I'll try to find one.
In Asterisk 1.2.13, an other issue has been fixed: http://cve.mitre.org
/cgi-bin/cvename.cgi?name=CVE-2006-5445
This should be probably fixed, too.
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2006-5444
--
Asterisk vulnerabilities in chan_skinny.c and
In Feisty, there is 1:1.2.13~dfsg-2ubuntu1, which fixes the issue ( it
is a security only release ). This should probably be backported.
** Changed in: asterisk (Ubuntu)
Status: Unconfirmed = Fix Released
--
Asterisk remote heap overflow
https://launchpad.net/bugs/66912
--
ubuntu-bugs
It seems to successfully build in an Edgy chroot. Sadly, I do not have
enough disk space so that I can test the full build procedure. Could
anyone try and publish it to Edgy please?
--
Asterisk remote heap overflow
https://launchpad.net/bugs/66912
--
ubuntu-bugs mailing list
Hi! If you can provide the security patch debdiff for the edgy package,
I'd be happy to get it published for edgy. It can't be a version
update, though; only a security path. For a full version backport,
you'll need to go through the MOTU SRU procedures.
--
Asterisk remote heap overflow
** Visibility changed to: Public
--
Asterisk remote heap overflow
https://launchpad.net/bugs/66912
--
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs