From ${URL} : No size checking is done when setting the user field on a CDR. Thus, it is possible for someone to use an arbitrarily large string and write past the end of the user field storage buffer. This allows the possibility of remote code injection. External References: http://downloads.asterisk.org/pub/security/AST-2017-001.html Upstream patches: [Asterisk 13] http://downloads.asterisk.org/pub/security/AST-2017-001-13.diff [Asterisk 14] http://downloads.asterisk.org/pub/security/AST-2017-001-14.diff Upstream bug: https://issues.asterisk.org/jira/browse/ASTERISK-26897 @maintainer(s): after the bump, in case we need to stabilize the package, please let us know if it is ready for the stabilization or not.
Doesn't affect our stable version (11.25.1). I bumped to masked v13.x release (https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=ddf1da777ba1363c0c0aea3729a9a519d7da2ddc). All done, repository is clean.