git: b95041203399 - main - security/vuxml: Belatedly record vulnerabilities fixed in asterisk 18.15.1
- Go to: [ bottom of page ] [ top of archives ] [ this month ]
Date: Thu, 02 Feb 2023 20:50:13 UTC
The branch main has been updated by flo: URL: https://cgit.FreeBSD.org/ports/commit/?id=b9504120339981ca4ee256f76797438a4f037bb5 commit b9504120339981ca4ee256f76797438a4f037bb5 Author: Florian Smeets <flo@FreeBSD.org> AuthorDate: 2023-02-02 20:49:18 +0000 Commit: Florian Smeets <flo@FreeBSD.org> CommitDate: 2023-02-02 20:49:55 +0000 security/vuxml: Belatedly record vulnerabilities fixed in asterisk 18.15.1 --- security/vuxml/vuln/2023.xml | 33 +++++++++++++++++++++++++++++++++ 1 file changed, 33 insertions(+) diff --git a/security/vuxml/vuln/2023.xml b/security/vuxml/vuln/2023.xml index 99d8d5ef7d07..b6e131767780 100644 --- a/security/vuxml/vuln/2023.xml +++ b/security/vuxml/vuln/2023.xml @@ -1,3 +1,36 @@ + <vuln vid="8dd438ed-a338-11ed-b48b-589cfc0f81b0"> + <topic>sterisk -- multiple vulnerabilities</topic> + <affects> + <package> + <name>asterisk18</name> + <range><lt>18.15.1</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>The Asterisk project reports:</p> + <blockquote cite="https://www.asterisk.org/downloads/security-advisories/"> + <p>AST-2022-007: Remote Crash Vulnerability in H323 channel add on</p> + <p>AST-2022-008: Use after free in res_pjsip_pubsub.c</p> + <p>AST-2022-009: GetConfig AMI Action can read files outside of + Asterisk directory</p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2022-37325</cvename> + <cvename>CVE-2022-42705</cvename> + <cvename>CVE-2022-42706</cvename> + <url>https://downloads.asterisk.org/pub/security/AST-2022-007.html</url> + <url>https://downloads.asterisk.org/pub/security/AST-2022-008.html</url> + <url>https://downloads.asterisk.org/pub/security/AST-2022-009.html</url> + </references> + <dates> + <discovery>2022-12-01</discovery> + <entry>2023-02-02</entry> + </dates> + </vuln> + <vuln vid="c3fb48cc-a2ff-11ed-8fbc-6cf0490a8c18"> <topic>Spotipy -- Path traversal vulnerability</topic> <affects>