Debian Package Tracker
Register | Log in
Subscribe

asterisk

Open Source Private Branch Exchange (PBX)

Choose email to subscribe with

general
  • source: asterisk (main)
  • version: 1:22.4.1~dfsg+~cs6.15.60671435-1
  • maintainer: Debian VoIP Team (archive) (DMD)
  • uploaders: Jeremy Lainé [DMD] – Jonas Smedegaard [DMD] – Tzafrir Cohen [DMD] – Bernhard Schmidt [DMD] – Mark Purcell [DMD] – Chris Maj [DMD]
  • arch: all any
  • std-ver: 4.7.2
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • o-o-stable: 1:16.2.1~dfsg-1+deb10u2
  • o-o-sec: 1:16.28.0~dfsg-0+deb10u4
  • oldstable: 1:16.28.0~dfsg-0+deb11u4
  • old-sec: 1:16.28.0~dfsg-0+deb11u6
  • unstable: 1:22.4.1~dfsg+~cs6.15.60671435-1
versioned links
  • 1:16.2.1~dfsg-1+deb10u2: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1:16.28.0~dfsg-0+deb10u4: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1:16.28.0~dfsg-0+deb11u3: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1:16.28.0~dfsg-0+deb11u4: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1:16.28.0~dfsg-0+deb11u6: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1:22.3.0~dfsg+~cs6.15.60671435-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1:22.4.1~dfsg+~cs6.15.60671435-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • asterisk (21 bugs: 0, 15, 6, 0)
  • asterisk-config (1 bugs: 0, 0, 1, 0)
  • asterisk-dahdi
  • asterisk-dev
  • asterisk-doc
  • asterisk-mobile
  • asterisk-modules
  • asterisk-mp3
  • asterisk-mysql
  • asterisk-ooh323
  • asterisk-tests
action needed
Debci reports failed tests high
  • unstable: pass (log)
    The tests ran in 0:05:23
    Last run: 2025-05-15T06:38:53.000Z
    Previous status: unknown

  • testing: pass (log)
    The tests ran in 0:03:19
    Last run: 2023-03-16T12:22:33.000Z
    Previous status: unknown

  • stable: fail (log)
    The tests ran in 0:04:43
    Last run: 2023-06-06T08:30:33.000Z
    Previous status: unknown

Created: 2022-12-23 Last update: 2025-05-27 20:03
2 security issues in bullseye high

There are 2 open security issues in bullseye.

2 important issues:
  • CVE-2025-47779: Asterisk is an open-source private branch exchange (PBX). Prior to versions 18.26.2, 20.14.1, 21.9.1, and 22.4.1 of Asterisk and versions 18.9-cert14 and 20.7-cert5 of certified-asterisk, SIP requests of the type MESSAGE (RFC 3428) authentication do not get proper alignment. An authenticated attacker can spoof any user identity to send spam messages to the user with their authorization token. Abuse of this security issue allows authenticated attackers to send fake chat messages can be spoofed to appear to come from trusted entities. Even administrators who follow Security best practices and Security Considerations can be impacted. Therefore, abuse can lead to spam and enable social engineering, phishing and similar attacks. Versions 18.26.2, 20.14.1, 21.9.1, and 22.4.1 of Asterisk and versions 18.9-cert14 and 20.7-cert5 of certified-asterisk fix the issue.
  • CVE-2025-47780: Asterisk is an open-source private branch exchange (PBX). Prior to versions 18.26.2, 20.14.1, 21.9.1, and 22.4.1 of Asterisk and versions 18.9-cert14 and 20.7-cert5 of certified-asterisk, trying to disallow shell commands to be run via the Asterisk command line interface (CLI) by configuring `cli_permissions.conf` (e.g. with the config line `deny=!*`) does not work which could lead to a security risk. If an administrator running an Asterisk instance relies on the `cli_permissions.conf` file to work and expects it to deny all attempts to execute shell commands, then this could lead to a security vulnerability. Versions 18.26.2, 20.14.1, 21.9.1, and 22.4.1 of Asterisk and versions 18.9-cert14 and 20.7-cert5 of certified-asterisk fix the issue.
Created: 2025-05-23 Last update: 2025-05-27 15:57
A new upstream version is available: 22.4.1+~cs6.15.60671435 high
A new upstream version 22.4.1+~cs6.15.60671435 is available, you should consider packaging it.
Created: 2025-05-03 Last update: 2025-05-27 15:02
1 security issue in trixie high

There is 1 open security issue in trixie.

1 important issue:
  • CVE-2023-38703: PJSIP is a free and open source multimedia communication library written in C with high level API in C, C++, Java, C#, and Python languages. SRTP is a higher level media transport which is stacked upon a lower level media transport such as UDP and ICE. Currently a higher level transport is not synchronized with its lower level transport that may introduce use-after-free issue. This vulnerability affects applications that have SRTP capability (`PJMEDIA_HAS_SRTP` is set) and use underlying media transport other than UDP. This vulnerability’s impact may range from unexpected application termination to control flow hijack/memory corruption. The patch is available as a commit in the master branch.
Created: 2023-10-22 Last update: 2023-10-22 12:54
3 security issues in bookworm high

There are 3 open security issues in bookworm.

