oss-sec mailing list archives

Re: CVE request: Asterisk


From: "Matthew Jordan" <mjordan () digium com>
Date: Fri, 06 Jul 2012 16:26:16 -0500 (CDT)

AST-2012-010 uses CVE-2012-3863.  The appropriate documents have been
updated to reflect the assigned CVE.

Thanks

--
Matthew Jordan
Digium, Inc. | Software Developer
445 Jan Davis Drive NW - Huntsville, AL 35806 - USA
Check us out at: http://digium.com & http://asterisk.org

----- Original Message -----
From: "Kurt Seifried" <kseifried () redhat com>
To: oss-security () lists openwall com
Cc: "Moritz Muehlenhoff" <jmm () debian org>, "Asterisk Security Team" <security () asterisk org>
Sent: Friday, July 6, 2012 12:21:14 PM
Subject: Re: [oss-security] CVE request:  Asterisk

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 07/06/2012 08:55 AM, Moritz Muehlenhoff wrote:
Hi,

2. asterisk: Possible resource leak on uncompleted re-invite
transactions
http://downloads.asterisk.org/pub/security/AST-2012-010.html

Cheers, Moritz

This issue does not appear to have a CVE yet ("TBD"). If you like I
can assign one for it. Otherwise if you have gotten a CVE for it
please reply (and include OSS-security so everyone knows =). Thanks.


- --
Kurt Seifried Red Hat Security Response Team (SRT)
PGP: 0x5E267993 A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993



-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iQIcBAEBAgAGBQJP9x6KAAoJEBYNRVNeJnmTSaQQAJgQX10VvuD15Yqp5ud/huKp
riOx3tkR7Zg+8YHXjHyghqeB6pdW+j9bFdKs8M7xszJZIiTGMvBu51rHG2dDmssG
a2Yvmw+y4rQFKxuz3gET7mPPD3dZ7fj1c5tj9omG6S3groVHk0DJt+t+NhpYCnjf
OOpe6+h+cvszU9coYgVDnMkjzOK70aPonW/SUrYYgNQMVrUcG+w/8MMi+ViO8vTu
eZC4SruIEeUvumwiU/Mp+U95v6/wo2AQwkJVCqoI5sKO6eDzqw3W7quFrTvxdx8z
xSHNMPslvK02whJM88ciAvAnxVTZOo1SHZQLyGI6G+EVc6D9gfW+uDpSttfgejBg
J73dxSC3yFLD9kk+SgdlJSwxgGaeUwGqquYgcH6XUkvyLcOz3K3/Zitrf2Ki3V+3
fLdvqy54tNqWZgp66wToKu7qaGw3w7Gr18A3jlipNTjY6udmlIEb5pZZHlVN3Y9W
RxlcBMRymB6Z/Ya3rxS2HwjmIPAhdb0wCjLquo2hS3zKkuUgiMpFK9vVXIFN4reG
pTVCdgUifzGZGXtp3g4G/LXuytH8B625nNMUpZIJyWv3dRr8/JybOx17jyNyZYhJ
dLPDEGa5ay/qQE/3BZ0QIDq43BmaOmsNCXWpR7bFTOYxwJC7M7UyMzUUXR2PW6vx
PZe6x+BEW8HAiolJpuOm
=ln6p
-----END PGP SIGNATURE-----



Current thread: