Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!

Bug 526208

Summary: <net-misc/asterisk-11.13.1: Susceptibility to POODLE Vulnerability (CVE-2014-3566)
Product: Gentoo Security Reporter: Agostino Sarubbo <ago>
Component: VulnerabilitiesAssignee: Gentoo Security <security>
Severity: minor    
Priority: Normal    
Version: unspecified   
Hardware: All   
OS: Linux   
Whiteboard: B3 [glsa]
Package list:
Runtime testing required: ---

Description Agostino Sarubbo gentoo-dev 2014-10-21 10:04:27 UTC
See ${URL} for details.

@maintainer(s): since the fixed package is already in the tree, please let us know if it is ready for the stabilization or not.
Comment 1 Tony Vroon gentoo-dev 2014-10-21 10:16:04 UTC
Arches, please test and mark stable:

Target stable keywords:
amd64 x86

The recommended test procedure, requiring USE=samples, is to try to start & stop the daemon three times in succession. This requires no configuration and will confirm that the daemon is behaving normally.

The 12 branch is masked and has had vulnerable ebuilds removed. The 1.8 branch has been removed from portage.
Comment 2 Agostino Sarubbo gentoo-dev 2014-10-21 12:44:05 UTC
amd64 stable
Comment 3 Agostino Sarubbo gentoo-dev 2014-10-21 12:44:19 UTC
x86 stable.

Maintainer(s), please cleanup.
Security, please vote.
Comment 4 Tony Vroon gentoo-dev 2014-10-21 16:13:39 UTC
+  21 Oct 2014; Tony Vroon <> -asterisk-11.12.1.ebuild:
+  Remove vulnerable ebuilds now that stabilisation is complete. For security
+  bug #526208.
Comment 5 Yury German Gentoo Infrastructure gentoo-dev 2014-11-04 02:55:45 UTC
Arches and Mainter(s), Thank you for your work.

Added to an existing GLSA request.
Comment 6 GLSAMaker/CVETool Bot gentoo-dev 2014-11-23 18:20:10 UTC
This issue was resolved and addressed in
 GLSA 201411-10 at
by GLSA coordinator Sean Amoss (ackle).