3 important issues:
  • CVE-2022-23537: PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. Buffer overread is possible when parsing a specially crafted STUN message with unknown attribute. The vulnerability affects applications that uses STUN including PJNATH and PJSUA-LIB. The patch is available as a commit in the master branch (2.13.1).
  • CVE-2022-23547: PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. This issue is similar to GHSA-9pfh-r8x4-w26w. Possible buffer overread when parsing a certain STUN message. The vulnerability affects applications that uses STUN including PJNATH and PJSUA-LIB. The patch is available as commit in the master branch.
  • CVE-2022-39269: PJSIP is a free and open source multimedia communication library written in C. When processing certain packets, PJSIP may incorrectly switch from using SRTP media transport to using basic RTP upon SRTP restart, causing the media to be sent insecurely. The vulnerability impacts all PJSIP users that use SRTP. The patch is available as commit d2acb9a in the master branch of the project and will be included in version 2.13. Users are advised to manually patch or to upgrade. There are no known workarounds for this vulnerability.
Created: 2022-08-11 Last update: 2023-03-27 11:06
1 bug tagged patch in the BTS normal
The BTS contains patches fixing 1 bug, consider including or untagging them.
Created: 2025-01-06 Last update: 2025-05-27 19:30
lintian reports 20 warnings normal
Lintian reports 20 warnings about this package. You should make the package lintian clean getting rid of them.
Created: 2025-04-10 Last update: 2025-04-10 00:30
debian/patches: 4 patches to forward upstream low

Among the 16 debian patches available in version 1:22.4.1~dfsg+~cs6.15.60671435-1 of the package, we noticed the following issues:

  • 4 patches where the metadata indicates that the patch has not yet been forwarded upstream. You should either forward the patch upstream or update the metadata to document its real status.
Created: 2023-02-26 Last update: 2025-05-27 19:33
Build log checks report 2 warnings low
Build log checks report 2 warnings
Created: 2024-03-11 Last update: 2024-03-11 02:02
Issues found with some translations low

Automatic checks made by the Debian l10n team found some issues with the translations contained in this package. You should check the l10n status report for more information.

Issues can be things such as missing translations, problematic translated strings, outdated PO files, unknown languages, etc.

