends a re-invite and an endpoint responds to the re-invite with - a provisional response but never sends a final response, then the SIP dialog - structure is never freed and the RTP ports for the call are never released. If - an attacker has the ability to place a call, they could create a denial of - service by using all available RTP ports. - - * If a single voicemail account is manipulated by two parties simultaneously, - a condition can occur where memory is freed twice causing a crash. - - These issues and their resolution are described in the security advisories. - - For more information about the details of these vulnerabilities, please read - security advisories AST-2012-010 and AST-2012-011, which were released at the - same time as this announcement. - - For a full list of changes in the current releases, please see the ChangeLogs: - - ChangeLog-1.8.11-cert4 - ChangeLog-1.8.13.1 - ChangeLog-10.5.2 - ChangeLog-10.5.2-digiumphones - - The security advisories are available at: - - * http://downloads.asterisk.org/pub/security/AST-2012-010.pdf - * http://downloads.asterisk.org/pub/security/AST-2012-011.pdf * Thu Jun 28 2012 Petr Pisar <ppisar@redhat.com> - 10.5.1-1.1 - Perl 5.16 rebuild * Fri Jun 15 2012 Jeffrey Ollie <jeff@ocjtech.us> - 10.5.1-1 - The Asterisk Development Team has announced a security release for Asterisk 10. - This security release is released as version 10.5.1. - - The release is available for immediate download at - http://downloads.asterisk.org/pub/telephony/asterisk/releases - - The release of Asterisk 10.5.1 resolves the following issue: - - * A remotely exploitable crash vulnerability was found in the Skinny (SCCP) - Channel driver. When an SCCP client sends an Off Hook message, followed by - a Key Pad Button Message, a structure that was previously set to NULL is - dereferenced. This allows remote authenticated connections the ability to - cause a crash in the server, denying services to legitimate users. - - This issue and its resolution is described in the security advisory. - - For more information about the details of this vulnerability, please read - security advisory AST-2012-009, which was released at the same time as this - announcement. - - For a full list of changes in the current releases, please see the ChangeLog: - - ChangeLog-10.5.1 - - The security advisory is available at: - - * http://downloads.asterisk.org/pub/security/AST-2012-009.pdf * Fri Jun 15 2012 Jeffrey Ollie <jeff@ocjtech.us> - 10.5.0-1 - The Asterisk Development Team has announced the release of Asterisk 10.5.0. - This release is available for immediate download at - http://downloads.asterisk.org/pub/telephony/asterisk - - The release of Asterisk 10.5.0 resolves several issues reported by the - community and would have not been possible without your participation. - Thank you! - - The following is a sample of the issues resolved in this release: - - * --- Turn off warning message when bind address is set to any. - (Closes issue ASTERISK-19456. Reported by Michael L. Young) - - * --- Prevent overflow in calculation in ast_tvdiff_ms on 32-bit - machines - (Closes issue ASTERISK-19727. Reported by Ben Klang) - - * --- Make DAHDISendCallreroutingFacility wait 5 seconds for a reply - before disconnecting the call. - (Closes issue ASTERISK-19708. Reported by mehdi Shirazi) - - * --- Fix recalled party B feature flags for a failed DTMF atxfer. - (Closes issue ASTERISK-19383. Reported by lgfsantos) - - * --- Fix DTMF atxfer running h exten after the wrong bridge ends. - (Closes issue ASTERISK-19717. Reported by Mario) - - For a full list of changes in this release, please see the ChangeLog: - - http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-10.5.0 * Mon Jun 11 2012 Petr Pisar <ppisar@redhat.com> - 10.4.2-1.1 - Perl 5.16 rebuild * Wed May 30 2012 Jeffrey Ollie <jeff@ocjtech.us> - 10.4.2-1 - The Asterisk Development Team has announced the release of Asterisk 10.4.2. - This release is available for immediate download at - http://downloads.asterisk.org/pub/telephony/asterisk - - The release of Asterisk 10.4.2 resolves several issues reported by the - community and would have not been possible without your participation. - Thank you! - - The following are the issues resolved in this release: - - * --- Resolve crash in subscribing for MWI notifications - (Closes issue ASTERISK-19827. Reported by B. R) - - * --- Fix crash in ConfBridge when user announcement is played for - more than 2 users - (Closes issue ASTERISK-19899. Reported by Florian Gilcher) - - For a full list of changes in this release, please see the ChangeLog: - - http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-10.4.2 * Wed May 30 2012 Jeffrey Ollie <jeff@ocjtech.us> - 10.4.1-1 - The Asterisk Development Team has announced security releases for Certified - Asterisk 1.8.11 and Asterisk 1.8 and 10. The available security releases are - released as versions 1.8.11-cert2, 1.8.12.1, and 10.4.1. - - These releases are available for immediate download at - http://downloads.asterisk.org/pub/telephony/asterisk/releases - - The release of Asterisk 1.8.11-cert2, 1.8.12.1, and 10.4.1 resolve the following - two issues: - - * A remotely exploitable crash vulnerability exists in the IAX2 channel - driver if an established call is placed on hold without a suggested music - class. Asterisk will attempt to use an invalid pointer to the music - on hold class name, potentially causing a crash. - - * A remotely exploitable crash vulnerability was found in the Skinny (SCCP) - Channel driver. When an SCCP client closes its connection to the server, - a pointer in a structure is set to NULL. If the client was not in the - on-hook state at the time the connection was closed, this pointer is later - dereferenced. This allows remote authenticated connections the ability to - cause a crash in the server, denying services to legitimate users. - - These issues and their resolution are described in the security advisories. - - For more information about the details of these vulnerabilities, please read - security advisories AST-2012-007 and AST-2012-008, which were released at the - same time as this announcement. - - For a full list of changes in the current releases, please see the ChangeLogs: - - ChangeLog-1.8.11-cert2 - ChangeLog-1.8.12.1 - ChangeLog-10.4.1 - - The security advisories are available at: - - * http://downloads.asterisk.org/pub/security/AST-2012-007.pdf - * http://downloads.asterisk.org/pub/security/AST-2012-008.pdf * Fri May 4 2012 Jeffrey Ollie <jeff@ocjtech.us> - 10.4.0-1 - The Asterisk Development Team has announced the release of Asterisk 10.4.0. - This release is available for immediate download at - http://downloads.asterisk.org/pub/telephony/asterisk - - The release of Asterisk 10.4.0 resolves several issues reported by the - community and would have not been possible without your participation. - Thank you! - - The following are the issues resolved in this release: - - * --- Prevent chanspy from binding to zombie channels - (Closes issue ASTERISK-19493. Reported by lvl) - - * --- Fix Dial m and r options and forked calls generating warnings - for voice frames. - (Closes issue ASTERISK-16901. Reported by Chris Gentle) - - * --- Remove ISDN hold restriction for non-bridged calls. - (Closes issue ASTERISK-19388. Reported by Birger Harzenetter) - - * --- Fix copying of CDR(accountcode) to local channels. - (Closes issue ASTERISK-19384. Reported by jamicque) - - * --- Ensure Asterisk acknowledges ACKs to 4xx on Replaces errors - (Closes issue ASTERISK-19303. Reported by Jon Tsiros) - - * --- Eliminate double close of file descriptor in manager.c - (Closes issue ASTERISK-18453. Reported by Jaco Kroon) - - For a full list of changes in this release, please see the ChangeLog: - - http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-10.4.0 ------------------------------------------------------------------------------- - References:
[ 1 ] Bug #838178 - CVE-2012-3863 asterisk: Possible resource leak on uncompleted re-invite transactions https://bugzilla.redhat.com/show_bug.cgi?id=838178 [ 2 ] Bug #838179 - CVE-2012-3812 asterisk: Remote crash vulnerability in voice mail application https://bugzilla.redhat.com/show_bug.cgi?id=838179 ------------------------------------------------------------------------------- -
This update can be installed with the "yum" update program. Use su -c 'yum update asterisk' at the command line. For more information, refer to "Managing Software with yum", available at http://docs.fedoraproject.org/yum/.
All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/keys ------------------------------------------------------------------------------- - _______________________________________________ package-announce mailing list package-announce@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/package-announce
|