| Summary: | <net-misc/asterisk-11.21.1: Susceptible to BEAST attack in TLS implementation (AST-2016-001) | ||
|---|---|---|---|
| Product: | Gentoo Security | Reporter: | Kristian Fiskerstrand (RETIRED) <k_f> |
| Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
| Status: | RESOLVED FIXED | ||
| Severity: | normal | CC: | chainsaw, josh |
| Priority: | Normal | ||
| Version: | unspecified | ||
| Hardware: | All | ||
| OS: | Linux | ||
| URL: | http://downloads.asterisk.org/pub/security/AST-2016-001.html | ||
| Whiteboard: | B4 [noglsa] | ||
| Package list: | Runtime testing required: | --- | |
|
Description
Kristian Fiskerstrand (RETIRED)
2016-02-05 13:31:07 UTC
Arches, please test & mark stable: =net-misc/asterisk-11.21.1 Target keywords: AMD64 X86 Test plan: 1) emerge asterisk with USE=samples 2) /etc/init.d/asterisk start 3) wait 6 seconds 4) /etc/init.d/asterisk stop 5) wait 6 seconds 6) repeat from step 2 for 4 iterations amd64 stable x86 stable. Maintainer(s), please cleanup. Security, please vote. Vulnerable ebuild removed. GLSA Vote: No |