Created: 2020-02-26 Last update: 2020-02-26 10:49
testing migrations
  • This package will soon be part of the auto-libxml2 transition. You might want to ensure that your package is ready for it. You can probably find supplementary information in the debian-release archives or in the corresponding release.debian.org bug.
  • excuses:
    • Migration status for asterisk (- to 1:22.4.1~dfsg+~cs6.15.60671435-1): BLOCKED: Rejected/violates migration policy/introduces a regression
    • Issues preventing migration:
    • ∙ ∙ Updating asterisk would introduce bugs in testing: #1031046
    • ∙ ∙ missing build on riscv64
    • ∙ ∙ blocked by freeze: is not in testing
    • ∙ ∙ arch:riscv64 not built yet, autopkgtest delayed there
    • ∙ ∙ autopkgtest for asterisk/1:22.4.1~dfsg+~cs6.15.60671435-1: amd64: Test in progress, arm64: Test in progress, armel: Pass, armhf: Test in progress, i386: Test in progress, ppc64el: Pass, s390x: Pass
    • ∙ ∙ autopkgtest for dahdi-linux/1:3.1.0+git20230717~dfsg-10.1: amd64: No tests, superficial or marked flaky ♻ (reference ♻), arm64: Test in progress, armel: No tests, superficial or marked flaky ♻ (reference ♻), armhf: Test in progress, i386: Test in progress, ppc64el: No tests, superficial or marked flaky ♻ (reference ♻), s390x: No tests, superficial or marked flaky ♻ (reference ♻)
    • ∙ ∙ Too young, only 1 of 20 days old
    • Additional info:
    • ∙ ∙ Piuparts tested OK - https://piuparts.debian.org/sid/source/a/asterisk.html
    • ∙ ∙ Waiting for reproducibility test results on amd64 - info ♻
    • ∙ ∙ Reproducible on arm64 - info ♻
    • ∙ ∙ Waiting for reproducibility test results on armhf - info ♻
    • ∙ ∙ Waiting for reproducibility test results on i386 - info ♻
    • Not considered
news
[rss feed]
  • [2025-05-27] Accepted asterisk 1:22.4.1~dfsg+~cs6.15.60671435-1 (source) into unstable (Jonas Smedegaard)
  • [2025-03-28] Accepted asterisk 1:22.3.0~dfsg+~cs6.15.60671435-1 (source) into unstable (Jonas Smedegaard)
  • [2025-03-26] Accepted asterisk 1:22.3.0~~rc1~dfsg+~cs6.15.60671435-1 (source) into unstable (Jonas Smedegaard)
  • [2025-02-22] Accepted asterisk 1:22.2.0~dfsg+~cs6.15.60671435-2 (source) into unstable (Jonas Smedegaard)
  • [2025-02-11] Accepted asterisk 1:22.2.0~dfsg+~cs6.15.60671435-1 (source) into unstable (Jonas Smedegaard)
  • [2025-02-05] Accepted asterisk 1:16.28.0~dfsg-0+deb11u6 (source) into oldstable-security (Daniel Leidert)
  • [2025-01-12] Accepted asterisk 1:22.1.1~dfsg+~cs6.14.60671435-1 (source) into unstable (Jonas Smedegaard)
  • [2024-11-27] Accepted asterisk 1:22.1.0~dfsg+~cs6.14.60671435-1 (source) into unstable (Jonas Smedegaard)
  • [2024-10-23] Accepted asterisk 1:22.0.0~dfsg+~cs6.14.60671435-1 (source) into unstable (Jonas Smedegaard)
  • [2024-10-20] Accepted asterisk 1:16.28.0~dfsg-0+deb11u5 (source) into oldstable-security (Thorsten Alteholz)
  • [2024-10-05] Accepted asterisk 1:22.0.0~~rc2~dfsg+~cs6.14.60671435-1 (source) into experimental (Jonas Smedegaard)
  • [2024-09-07] Accepted asterisk 1:20.9.3~dfsg+~cs6.14.60671435-1 (source) into unstable (Jonas Smedegaard)
  • [2024-06-07] Accepted asterisk 1:20.8.1~dfsg+~cs6.14.40431414-1 (source) into unstable (Jonas Smedegaard)
  • [2024-02-11] Accepted asterisk 1:16.28.0~dfsg-0+deb11u4 (source) into oldstable-proposed-updates (Debian FTP Masters) (signed by: Markus Koschany)
  • [2024-01-30] Accepted asterisk 1:20.6.0~dfsg+~cs6.13.40431414-2 (source) into unstable (Jonas Smedegaard)
  • [2024-01-26] Accepted asterisk 1:20.6.0~dfsg+~cs6.13.40431414-1 (source) into unstable (Jonas Smedegaard)
  • [2024-01-04] Accepted asterisk 1:16.28.0~dfsg-0+deb11u4 (source) into oldstable-security (Debian FTP Masters) (signed by: Markus Koschany)
  • [2023-12-28] Accepted asterisk 1:16.28.0~dfsg-0+deb10u4 (source) into oldoldstable (Markus Koschany)
  • [2023-12-22] Accepted asterisk 1:20.5.2~dfsg+~cs6.13.40431414-1 (source) into unstable (Jonas Smedegaard)
  • [2023-12-19] Accepted asterisk 1:20.5.1~dfsg+~cs6.13.40431414-1 (source) into unstable (Jonas Smedegaard)
  • [2023-11-27] Accepted asterisk 1:20.5.0~dfsg+~cs6.13.40431414-1 (source) into unstable (Jonas Smedegaard)
  • [2023-08-27] Accepted asterisk 1:20.4.0~dfsg+~cs6.13.40431414-2 (source) into unstable (Jonas Smedegaard)
  • [2023-08-04] Accepted asterisk 1:20.4.0~dfsg+~cs6.13.40431414-1 (source all amd64) into unstable (Jonas Smedegaard)
  • [2023-06-24] Accepted asterisk 1:16.28.0~dfsg-0+deb11u3 (source) into oldstable-proposed-updates (Debian FTP Masters) (signed by: Markus Koschany)
  • [2023-06-22] Accepted asterisk 1:16.28.0~dfsg-0+deb11u3 (source) into oldstable-security (Debian FTP Masters) (signed by: Markus Koschany)
  • [2023-06-21] Accepted asterisk 1:20.3.0~dfsg+~cs6.13.40431413-1 (source) into unstable (Jonas Smedegaard)
  • [2023-04-20] Accepted asterisk 1:20.2.1~dfsg+~cs6.13.40431413-1 (source) into unstable (Jonas Smedegaard)
  • [2023-04-18] Accepted asterisk 1:16.28.0~dfsg-0+deb10u3 (source) into oldstable (Markus Koschany)
  • [2023-03-28] asterisk REMOVED from testing (Debian testing watch)
  • [2023-02-23] Accepted asterisk 1:16.28.0~dfsg-0+deb11u2 (source) into proposed-updates (Debian FTP Masters) (signed by: Markus Koschany)
  • 1
  • 2
bugs [bug history graph]
  • all: 27
  • RC: 1
  • I&N: 18
  • M&W: 8
  • F&P: 0
  • patch: 1
links
  • homepage
  • lintian (0, 20)
  • buildd: logs, checks, cross
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker
  • screenshots
  • l10n (-, 98)
  • debian patches
  • debci
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 1:22.3.0~dfsg+~cs6.15.60671435-1
  • 16 bugs

Debian Package Tracker — Copyright 2013-2025 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing