Package: asterisk Version: 1:1.6.1.0~dfsg~rc3-1 Severity: important Tags: security patch
Hi, the following CVE (Common Vulnerabilities & Exposures) id was published for asterisk. CVE-2010-1224[0]: | main/acl.c in Asterisk Open Source 1.6.0.x before 1.6.0.25, 1.6.1.x | before 1.6.1.17, and 1.6.2.x before 1.6.2.5 does not properly enforce | remote host access controls when CIDR notation "/0" is used in permit= | and deny= configuration rules, which causes an improper arithmetic | shift and might allow remote attackers to bypass ACL rules and access | services from unauthorized hosts. If you fix the vulnerability please also make sure to include the CVE id in your changelog entry. Patch: http://downloads.asterisk.org/pub/security/AST-2010-003-1.6.2.diff For further information see: [0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1224 http://security-tracker.debian.org/tracker/CVE-2010-1224 -- Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0AAAA For security reasons, all text in this mail is double-rot13 encrypted.
pgpb0KnDHOz0O.pgp
Description: PGP signature