--------------------------------------------------------------------------------
Fedora EPEL Update Notification
FEDORA-EPEL-2014-0845
2014-03-15 16:49:07
--------------------------------------------------------------------------------
Name : asterisk
Product : Fedora EPEL 6
Version : 1.8.26.1
Release : 1.el6
URL :
http://www.asterisk.org/
Summary : The Open Source PBX
Description :
Asterisk is a complete PBX in software. It runs on Linux and provides
all of the features you would expect from a PBX and more. Asterisk
does voice over IP in three protocols, and can interoperate with
almost all standards-based telephony equipment using relatively
inexpensive hardware.
--------------------------------------------------------------------------------
Update Information:
A stack overflow flaw was found in Asterisk's cookie processing. A remote attacker
could send specially-crafted requests that would cause Asterisk to consume a large amount
of memory, crash, or, potentially, execute arbitrary code. This issue affected all 1.8.x
and 11.x versions. It has been corrected in versions 1.8.26.1 and 11.8.1.
Upstream patches:
http://downloads.asterisk.org/pub/security/AST-2014-001-1.8.diff
http://downloads.asterisk.org/pub/security/AST-2014-001-11.diff
External References:
http://downloads.asterisk.org/pub/security/AST-2014-001.html
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #1074825 - CVE-2014-2286 asterisk: cookie processing stack overflow
(AST-2014-001)
https://bugzilla.redhat.com/show_bug.cgi?id=1074825
--------------------------------------------------------------------------------
This update can be installed with the "yum" update programs. Use
su -c 'yum update asterisk' at the command line.
For more information, refer to "Managing Software with yum",
available at
http://docs.fedoraproject.org/yum/.
All packages are signed with the Fedora EPEL GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------