Your message dated Sat, 23 Sep 2017 19:35:06 +0000
with message-id <e1dvqcg-000fbb...@fasolo.debian.org>
and subject line Bug#876328: fixed in asterisk 1:13.17.2~dfsg-1
has caused the Debian Bug report #876328,
regarding asterisk: CVE-2017-14603: RTP/RTCP information leak (AST-2017-008)
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
876328: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=876328
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: asterisk
Version: 1:13.17.1~dfsg-1
Severity: grave
Tags: patch security upstream

Hi,

the following vulnerability was published for asterisk.

CVE-2017-14603[0]:
followup-to AST-2017-005: RTP/RTCP information leak

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2017-14603
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14603
[1] http://downloads.asterisk.org/pub/security/AST-2017-008.html

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

--- End Message ---
--- Begin Message ---
Source: asterisk
Source-Version: 1:13.17.2~dfsg-1

We believe that the bug you reported is fixed in the latest version of
asterisk, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 876...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Bernhard Schmidt <be...@debian.org> (supplier of updated asterisk package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Format: 1.8
Date: Sat, 23 Sep 2017 20:41:06 +0200
Source: asterisk
Binary: asterisk asterisk-modules asterisk-dahdi asterisk-vpb 
asterisk-voicemail asterisk-voicemail-imapstorage 
asterisk-voicemail-odbcstorage asterisk-ooh323 asterisk-mp3 asterisk-mysql 
asterisk-mobile asterisk-tests asterisk-doc asterisk-dev asterisk-config
Architecture: source
Version: 1:13.17.2~dfsg-1
Distribution: unstable
Urgency: high
Maintainer: Debian VoIP Team <pkg-voip-maintain...@lists.alioth.debian.org>
Changed-By: Bernhard Schmidt <be...@debian.org>
Description:
 asterisk   - Open Source Private Branch Exchange (PBX)
 asterisk-config - Configuration files for Asterisk
 asterisk-dahdi - DAHDI devices support for the Asterisk PBX
 asterisk-dev - Development files for Asterisk
 asterisk-doc - Source code documentation for Asterisk
 asterisk-mobile - Bluetooth phone support for the Asterisk PBX
 asterisk-modules - loadable modules for the Asterisk PBX
 asterisk-mp3 - MP3 playback support for the Asterisk PBX
 asterisk-mysql - MySQL database protocol support for the Asterisk PBX
 asterisk-ooh323 - H.323 protocol support for the Asterisk PBX - ooH323c
 asterisk-tests - internal test modules of the Asterisk PBX
 asterisk-voicemail - simple voicemail support for the Asterisk PBX
 asterisk-voicemail-imapstorage - IMAP voicemail storage support for the 
Asterisk PBX
 asterisk-voicemail-odbcstorage - ODBC voicemail storage support for the 
Asterisk PBX
 asterisk-vpb - VoiceTronix devices support for the Asterisk PBX
Closes: 876328
Changes:
 asterisk (1:13.17.2~dfsg-1) unstable; urgency=high
 .
   * New upstream version 13.17.2~dfsg
     - CVE-2017-14603 / AST-2017-008
       This is a follow-up for AST-2017-005: RTP/RTCP information leak
       improving robustness of the security fix and fixing a regression
       with re-INVITEs (Closes: #876328)
Checksums-Sha1:
 ef0627eddbf392c2780648a5a57759b4446fbb51 4268 asterisk_13.17.2~dfsg-1.dsc
 ab66abe155fa42e6e53ef3db54a8319d31acf3f9 6229408 
asterisk_13.17.2~dfsg.orig.tar.xz
 9cbffc2c2aaadcdce87814235fc0670bf8d7589d 168464 
asterisk_13.17.2~dfsg-1.debian.tar.xz
 4226c68da4a5dd5ce91d3e47e6f13db9b0264710 27353 
asterisk_13.17.2~dfsg-1_amd64.buildinfo
Checksums-Sha256:
 9554380b8410b7c74e99259f08200f2965eea05574d7224fc7ecd4ba506d4e68 4268 
asterisk_13.17.2~dfsg-1.dsc
 64cb6072183cfa635db56206bf7ba1dd761d7e067eaa83edbc23fb3c870bd086 6229408 
asterisk_13.17.2~dfsg.orig.tar.xz
 16416666303bbe2fc4ff099d81a126c4fdcb0cc1674939d1234ac422beb30b06 168464 
asterisk_13.17.2~dfsg-1.debian.tar.xz
 133760251d48c437362ca4ce4d1c3cd63213494ed2f870250052808b846e4593 27353 
asterisk_13.17.2~dfsg-1_amd64.buildinfo
Files:
 5a1291768615277d1879f4eecf1ff702 4268 comm optional asterisk_13.17.2~dfsg-1.dsc
 e8c2f7567646cc2bf2a1a5203637daef 6229408 comm optional 
asterisk_13.17.2~dfsg.orig.tar.xz
 fa7c6ca22767ad456f16fcc3c6262252 168464 comm optional 
asterisk_13.17.2~dfsg-1.debian.tar.xz
 ee681097917d19d1aa9845ebd77f6c9e 27353 comm optional 
asterisk_13.17.2~dfsg-1_amd64.buildinfo

-----BEGIN PGP SIGNATURE-----

iQJFBAEBCAAvFiEE1uAexRal3873GVbTd1B55bhQvJMFAlnGrr8RHGJlcm5pQGRl
Ymlhbi5vcmcACgkQd1B55bhQvJOWFRAAl++2sGv0jHlq1Jd3FI2kZIwwL1cvKFwg
MaRgC6KuUo5mUJT4Ys0FK/f99TfneXSkZDrDl9TRvi5BVzJwmeOTmYgS0asybbe9
jCi2M+j+/dhv1k6mBmfHOUCHzu4e1LnsLDcKyBXxDhR+SlpgUHZDNrp/T5RSP9di
xNV4w3wtL7lyWHbQHykQMobVi/Cf7p+Czg4wkU/dQ6TarWXAahBJpEg6xdCYlIPz
+EBJXvnNIx8j5+o8kYPlpQPIy/W5BP1M21Yp6/Y1x6+oc9HFFu1iUYEGf6xZRM8+
O5weqxskm6r93w9BO8NoOqgiXCSWMWJ5khW0Y11HqoV7btZTc3NTJ/7XVLmUBKKY
+YnTdxa7+RFY4wDUngYX/0sBAXw20IiAWawc3UzP0N42xYjpQGbp3ul4l+RmHnGW
cPcMun/LDi6YMyyDLad98wOhVHp2FePW9lHWrpR/SWpQ1XBGar3dCscH1lCGHGpK
to2bq2XMyY8f8o1Hvdp8SEqL5tvQvmji3lFPzHcCfMLovVbdr2GB72c/XKjm1vnq
NajzpzmlR38qkDr9ecSGb3/dTrKML0Z7qeh21gqyxOKHS6IGhP5cFxVE+UBW3fWB
1xNA9FVfcwWM1QaYn05Zw+pneIi+3pKFPxmadaeCWX1TTdsZvl1cyIqeRke20N30
3/32PJ4fhv4=
=zYu6
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to