From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from smtp4.osuosl.org (smtp4.osuosl.org [140.211.166.137]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.lore.kernel.org (Postfix) with ESMTPS id 9F2AFCE7A8B for ; Sun, 24 Sep 2023 21:31:51 +0000 (UTC) Received: from localhost (localhost [127.0.0.1]) by smtp4.osuosl.org (Postfix) with ESMTP id 4802E41705; Sun, 24 Sep 2023 21:31:51 +0000 (UTC) DKIM-Filter: OpenDKIM Filter v2.11.0 smtp4.osuosl.org 4802E41705 X-Virus-Scanned: amavisd-new at osuosl.org Received: from smtp4.osuosl.org ([127.0.0.1]) by localhost (smtp4.osuosl.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id pUEAA5l_UVqG; Sun, 24 Sep 2023 21:31:50 +0000 (UTC) Received: from ash.osuosl.org (ash.osuosl.org [140.211.166.34]) by smtp4.osuosl.org (Postfix) with ESMTP id 4D24741734; Sun, 24 Sep 2023 21:31:49 +0000 (UTC) DKIM-Filter: OpenDKIM Filter v2.11.0 smtp4.osuosl.org 4D24741734 Received: from smtp3.osuosl.org (smtp3.osuosl.org [140.211.166.136]) by ash.osuosl.org (Postfix) with ESMTP id 98B771BF2CC for ; Sun, 24 Sep 2023 21:31:47 +0000 (UTC) Received: from localhost (localhost [127.0.0.1]) by smtp3.osuosl.org (Postfix) with ESMTP id 721FF60E5C for ; Sun, 24 Sep 2023 21:31:47 +0000 (UTC) DKIM-Filter: OpenDKIM Filter v2.11.0 smtp3.osuosl.org 721FF60E5C X-Virus-Scanned: amavisd-new at osuosl.org Received: from smtp3.osuosl.org ([127.0.0.1]) by localhost (smtp3.osuosl.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id fmXTpEH23Vv0 for ; Sun, 24 Sep 2023 21:31:46 +0000 (UTC) Received: from relay9-d.mail.gandi.net (relay9-d.mail.gandi.net [217.70.183.199]) by smtp3.osuosl.org (Postfix) with ESMTPS id 757596080A for ; Sun, 24 Sep 2023 21:31:46 +0000 (UTC) DKIM-Filter: OpenDKIM Filter v2.11.0 smtp3.osuosl.org 757596080A Received: by mail.gandi.net (Postfix) with ESMTPSA id A526BFF805; Sun, 24 Sep 2023 21:31:44 +0000 (UTC) Received: from peko by dell.be.48ers.dk with local (Exim 4.94.2) (envelope-from ) id 1qkWhc-001yDn-11; Sun, 24 Sep 2023 23:31:44 +0200 From: Peter Korsgaard To: Yann E. MORIN References: <20230917124914.27FC687162@busybox.osuosl.org> Date: Sun, 24 Sep 2023 23:31:44 +0200 In-Reply-To: <20230917124914.27FC687162@busybox.osuosl.org> (Yann E. MORIN's message of "Sun, 17 Sep 2023 14:40:58 +0200") Message-ID: <87sf73febj.fsf@48ers.dk> User-Agent: Gnus/5.13 (Gnus v5.13) Emacs/27.1 (gnu/linux) MIME-Version: 1.0 X-GND-Sasl: peter@korsgaard.com Subject: Re: [Buildroot] [git commit] package/asterisk: security bump to version 16.30.1 X-BeenThere: buildroot@buildroot.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussion and development of buildroot List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: buildroot@buildroot.org Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Errors-To: buildroot-bounces@buildroot.org Sender: "buildroot" >>>>> "Yann" == Yann E MORIN writes: > commit: > https://git.buildroot.net/buildroot/commit/?id=01ec478cb642dc6d221ab4c2f7f2938d629dcec1 > branch: https://git.buildroot.net/buildroot/commit/?id=refs/heads/master > Fixes the following security vulnerabilities: > CVE-2022-23537: Heap buffer overflow when decoding STUN message in pjproject > Possible buffer overread when parsing a specially crafted STUN message with > unknown attribute. The vulnerability affects Asterisk users using ICE > and/or WebRTC. > https://github.com/asterisk/asterisk/security/advisories/GHSA-4xjp-22g4-9fxm > Signed-off-by: Peter Korsgaard > Signed-off-by: Yann E. MORIN Committed to 2023.02.x, 2023.05.x and 2023.08.x, thanks. -- Bye, Peter Korsgaard _______________________________________________ buildroot mailing list buildroot@buildroot.org https://lists.buildroot.org/mailman/listinfo/buildroot