[ MDVSA-2015:018 ] asterisk
Mandriva Linux Security Advisory MDVSA-2015:018 http://www.mandriva.com/en/support/security/ ____________________________________________________________
___________ Package : asterisk Date : January 8, 2015 Affected: Business Server 1.0 _______________________________________________________________________ Problem Description: Updated asterisk packages fix security vulnerability: Double free vulnerability in the WebSocket Server (res_http_websocket module) in Asterisk Open Source 11.x before 11.14.2 allows remote attackers to cause a denial of service (crash) by sending a zero length frame after a non-zero length frame (CVE-2014-9374). _______________________________________________________________________ References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9374 http://advisories.mageia.org/MGASA-2015-0010.html _______________________________________________________________________
Updated Packages: Mandriva Business Server 1/X86_64: 81aafef92e7c97b6bbd8434c474e242b mbs1/x86_64/asterisk-11.14.2-1.mbs1.x86_64.rpm dda93e3159f6dc14b15a16e03e785c6d mbs1/x86_64/asterisk-addons-11.14.2-1.mbs1.x86_64.rpm dff8d07b3864f66e20dcff37c5d77cb4 mbs1/x86_64/asterisk-devel-11.14.2-1.mbs1.x86_64.rpm 6b064592c97b1d53f036595770302e20 mbs1/x86_64/asterisk-firmware-11.14.2-1.mbs1.x86_64.rpm 732278096456a386a96839b906655421 mbs1/x86_64/asterisk-gui-11.14.2-1.mbs1.x86_64.rpm d478bede711aa7843d81286d88212ea8 mbs1/x86_64/asterisk-plugins-alsa-11.14.2-1.mbs1.x86_64.rpm 5ed14ec42661c13491e739efb326cbe6 mbs1/x86_64/asterisk-plugins-calendar-11.14.2-1.mbs1.x86_64.rpm f3b0c352a4af586271b0500c98873c5a mbs1/x86_64/asterisk-plugins-cel-11.14.2-1.mbs1.x86_64.rpm 4670b9fd07b7cdf1dc4c7a3d465468a5 mbs1/x86_64/asterisk-plugins-corosync-11.14.2-1.mbs1.x86_64.rpm fee7d4351c7042614bc458f65afe9c56 mbs1/x86_64/asterisk-plugins-curl-11.14.2-1.mbs1.x86_64.rpm 558ab4e6576aa72250a442d60f91e71b mbs1/x86_64/asterisk-plugins-dahdi-11.14.2-1.mbs1.x86_64.rpm 29bc6ef16736fe0c4ff5f811562e5fb0 mbs1/x86_64/asterisk-plugins-fax-11.14.2-1.mbs1.x86_64.rpm c9df28a3a9d6042d1eaf251ebd6a74b1 mbs1/x86_64/asterisk-plugins-festival-11.14.2-1.mbs1.x86_64.rpm 18e82c5c23ead3e458fd00a77d9e4fa6 mbs1/x86_64/asterisk-plugins-ices-11.14.2-1.mbs1.x86_64.rpm dbf6689b1a83eed16468a88101d9f7c3 mbs1/x86_64/asterisk-plugins-jabber-11.14.2-1.mbs1.x86_64.rpm 55d39478ea6cb898f079f3dacc5bf7aa mbs1/x86_64/asterisk-plugins-jack-11.14.2-1.mbs1.x86_64.rpm 88a823d6c553d4aa8b0143349dfbdd50 mbs1/x86_64/asterisk-plugins-ldap-11.14.2-1.mbs1.x86_64.rpm 94e154a1f9c2eabd7beaa8cb09b2a31f mbs1/x86_64/asterisk-plugins-lua-11.14.2-1.mbs1.x86_64.rpm c4200d468a8d14c09b3961e91ac69c03 mbs1/x86_64/asterisk-plugins-minivm-11.14.2-1.mbs1.x86_64.rpm c56cdc9b2f81c0a418e911175b0d6754 mbs1/x86_64/asterisk-plugins-mobile-11.14.2-1.mbs1.x86_64.rpm d11742a4c240bb6031b1384740dfce29 mbs1/x86_64/asterisk-plugins-mp3-11.14.2-1.mbs1.x86_64.rpm b8a5996440f595d2eb20f9062b4be128 mbs1/x86_64/asterisk-plugins-mysql-11.14.2-1.mbs1.x86_64.rpm 1530f81861f2300b4db8abcff11040ec mbs1/x86_64/asterisk-plugins-ooh323-11.14.2-1.mbs1.x86_64.rpm 70b8f9fd11e8fcffdc9939036fbe9f36 mbs1/x86_64/asterisk-plugins-osp-11.14.2-1.mbs1.x86_64.rpm 961206588c23b0e5ffd8d3d1cbc8dfaa mbs1/x86_64/asterisk-plugins-oss-11.14.2-1.mbs1.x86_64.rpm a354dfdaf710253c01395f80abcb9bae mbs1/x86_64/asterisk-plugins-pgsql-11.14.2-1.mbs1.x86_64.rpm da369952774b990bb4feb68b78e1caf7 mbs1/x86_64/asterisk-plugins-pktccops-11.14.2-1.mbs1.x86_64.rpm 2993f20fc663e2fc7f84e5cf139a11c6 mbs1/x86_64/asterisk-plugins-portaudio-11.14.2-1.mbs1.x86_64.rpm fc5e45e837d95e24a087be98cf403fd7 mbs1/x86_64/asterisk-plugins-radius-11.14.2-1.mbs1.x86_64.rpm e5bde4633013f20e24be232d203ec302 mbs1/x86_64/asterisk-plugins-saycountpl-11.14.2-1.mbs1.x86_64.rpm a99c2468bf57d1c011d78f038997d574 mbs1/x86_64/asterisk-plugins-skinny-11.14.2-1.mbs1.x86_64.rpm 7e5d10954234ae302f5e00a14d38180f mbs1/x86_64/asterisk-plugins-snmp-11.14.2-1.mbs1.x86_64.rpm 08553a02b47ac96b0033d63278517bbe mbs1/x86_64/asterisk-plugins-speex-11.14.2-1.mbs1.x86_64.rpm 4a3a99a59828c470908e5f96167daf16 mbs1/x86_64/asterisk-plugins-sqlite-11.14.2-1.mbs1.x86_64.rpm 00b9dd9a86365a1129b6ee9f0d76272a mbs1/x86_64/asterisk-plugins-tds-11.14.2-1.mbs1.x86_64.rpm 711bced0894ca0838929ed9a782de6db mbs1/x86_64/asterisk-plugins-unistim-11.14.2-1.mbs1.x86_64.rpm 7aeb39f8bc0448f7a21dd83c38dce74e mbs1/x86_64/asterisk-plugins-voicemail-11.14.2-1.mbs1.x86_64.rpm b33d31b06c7955bfa97c4ef70435e070 mbs1/x86_64/asterisk-plugins-voicemail-imap-11.14.2-1.mbs1.x86_64.rpm 0d60804315558069de6eb9eef824a35f mbs1/x86_64/asterisk-plugins-voicemail-plain-11.14.2-1.mbs1.x86_64.rpm b85a09d05e198729792a03b9b18140c9 mbs1/x86_64/lib64asteriskssl1-11.14.2-1.mbs1.x86_64.rpm 0112ed7785f2689191f863330c460239 mbs1/SRPMS/asterisk-11.14.2-1.mbs1.src.rpm _______________________________________________________________________ To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing: gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98 You can view other update advisories for Mandriva Linux at: http://www.mandriva.com/en/support/security/advisories/ If you want to report vulnerabilities, please contact security_(at)_mandriva.com
Komentarų nėra:
Rašyti komentarą