Gentoo Archives: gentoo-commits

From: "Kristian Fiskerstrand (k_f)" <k_f@g.o>
To: gentoo-commits@l.g.o
Subject: [gentoo-commits] gentoo commit in xml/htdocs/security/en/glsa: glsa-201412-51.xml
Date: Sun, 28 Dec 2014 18:47:28
Message-Id: 20141228184725.7B542E5E0@oystercatcher.gentoo.org
1 k_f 14/12/28 18:47:25
2
3 Added: glsa-201412-51.xml
4 Log:
5 GLSA 201412-51
6
7 Revision Changes Path
8 1.1 xml/htdocs/security/en/glsa/glsa-201412-51.xml
9
10 file : http://sources.gentoo.org/viewvc.cgi/gentoo/xml/htdocs/security/en/glsa/glsa-201412-51.xml?rev=1.1&view=markup
11 plain: http://sources.gentoo.org/viewvc.cgi/gentoo/xml/htdocs/security/en/glsa/glsa-201412-51.xml?rev=1.1&content-type=text/plain
12
13 Index: glsa-201412-51.xml
14 ===================================================================
15 <?xml version="1.0" encoding="UTF-8"?>
16 <?xml-stylesheet href="/xsl/glsa.xsl" type="text/xsl"?>
17 <?xml-stylesheet href="/xsl/guide.xsl" type="text/xsl"?>
18 <!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
19 <glsa id="201412-51">
20 <title>Asterisk: Multiple vulnerabilities</title>
21 <synopsis>Multiple vulnerabilities have been found in Asterisk, the worst of
22 which could lead to Denial of Service, bypass intended ACL restrictions or
23 allow an authenticated user to gain escalated privileges.
24 </synopsis>
25 <product type="ebuild">asterisk,dos,escalated,acl</product>
26 <announced>December 28, 2014</announced>
27 <revised>December 28, 2014: 1</revised>
28 <bug>530056</bug>
29 <bug>532242</bug>
30 <access>remote</access>
31 <affected>
32 <package name="net-misc/asterisk" auto="yes" arch="*">
33 <unaffected range="ge">11.14.2</unaffected>
34 <vulnerable range="lt">11.14.2</vulnerable>
35 </package>
36 </affected>
37 <background>
38 <p>Asterisk is an open source telephony engine and toolkit.</p>
39 </background>
40 <description>
41 <p>Multiple unspecified vulnerabilities have been discovered in Asterisk.
42 Please review the CVE identifiers referenced below for details.
43 </p>
44 </description>
45 <impact type="normal">
46 <p>Unauthenticated remote attackers can cause Denial of Service or bypass
47 intended ACL restrictions. Authenticated remote attackers can gain
48 escalated privileges.
49 </p>
50 </impact>
51 <workaround>
52 <p>There is no known workaround at this time.</p>
53 </workaround>
54 <resolution>
55 <p>All asterisk users should upgrade to the latest version:</p>
56
57 <code>
58 # emerge --sync
59 # emerge --ask --oneshot --verbose "&gt;=net-misc/asterisk-11.14.2"
60 </code>
61
62 </resolution>
63 <references>
64 <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8412">CVE-2014-8412</uri>
65 <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8414">CVE-2014-8414</uri>
66 <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8417">CVE-2014-8417</uri>
67 <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8418">CVE-2014-8418</uri>
68 <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9374">CVE-2014-9374</uri>
69 </references>
70 <metadata tag="requester" timestamp="Sun, 28 Dec 2014 15:16:03 +0000">K_F</metadata>
71 <metadata tag="submitter" timestamp="Sun, 28 Dec 2014 18:45:10 +0000">K_F</metadata>
72 </glsa>