** Bug watch added: Debian Bug tracker #610487 http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=610487
** Also affects: asterisk (Debian) via http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=610487 Importance: Unknown Status: Unknown ** Visibility changed to: Public ** Summary changed: - CVS-2011-0495: AST-2011-001: Asterisk: Stack based buffer overflow by forming an outgoing SIP request with specially-crafted caller ID information + CVE-2011-0495: AST-2011-001: Asterisk: Stack based buffer overflow by forming an outgoing SIP request with specially-crafted caller ID information ** Description changed: Binary package hint: asterisk All of the Asterisk packages in Ubuntu need to be patched for AST-2011-001, which is tentatively CVE-2011-0495. See: http://downloads.asterisk.org/pub/security/AST-2011-001.html - Although Asterisk in currently in the universe repository, it would be + Although Asterisk in currently in the universe repository, it would nevertheless be appreciated to get the security fix. Debian already has the fix pending in their pkg-voip tree. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/705014 Title: CVE-2011-0495: AST-2011-001: Asterisk: Stack based buffer overflow by forming an outgoing SIP request with specially-crafted caller ID information -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs