Debian Package Tracker
Register | Log in
Subscribe

asterisk

Open Source Private Branch Exchange (PBX)

Choose email to subscribe with

general
  • source: asterisk (main)
  • version: 1:20.1.0~dfsg+~cs6.12.40431414-1
  • maintainer: Debian VoIP Team (archive) (DMD)
  • uploaders: Jeremy Lainé [DMD] – Jonas Smedegaard [DMD] – Tzafrir Cohen [DMD] – Bernhard Schmidt [DMD] – Mark Purcell [DMD]
  • arch: all any
  • std-ver: 4.6.2
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • o-o-stable: 1:13.14.1~dfsg-2+deb9u4
  • o-o-sec: 1:13.14.1~dfsg-2+deb9u6
  • oldstable: 1:16.2.1~dfsg-1+deb10u2
  • old-sec: 1:16.28.0~dfsg-0+deb10u2
  • old-bpo: 1:16.16.1~dfsg-1+deb11u1~bpo10+1
  • stable: 1:16.16.1~dfsg-1+deb11u1
  • stable-sec: 1:16.28.0~dfsg-0+deb11u2
  • stable-p-u: 1:16.28.0~dfsg-0+deb11u2
  • testing: 1:20.1.0~dfsg+~cs6.12.40431414-1
  • unstable: 1:20.1.0~dfsg+~cs6.12.40431414-1
versioned links
  • 1:13.14.1~dfsg-2+deb9u4: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1:13.14.1~dfsg-2+deb9u6: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1:16.2.1~dfsg-1+deb10u2: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1:16.16.1~dfsg-1+deb11u1~bpo10+1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1:16.16.1~dfsg-1+deb11u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1:16.28.0~dfsg-0+deb10u2: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1:16.28.0~dfsg-0+deb11u2: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1:20.1.0~dfsg+~cs6.12.40431414-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • asterisk (21 bugs: 0, 15, 6, 0)
  • asterisk-config (1 bugs: 0, 0, 1, 0)
  • asterisk-dahdi
  • asterisk-dev
  • asterisk-doc
  • asterisk-mobile
  • asterisk-modules
  • asterisk-mp3
  • asterisk-mysql
  • asterisk-ooh323
  • asterisk-tests
action needed
Debci reports failed tests high
  • unstable: pass (log)
    The tests ran in 0:03:15
    Last run: 2023-03-01T11:27:11.000Z
    Previous status: pass

  • testing: pass (log)
    The tests ran in 0:03:19
    Last run: 2023-03-16T12:22:33.000Z
    Previous status: pass

  • stable: fail (log)
    The tests ran in 0:04:46
    Last run: 2023-03-08T04:30:20.000Z
    Previous status: fail

Created: 2022-12-23 Last update: 2023-03-21 11:38
Marked for autoremoval on 26 March: #1031046, #1032092 high
Version 1:20.1.0~dfsg+~cs6.12.40431414-1 of asterisk is marked for autoremoval from testing on Sun 26 Mar 2023. It is affected by #1031046, #1032092. The removal of asterisk will also cause the removal of (transitive) reverse dependencies: asterisk-flite, asterisk-prompt-de. You should try to prevent the removal by fixing these RC bugs.
Created: 2023-02-17 Last update: 2023-03-21 11:35
Problems while searching for a new upstream version high
uscan had problems while searching for a new upstream version:
failed to parse XML: <dehs>
uscan: Newest version of asterisk on remote site is 20.2.0, local version is 20.1.0
       (mangled local version is 20.1.0)
uscan:  => Newer package available from:
        => https://downloads.asterisk.org/pub/telephony/asterisk/releases/asterisk-20.2.0.tar.gz
Created: 2022-02-04 Last update: 2023-03-21 09:00
3 security issues in sid high

There are 3 open security issues in sid.

3 important issues:
  • CVE-2022-23537: PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. Buffer overread is possible when parsing a specially crafted STUN message with unknown attribute. The vulnerability affects applications that uses STUN including PJNATH and PJSUA-LIB. The patch is available as a commit in the master branch (2.13.1).
  • CVE-2022-23547: PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. This issue is similar to GHSA-9pfh-r8x4-w26w. Possible buffer overread when parsing a certain STUN message. The vulnerability affects applications that uses STUN including PJNATH and PJSUA-LIB. The patch is available as commit in the master branch.
  • CVE-2022-39269: PJSIP is a free and open source multimedia communication library written in C. When processing certain packets, PJSIP may incorrectly switch from using SRTP media transport to using basic RTP upon SRTP restart, causing the media to be sent insecurely. The vulnerability impacts all PJSIP users that use SRTP. The patch is available as commit d2acb9a in the master branch of the project and will be included in version 2.13. Users are advised to manually patch or to upgrade. There are no known workarounds for this vulnerability.
Created: 2022-08-11 Last update: 2023-02-28 00:07
3 security issues in bookworm high

There are 3 open security issues in bookworm.

3 important issues:
  • CVE-2022-23537: PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. Buffer overread is possible when parsing a specially crafted STUN message with unknown attribute. The vulnerability affects applications that uses STUN including PJNATH and PJSUA-LIB. The patch is available as a commit in the master branch (2.13.1).
  • CVE-2022-23547: PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. This issue is similar to GHSA-9pfh-r8x4-w26w. Possible buffer overread when parsing a certain STUN message. The vulnerability affects applications that uses STUN including PJNATH and PJSUA-LIB. The patch is available as commit in the master branch.
  • CVE-2022-39269: PJSIP is a free and open source multimedia communication library written in C. When processing certain packets, PJSIP may incorrectly switch from using SRTP media transport to using basic RTP upon SRTP restart, causing the media to be sent insecurely. The vulnerability impacts all PJSIP users that use SRTP. The patch is available as commit d2acb9a in the master branch of the project and will be included in version 2.13. Users are advised to manually patch or to upgrade. There are no known workarounds for this vulnerability.
Created: 2022-08-11 Last update: 2023-02-28 00:07
lintian reports 2 errors and 18 warnings high
Lintian reports 2 errors and 18 warnings about this package. You should make the package lintian clean getting rid of them.
Created: 2023-01-13 Last update: 2023-02-03 06:02
Does not build reproducibly during testing normal
A package building reproducibly enables third parties to verify that the source matches the distributed binaries. It has been identified that this source package produced different results, failed to build or had other issues in a test environment. Please read about how to improve the situation!
Created: 2023-03-06 Last update: 2023-03-21 10:38
debian/patches: 15 patches to forward upstream low

Among the 16 debian patches available in version 1:20.1.0~dfsg+~cs6.12.40431414-1 of the package, we noticed the following issues:

  • 15 patches where the metadata indicates that the patch has not yet been forwarded upstream. You should either forward the patch upstream or update the metadata to document its real status.
Created: 2023-02-26 Last update: 2023-02-27 20:59
Build log checks report 2 warnings low
Build log checks report 2 warnings
Created: 2022-03-14 Last update: 2022-03-14 08:25
Issues found with some translations low

Automatic checks made by the Debian l10n team found some issues with the translations contained in this package. You should check the l10n status report for more information.

Issues can be things such as missing translations, problematic translated strings, outdated PO files, unknown languages, etc.

