{"id":"MGASA-2015-0153","summary":"Updated asterisk packages fix CVE-2015-3008","details":"Updated asterisk packages fix security vulnerability:\n\nWhen Asterisk registers to a SIP TLS device and verifies the server,\nAsterisk will accept signed certificates that match a common name other than\nthe one Asterisk is expecting if the signed certificate has a common name\ncontaining a null byte after the portion of the common name that Asterisk\nexpected (CVE-2015-3008).\n","modified":"2026-03-25T17:45:34.560102Z","published":"2015-04-15T09:01:28Z","related":["CVE-2015-3008"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2015-0153.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=15674"},{"type":"REPORT","url":"http://downloads.asterisk.org/pub/security/AST-2015-003.html"},{"type":"REPORT","url":"http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-11.17.1"},{"type":"REPORT","url":"http://downloads.asterisk.org/pub/telephony/asterisk/asterisk-11.17.1-summary.html"}],"affected":[{"package":{"name":"asterisk","ecosystem":"Mageia:4","purl":"pkg:rpm/mageia/asterisk?arch=source&distro=mageia-4"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"11.17.1-1.mga4"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2015-0153.json"}}],"schema_version":"1.7.5","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}