Accepted asterisk 1:16.28.0~dfsg-0+deb11u2 (source) into proposed-updates
- To: debian-changes@lists.debian.org
- Subject: Accepted asterisk 1:16.28.0~dfsg-0+deb11u2 (source) into proposed-updates
- From: Debian FTP Masters <ftpmaster@ftp-master.debian.org>
- Date: Thu, 23 Feb 2023 19:32:08 +0000
- Debian: DAK
- Debian-architecture: source
- Debian-archive-action: accept
- Debian-changes: asterisk_16.28.0~dfsg-0+deb11u2_source.changes
- Debian-source: asterisk
- Debian-suite: proposed-updates
- Debian-version: 1:16.28.0~dfsg-0+deb11u2
- Dkim-signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=ftp-master.debian.org; s=smtpauto.fasolo; h=Date:Message-Id: Content-Transfer-Encoding:Content-Type:Subject:MIME-Version:To:Reply-To:From: Cc:Content-ID:Content-Description:In-Reply-To:References; bh=ora19Sy1rXJCD+OGkDEUc+irp8mSyyWkLmEFMP/qwxA=; b=RsdpiAU2ARZmp0Ua/a/df/t8Cs PDO4nLfEykq2unhgtaKiaN5e7HJSXOH61VLKA3O7dGi5cx+qlJ93Yn6ICYmrByLk+KbEgLZODWrBV hcX5P/ZEwz7e+PJsIH27/gAYqnQDHawiUezEWYl6M3fFet2yqaVGUXUibaT3XqAgirz1Kor6mEblE HY966CEsOOtB9z252SAdgKIqpeSWejHOr1ZF/wbqVl0wccITSwCiddwOGSuV47LyV2h1bpG1FAbmd 2/XEalz5kXaMo1nHOBEUBHtQfmj9sEoBQKOQEL6EU6IkAvhsUAy2UQwdw3ZkbTbfO4pGmq2a/tF6T vSw0+2OQ==;
- Mail-followup-to: debian-devel@lists.debian.org
- Message-id: <E1pVHK4-002L4m-Kt@fasolo.debian.org>
- Reply-to: debian-devel@lists.debian.org
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Wed, 22 Feb 2023 23:17:38 CET
Source: asterisk
Architecture: source
Version: 1:16.28.0~dfsg-0+deb11u2
Distribution: bullseye-security
Urgency: high
Maintainer: Debian VoIP Team <pkg-voip-maintainers@lists.alioth.debian.org>
Changed-By: Markus Koschany <apo@debian.org>
Checksums-Sha1:
0f734efd84f8862c4bea77875dcf0ab3b5eae3cd 4359 asterisk_16.28.0~dfsg-0+deb11u2.dsc
6a4d7ae378671b1a9e30de7315cfe5438554ec9e 6841632 asterisk_16.28.0~dfsg-0+deb11u2.debian.tar.xz
90cf1e280fcc51d3e3881d5d247a6d9264cbef4d 28975 asterisk_16.28.0~dfsg-0+deb11u2_amd64.buildinfo
Checksums-Sha256:
1d69f030727f0cbef0cb099293e4a40d365177677c887f8e0db7b72abed016f6 4359 asterisk_16.28.0~dfsg-0+deb11u2.dsc
23b07c33f3d3f0c1155c77e393440dae10a8e2c37301dbb226d9c0d7104565f7 6841632 asterisk_16.28.0~dfsg-0+deb11u2.debian.tar.xz
86cf173da6651d6aa84da3c0548c60d5f66de6e32dcc8c8254400b5847a61b65 28975 asterisk_16.28.0~dfsg-0+deb11u2_amd64.buildinfo
Changes:
asterisk (1:16.28.0~dfsg-0+deb11u2) bullseye-security; urgency=high
.
* Non-maintainer upload by the LTS team.
* Fix CVE-2022-23537, CVE-2022-23547, CVE-2022-31031, CVE-2022-37325,
CVE-2022-39244, CVE-2022-39269, CVE-2022-42705, CVE-2022-42706.
Multiple security vulnerabilities have been discovered in Asterisk, an Open
Source Private Branch Exchange. Buffer overflows and other programming
errors could be exploited for launching a denial of service attack or the
execution of arbitrary code.
Files:
9071aaecde37d67f90af4dd8103ba3d0 4359 comm optional asterisk_16.28.0~dfsg-0+deb11u2.dsc
45607987235549d0ee34140ccfd29306 6841632 comm optional asterisk_16.28.0~dfsg-0+deb11u2.debian.tar.xz
b0f1ad4a41a5f43186ef96706d91146d 28975 comm optional asterisk_16.28.0~dfsg-0+deb11u2_amd64.buildinfo
-----BEGIN PGP SIGNATURE-----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=Z/WA
-----END PGP SIGNATURE-----