Created: 2020-02-26 Last update: 2020-02-26 10:49
testing migrations
  • This package will soon be part of the auto-openldap transition. You might want to ensure that your package is ready for it. You can probably find supplementary information in the debian-release archives or in the corresponding release.debian.org bug.
news
[rss feed]
  • [2023-02-23] Accepted asterisk 1:16.28.0~dfsg-0+deb11u2 (source) into proposed-updates (Debian FTP Masters) (signed by: Markus Koschany)
  • [2023-02-23] Accepted asterisk 1:16.28.0~dfsg-0+deb11u2 (source) into stable-security (Debian FTP Masters) (signed by: Markus Koschany)
  • [2023-02-22] Accepted asterisk 1:16.28.0~dfsg-0+deb10u2 (source) into oldstable (Markus Koschany)
  • [2023-01-16] asterisk 1:20.1.0~dfsg+~cs6.12.40431414-1 MIGRATED to testing (Debian testing watch)
  • [2023-01-13] Accepted asterisk 1:20.1.0~dfsg+~cs6.12.40431414-1 (source) into unstable (Jonas Smedegaard)
  • [2023-01-07] Accepted asterisk 1:20.1.0~~rc2~dfsg+~cs6.12.40431414-1 (source) into experimental (Jonas Smedegaard)
  • [2022-12-10] asterisk 1:20.0.1~dfsg+~cs6.12.40431414-1 MIGRATED to testing (Debian testing watch)
  • [2022-12-08] Accepted asterisk 1:20.0.1~dfsg+~cs6.12.40431414-1 (source) into unstable (Jonas Smedegaard)
  • [2022-11-19] Accepted asterisk 1:16.28.0~dfsg-0+deb11u1 (source) into proposed-updates (Debian FTP Masters) (signed by: Markus Koschany)
  • [2022-11-17] Accepted asterisk 1:16.28.0~dfsg-0+deb11u1 (source) into stable-security (Debian FTP Masters) (signed by: Markus Koschany)
  • [2022-11-17] Accepted asterisk 1:16.28.0~dfsg-0+deb10u1 (source) into oldstable (Markus Koschany)
  • [2022-11-13] asterisk 1:20.0.0~dfsg+~cs6.12.40431414-2 MIGRATED to testing (Debian testing watch)
  • [2022-11-10] Accepted asterisk 1:20.0.0~dfsg+~cs6.12.40431414-2 (source) into unstable (Jonas Smedegaard)
  • [2022-10-19] Accepted asterisk 1:20.0.0~dfsg+~cs6.12.40431414-1 (source all amd64) into unstable (Jonas Smedegaard)
  • [2022-10-08] Accepted asterisk 1:20.0.0~~rc2~dfsg+~cs6.12.40431414-1 (source) into experimental (Jonas Smedegaard)
  • [2022-09-20] Accepted asterisk 1:20.0.0~~rc1~dfsg+~cs6.12.40431414-1 (source) into experimental (Jonas Smedegaard)
  • [2022-08-27] asterisk 1:18.14.0~dfsg+~cs6.12.40431414-1 MIGRATED to testing (Debian testing watch)
  • [2022-08-23] Accepted asterisk 1:18.14.0~dfsg+~cs6.12.40431414-1 (source) into unstable (Jonas Smedegaard)
  • [2022-08-01] asterisk 1:18.14.0~~rc1~dfsg+~cs6.12.40431414-1 MIGRATED to testing (Debian testing watch)
  • [2022-07-30] Accepted asterisk 1:18.14.0~~rc1~dfsg+~cs6.12.40431414-1 (source) into unstable (Jonas Smedegaard)
  • [2022-07-01] Accepted asterisk 1:16.16.1~dfsg-1+deb11u1 (source) into proposed-updates->stable-new, proposed-updates (Debian FTP Masters) (signed by: Bernhard Schmidt)
  • [2022-05-15] asterisk 1:18.12.0~dfsg+~cs6.12.40431413-1 MIGRATED to testing (Debian testing watch)
  • [2022-05-12] Accepted asterisk 1:18.12.0~dfsg+~cs6.12.40431413-1 (source) into unstable (Jonas Smedegaard)
  • [2022-04-20] asterisk 1:18.11.2~dfsg+~cs6.10.40431413-1 MIGRATED to testing (Debian testing watch)
  • [2022-04-20] asterisk 1:18.11.2~dfsg+~cs6.10.40431413-1 MIGRATED to testing (Debian testing watch)
  • [2022-04-17] Accepted asterisk 1:18.11.2~dfsg+~cs6.10.40431413-1 (source) into unstable (Jonas Smedegaard)
  • [2022-04-09] asterisk 1:18.11.1~dfsg+~cs6.10.40431413-1 MIGRATED to testing (Debian testing watch)
  • [2022-04-06] Accepted asterisk 1:18.11.1~dfsg+~cs6.10.40431413-1 (source) into unstable (Jonas Smedegaard)
  • [2022-04-03] Accepted asterisk 1:13.14.1~dfsg-2+deb9u6 (source) into oldoldstable (Abhijith PA)
  • [2022-03-10] asterisk 1:18.10.1~dfsg+~cs6.10.40431411-1 MIGRATED to testing (Debian testing watch)
  • 1
  • 2
bugs [bug history graph]
  • all: 28
  • RC: 2
  • I&N: 18
  • M&W: 8
  • F&P: 0
  • patch: 0
links
  • homepage
  • lintian (2, 18)
  • buildd: logs, checks, reproducibility, cross
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker
  • screenshots
  • l10n (-, 98)
  • debian patches
  • debci
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 1:20.1.0~dfsg+~cs6.12.40431414-1
  • 14 bugs

Debian Package Tracker — Copyright 2013-2018 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing