Date: Thu, 2 Feb 2023 20:50:13 GMT From: Florian Smeets <flo@FreeBSD.org> To: ports-committers@FreeBSD.org, dev-commits-ports-all@FreeBSD.org, dev-commits-ports-main@FreeBSD.org Subject: git: b95041203399 - main - security/vuxml: Belatedly record vulnerabilities fixed in asterisk 18.15.1 Message-ID: <202302022050.312KoDU0098537@gitrepo.freebsd.org>
next in thread | raw e-mail | index | archive | help
The branch main has been updated by flo: URL: https://cgit.FreeBSD.org/ports/commit/?id=b9504120339981ca4ee256f76797438a4f037bb5 commit b9504120339981ca4ee256f76797438a4f037bb5 Author: Florian Smeets <flo@FreeBSD.org> AuthorDate: 2023-02-02 20:49:18 +0000 Commit: Florian Smeets <flo@FreeBSD.org> CommitDate: 2023-02-02 20:49:55 +0000 security/vuxml: Belatedly record vulnerabilities fixed in asterisk 18.15.1 --- security/vuxml/vuln/2023.xml | 33 +++++++++++++++++++++++++++++++++ 1 file changed, 33 insertions(+) diff --git a/security/vuxml/vuln/2023.xml b/security/vuxml/vuln/2023.xml index 99d8d5ef7d07..b6e131767780 100644 --- a/security/vuxml/vuln/2023.xml +++ b/security/vuxml/vuln/2023.xml @@ -1,3 +1,36 @@ + <vuln vid="8dd438ed-a338-11ed-b48b-589cfc0f81b0"> + <topic>sterisk -- multiple vulnerabilities</topic> + <affects> + <package> + <name>asterisk18</name> + <range><lt>18.15.1</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>The Asterisk project reports:</p> + <blockquote cite="https://www.asterisk.org/downloads/security-advisories/"> + <p>AST-2022-007: Remote Crash Vulnerability in H323 channel add on</p> + <p>AST-2022-008: Use after free in res_pjsip_pubsub.c</p> + <p>AST-2022-009: GetConfig AMI Action can read files outside of + Asterisk directory</p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2022-37325</cvename> + <cvename>CVE-2022-42705</cvename> + <cvename>CVE-2022-42706</cvename> + <url>https://downloads.asterisk.org/pub/security/AST-2022-007.html</url> + <url>https://downloads.asterisk.org/pub/security/AST-2022-008.html</url> + <url>https://downloads.asterisk.org/pub/security/AST-2022-009.html</url> + </references> + <dates> + <discovery>2022-12-01</discovery> + <entry>2023-02-02</entry> + </dates> + </vuln> + <vuln vid="c3fb48cc-a2ff-11ed-8fbc-6cf0490a8c18"> <topic>Spotipy -- Path traversal vulnerability</topic> <affects>
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?202302022050.312KoDU0098537>