Your message dated Mon, 23 Nov 2020 13:03:30 +0000
with message-id <[email protected]>
and subject line Bug#974713: fixed in asterisk 1:16.15.0~dfsg-1
has caused the Debian Bug report #974713,
regarding asterisk: CVE-2020-28242
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)
--
974713: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=974713
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Source: asterisk
Version: 1:16.12.0~dfsg-1
Severity: important
Tags: security upstream
Forwarded: https://issues.asterisk.org/jira/browse/ASTERISK-29013
X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>
Hi,
The following vulnerability was published for asterisk.
CVE-2020-28242[0]:
| An issue was discovered in Asterisk Open Source 13.x before 13.37.1,
| 16.x before 16.14.1, 17.x before 17.8.1, and 18.x before 18.0.1 and
| Certified Asterisk before 16.8-cert5. If Asterisk is challenged on an
| outbound INVITE and the nonce is changed in each response, Asterisk
| will continually send INVITEs in a loop. This causes Asterisk to
| consume more and more memory since the transaction will never
| terminate (even if the call is hung up), ultimately leading to a
| restart or shutdown of Asterisk. Outbound authentication must be
| configured on the endpoint for this to occur.
If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.
For further information see:
[0] https://security-tracker.debian.org/tracker/CVE-2020-28242
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28242
[1] https://issues.asterisk.org/jira/browse/ASTERISK-29013
[2] https://downloads.asterisk.org/pub/security/AST-2020-002.html
Please adjust the affected versions in the BTS as needed.
Regards,
Salvatore
--- End Message ---
--- Begin Message ---
Source: asterisk
Source-Version: 1:16.15.0~dfsg-1
Done: Bernhard Schmidt <[email protected]>
We believe that the bug you reported is fixed in the latest version of
asterisk, which is due to be installed in the Debian FTP archive.
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Bernhard Schmidt <[email protected]> (supplier of updated asterisk package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Mon, 23 Nov 2020 13:19:33 +0100
Source: asterisk
Architecture: source
Version: 1:16.15.0~dfsg-1
Distribution: unstable
Urgency: medium
Maintainer: Debian VoIP Team <[email protected]>
Changed-By: Bernhard Schmidt <[email protected]>
Closes: 974712 974713
Changes:
asterisk (1:16.15.0~dfsg-1) unstable; urgency=medium
.
* New upstream version 16.15.0~dfsg. fixes to CVEs
- CVE-2020-28327 / AST-2020-001 (Closes: #974712)
Remote crash in res_pjsip_session
- CVE-2020-28242 / AST-2020-002 (Closes: #974713)
Outbound INVITE loop on challenge with different nonce
Checksums-Sha1:
caa3c7eb55b2a155c29e6a17d93b29734b61e9ea 4201 asterisk_16.15.0~dfsg-1.dsc
0b5e6a6ecb5ac0982b19ce40fa43dc213af3640f 7055260
asterisk_16.15.0~dfsg.orig.tar.xz
80571a38653c22eeed04375fe2ec87a2518ccdf0 5948824
asterisk_16.15.0~dfsg-1.debian.tar.xz
21a4003384cc2350b5ab3966bd1fedb760e98769 27594
asterisk_16.15.0~dfsg-1_amd64.buildinfo
Checksums-Sha256:
5381cf6d4291b2411d42cdd3d9fdf1d297e5d4c3862edb51cd0d2591b5c0120e 4201
asterisk_16.15.0~dfsg-1.dsc
5477053d914b7391c761d3b09c5cde6e79997fb2092258b13fdd30a5ac670f1f 7055260
asterisk_16.15.0~dfsg.orig.tar.xz
35f8ca546a746aceeaa5b015236d546feb2116ce6c7a8428ba83d23e356a8fbe 5948824
asterisk_16.15.0~dfsg-1.debian.tar.xz
a69737a07b3aa84694792fff74ae5a711995b5ab94cbd31d7ee2dc25e24da218 27594
asterisk_16.15.0~dfsg-1_amd64.buildinfo
Files:
f4eb8479c11a52494a5ae1ae237860a6 4201 comm optional asterisk_16.15.0~dfsg-1.dsc
f993a66d6161e506a4a6debfab64113f 7055260 comm optional
asterisk_16.15.0~dfsg.orig.tar.xz
fe2450936480b356e920763c0abaa0fb 5948824 comm optional
asterisk_16.15.0~dfsg-1.debian.tar.xz
ff0267f74f37b2f25b8d01cc166c0582 27594 comm optional
asterisk_16.15.0~dfsg-1_amd64.buildinfo
-----BEGIN PGP SIGNATURE-----
iQJFBAEBCgAvFiEE1uAexRal3873GVbTd1B55bhQvJMFAl+7r44RHGJlcm5pQGRl
Ymlhbi5vcmcACgkQd1B55bhQvJN0yBAAiOR1qsvtiRh1S1J7qDouW0ImOmo0L8rK
9PDCYsBKtX2B8TEm89RG4M3b/OgTINkJR17VTT4mTUfJCMYhtFWMPdG7QlvaSooP
D68YutPq3jNuUuCJp+B/C7EVppyusCePeTC86Ukdds000MIMVIHCRUVruLFijxHx
Qjt4+ulLM5j/cNGI36Xq71rupS41Cq9+Xm6NNmOPcXWQRwpJuKXMxngLpZ0Nukl1
qZeFQV47oZLNfsHBWq2lPp0Oj9LSbyJb5cgSm6kZzIiHFQ/iIVdoLGRze51O7Ri2
ADPQTbcOanRIuOQnkuY6jlnH3iNJVcN3VZMoZEISPNUeEUza0/mxgv7sXPjbS1qC
dnKNeTL43ed1E7rOGthXfZrAu8Ej+TZ9+i8UZPeNbG89CnWFzsMexxUfrkqbvRGo
da02SKIrT8HLpkm5Wj0KSXF1o+feSx3cvSmXyeBzTLh8AFB8qAWH7kcP4VtNyVrH
dV2zFzm+YCBkC/8IYy0v4ZogHXncwEUFHCriDX9JBjD/zGuUX00jrucsH2P26R6j
ZDobloRFuPtYa3RFuUxzru/egfKTyP5itmCEpKYGMM6pb2TuRWFOiPWVpLy8FHQy
IHnQaoY3Nzg/4FVoA5y5RCFVM1nCEr4fT8XAJvF9NRoKW2XM+2nO2E46swbxsNAp
kV0NkPwwSY8=
=AtT1
-----END PGP SIGNATURE-----
--- End Message ---