Back to asterisk PTS page

Accepted asterisk 1:16.28.0~dfsg-0+deb11u2 (source) into proposed-updates



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Wed, 22 Feb 2023 23:17:38 CET
Source: asterisk
Architecture: source
Version: 1:16.28.0~dfsg-0+deb11u2
Distribution: bullseye-security
Urgency: high
Maintainer: Debian VoIP Team <pkg-voip-maintainers@lists.alioth.debian.org>
Changed-By: Markus Koschany <apo@debian.org>
Checksums-Sha1:
 0f734efd84f8862c4bea77875dcf0ab3b5eae3cd 4359 asterisk_16.28.0~dfsg-0+deb11u2.dsc
 6a4d7ae378671b1a9e30de7315cfe5438554ec9e 6841632 asterisk_16.28.0~dfsg-0+deb11u2.debian.tar.xz
 90cf1e280fcc51d3e3881d5d247a6d9264cbef4d 28975 asterisk_16.28.0~dfsg-0+deb11u2_amd64.buildinfo
Checksums-Sha256:
 1d69f030727f0cbef0cb099293e4a40d365177677c887f8e0db7b72abed016f6 4359 asterisk_16.28.0~dfsg-0+deb11u2.dsc
 23b07c33f3d3f0c1155c77e393440dae10a8e2c37301dbb226d9c0d7104565f7 6841632 asterisk_16.28.0~dfsg-0+deb11u2.debian.tar.xz
 86cf173da6651d6aa84da3c0548c60d5f66de6e32dcc8c8254400b5847a61b65 28975 asterisk_16.28.0~dfsg-0+deb11u2_amd64.buildinfo
Changes:
 asterisk (1:16.28.0~dfsg-0+deb11u2) bullseye-security; urgency=high
 .
   * Non-maintainer upload by the LTS team.
   * Fix CVE-2022-23537, CVE-2022-23547, CVE-2022-31031, CVE-2022-37325,
     CVE-2022-39244, CVE-2022-39269, CVE-2022-42705, CVE-2022-42706.
     Multiple security vulnerabilities have been discovered in Asterisk, an Open
     Source Private Branch Exchange. Buffer overflows and other programming
     errors could be exploited for launching a denial of service attack or the
     execution of arbitrary code.
Files:
 9071aaecde37d67f90af4dd8103ba3d0 4359 comm optional asterisk_16.28.0~dfsg-0+deb11u2.dsc
 45607987235549d0ee34140ccfd29306 6841632 comm optional asterisk_16.28.0~dfsg-0+deb11u2.debian.tar.xz
 b0f1ad4a41a5f43186ef96706d91146d 28975 comm optional asterisk_16.28.0~dfsg-0+deb11u2_amd64.buildinfo

-----BEGIN PGP SIGNATURE-----
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=Z/WA
-----END PGP SIGNATURE-----