-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- ------------------------------------------------------------------------- Debian Security Advisory DSA-4999-1
security@debian.org https://www.debian.org/security/ Moritz Muehlenhoff November 01, 2021
https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : asterisk
CVE ID : CVE-2021-32558 CVE-2021-32686
Debian Bug : 991710 991931
Multiple vulnerabilities have been discovered in Asterisk, an open
source PBX and telephony toolkit, which may result in denial of service.
For the stable distribution (bullseye), these problems have been fixed in version 1:16.16.1~dfsg-1+deb11u1.
We recommend that you upgrade your asterisk packages.
For the detailed security status of asterisk please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/asterisk
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at:
https://www.debian.org/security/
Mailing list:
debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
iQIzBAEBCgAdFiEEtuYvPRKsOElcDakFEMKTtsN8TjYFAmGAQWsACgkQEMKTtsN8 TjbHuBAAnOiNlgddEytRB5FXXukpNR+IsEb20LuwDbzPzyLST6ykpR93fsg0YSRF N4rk6wP9/tONGojuvhnsZGMubJuugzds6VD/tAybbApVPmaA99lijDVk2SsULmFx Nrum+ufrxUkI6h/ijjNxi3lm+26LbCfcSGi8DvQ2b8v7CSxEqjV/KaD4BEkL0PNJ A20l0cxrvhSyGok/Q8ON+w6DUlUjF03leLkLkRVmIGogiFz7uLr+3pDInENONq88 zi1asJuUWwaDlJaarpbG/0MQfd24DVQ+hfrRofhmH2VPAH0E+kTzwsA0fMoEvSN8 orjhc59cHmlgyjGoBD9yzR8fYal/C3eGbIswb17GIY8vBxlytumMbP0XT9dIIcXd WQIi5iX+TSj4Z0zRb99YOx8GpOOGdPbi9oz7nNztExlUIjpsiooD4PZdb0fkrFC+ 1doIrUnCwPj26XWmj8+5sw+moXOA3mzpc1aasfT5Vm4kjtX6DjEGRBb5CWDF2wVT TB1AdzDjnQb0YEheFuINfui3xAl4TmIA3cCsCiE80O4nV6f3GSjKcdznuR+NFlfV pyoPiwJB+4tlFA7lVD+HIesSjx8Kq3SPerJ/SGotPIanNYFKeA5Xv6eYkOXnI4fU htktH419EtYhBbsQTQsTCduHJtB4bJ5DYpFuBZTkZcJpzq0wPGE=
=n+Nz
-----END PGP SIGNATURE-----
--- SoupGate-Win32 v1.05
* Origin: fsxNet Usenet Gateway (21:1/5)