Author: apo
Date: 2017-10-05 10:00:49 +0000 (Thu, 05 Oct 2017)
New Revision: 56425

Modified:
   data/CVE/list
Log:
asterisk,CVE-2017-14099,CVE-2017-14603: Ignored for Wheezy

The strictrtp option is disabled by default in Wheezy. This makes it impossible
to exploit the vulnerability. The patch is also too intrusive to backport.


Modified: data/CVE/list
===================================================================
--- data/CVE/list       2017-10-05 09:56:00 UTC (rev 56424)
+++ data/CVE/list       2017-10-05 10:00:49 UTC (rev 56425)
@@ -1218,6 +1218,7 @@
        RESERVED
        {DSA-3990-1}
        - asterisk 1:13.17.2~dfsg-1 (bug #876328)
+       [wheezy] - asterisk <ignored> (strictrtp option is disabled by default. 
Too intrusive too backport)
        NOTE: http://downloads.asterisk.org/pub/security/AST-2017-008.html
        NOTE: https://issues.asterisk.org/jira/browse/ASTERISK-27274
        NOTE: https://issues.asterisk.org/jira/browse/ASTERISK-27252
@@ -2732,6 +2733,7 @@
 CVE-2017-14099 (In res/res_rtp_asterisk.c in Asterisk 11.x before 11.25.2, 
13.x before ...)
        {DSA-3964-1}
        - asterisk 1:13.17.1~dfsg-1 (bug #873907)
+       [wheezy] - asterisk <ignored> (strictrtp option is disabled by default. 
Too intrusive too backport)
        NOTE: https://issues.asterisk.org/jira/browse/ASTERISK-27013
        NOTE: Fix: https://gerrit.asterisk.org/#/q/topic:ASTERISK-27013
 CVE-2017-14077


_______________________________________________
Secure-testing-commits mailing list
Secure-testing-commits@lists.alioth.debian.org
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/secure-testing-commits

Reply via email to