Debian Bug report logs -
#979372
asterisk: CVE-2020-35652
Reported by: Salvatore Bonaccorso <carnil@debian.org>
Date: Tue, 5 Jan 2021 21:15:02 UTC
Severity: grave
Tags: security, upstream
Found in versions asterisk/1:16.2.1~dfsg-1+deb10u2, asterisk/1:16.15.0~dfsg-1
Reply or subscribe to this bug.
Toggle useless messages
Report forwarded
to debian-bugs-dist@lists.debian.org, carnil@debian.org, team@security.debian.org, Debian VoIP Team <pkg-voip-maintainers@lists.alioth.debian.org>
:
Bug#979372
; Package src:asterisk
.
(Tue, 05 Jan 2021 21:15:03 GMT) (full text, mbox, link).
Acknowledgement sent
to Salvatore Bonaccorso <carnil@debian.org>
:
New Bug report received and forwarded. Copy sent to carnil@debian.org, team@security.debian.org, Debian VoIP Team <pkg-voip-maintainers@lists.alioth.debian.org>
.
(Tue, 05 Jan 2021 21:15:04 GMT) (full text, mbox, link).
Message #5 received at submit@bugs.debian.org (full text, mbox, reply):
Source: asterisk
Version: 1:16.15.0~dfsg-1
Severity: grave
Tags: security upstream
Justification: user security hole
X-Debbugs-Cc: carnil@debian.org, Debian Security Team <team@security.debian.org>
Control: found -1 1:16.2.1~dfsg-1+deb10u2
Hi,
The following vulnerability was published for asterisk.
Rationale: Choosed RC severity orthogonally to a potential no-dsa
decision, but ideally it get fixed in time for the bullseye release.
CVE-2020-35652[0]:
| remote crash in res_pjsip_diversion
If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.
For further information see:
[0] https://security-tracker.debian.org/tracker/CVE-2020-35652
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35652
[1] https://issues.asterisk.org/jira/browse/ASTERISK-29191
[2] https://issues.asterisk.org/jira/browse/ASTERISK-29219
[3] https://downloads.asterisk.org/pub/security/AST-2020-003.html
[4] https://downloads.asterisk.org/pub/security/AST-2020-004.html
Regards,
Salvatore
Marked as found in versions asterisk/1:16.2.1~dfsg-1+deb10u2.
Request was from Salvatore Bonaccorso <carnil@debian.org>
to submit@bugs.debian.org
.
(Tue, 05 Jan 2021 21:15:04 GMT) (full text, mbox, link).
Send a report that this bug log contains spam.
Debian bug tracking system administrator <owner@bugs.debian.org>.
Last modified:
Sat Jan 9 11:54:06 2021;
Machine Name:
bembo
Debian Bug tracking system
Debbugs is free software and licensed under the terms of the GNU
Public License version 2. The current version can be obtained
from https://bugs.debian.org/debbugs-source/.
Copyright © 1999 Darren O. Benham,
1997,2003 nCipher Corporation Ltd,
1994-97 Ian Jackson,
2005-2017 Don Armstrong, and many other contributors.