[Bug 1097687] Re: (CVE-2012-5976) AST-2012-014 Crashes due to large stack allocations when using TCP

Launchpad Bug Tracker 1097687 at bugs.launchpad.net
Tue Jul 30 13:49:51 UTC 2013

This bug was fixed in the package asterisk - 1:

asterisk (1: saucy; urgency=low

  * Merge from Debian unstable. (LP: #1205644) Remaining changes:
    - debian/asterisk.init:
      + chown /dev/dahdi
    - debian/control, debian/rules:
      + Enable Hardening Wrapper (PIE and BIND_NOW).
      + Build against libical 1.0.
    - debian/patches/armhf-fixes:
      + Fix FTBFS on armhf.
  * Fixed security issues:
    - CVE-2012-5976 (LP: #1097687)
    - CVE-2012-5977 (LP: #1097691)
    - CVE-2013-2686
    - CVE-2013-2264

asterisk (1: unstable; urgency=high

  * Rewrtote sip.conf parts of AST-2012-014: dropped patches
    fix-sip-tcp-no-FILE and fix-sip-tls-leak.
  * Reverting other changes rejected by the release team: README.Debian,
    powerpcspe and fix_xmpp_19532 dropped (#545272 and #701505 reopened).

asterisk (1: unstable; urgency=high

  * Patches backported from Asterisk (Closes: #697230):
    - Patch AST-2012-014 (CVE-2012-5976) - fixes Crashes due to large stack
      allocations when using TCP.
      The following two fixes were also pulled in order to easily apply it:
      - Patch fix-sip-tcp-no-FILE - Switch to reading with a recv loop
      - Patch fix-sip-tls-leak - Memory leak in the SIP TLS code
    - Patch AST-2012-015 (CVE-2012-5977) - Denial of Service Through
      Exploitation of Device State Caching
  * Patch powerpcspe: Fix OSARCH for powerpcspe (Closes: #701505).
  * README.Debian: document running the testsuite.
  * Patch fix_xmpp_19532: fix a crash of the XMPP code (Closes: #545272).
  * Patches backported from Asterisk (Closes: #704114):
    - Patch AST-2013-002 (CVE-2013-2686): Prevent DoS in HTTP server with
      a large POST.
    - Patch AST-2013-003 (CVE-2013-2264): Prevent username disclosure in
      SIP channel driver.
  * Patch bluetooth_bind - fix breakage of chan_mobile (Closes: #614786).
 -- Artur Rona <ari-tczew at tlen.pl>   Sat, 27 Jul 2013 14:56:17 +0200

** Changed in: asterisk (Ubuntu)
       Status: Incomplete => Fix Released

** CVE added: http://www.cve.mitre.org/cgi-

** CVE added: http://www.cve.mitre.org/cgi-

** CVE added: http://www.cve.mitre.org/cgi-

You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to asterisk in Ubuntu.

  (CVE-2012-5976) AST-2012-014 Crashes due to large stack allocations
  when using TCP

To manage notifications about this bug go to:

More information about the Ubuntu-server-bugs mailing list