Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:deb/debian/asterisk@1:13.1.0~dfsg-1?distro=sid
purl pkg:deb/debian/asterisk@1:13.1.0~dfsg-1?distro=sid
Vulnerabilities affecting this package (0)
Vulnerability Summary Fixed by
This package is not known to be affected by vulnerabilities.
Vulnerabilities fixed by this package (8)
Vulnerability Summary Aliases
VCID-7tjs-ybpe-r7hg Multiple vulnerabilities have been found in Asterisk, the worst of which could lead to Denial of Service, bypass intended ACL restrictions or allow an authenticated user to gain escalated privileges. CVE-2014-8417
VCID-8shw-ev6h-dqgh Multiple vulnerabilities have been found in Asterisk, the worst of which could lead to Denial of Service, bypass intended ACL restrictions or allow an authenticated user to gain escalated privileges. CVE-2014-8414
VCID-ay1n-kp3k-37db Race condition in the chan_pjsip channel driver in Asterisk Open Source 12.x before 12.7.1 and 13.x before 13.0.1 allows remote attackers to cause a denial of service (assertion failure and crash) via a cancel request for a SIP session with a queued action to (1) answer a session or (2) send ringing. CVE-2014-8415
VCID-bbhx-pe8h-fubn Multiple vulnerabilities have been found in Asterisk, the worst of which could lead to Denial of Service, bypass intended ACL restrictions or allow an authenticated user to gain escalated privileges. CVE-2014-8418
VCID-edp8-yh2h-xuck Multiple vulnerabilities have been found in Asterisk, the worst of which could lead to Denial of Service, bypass intended ACL restrictions or allow an authenticated user to gain escalated privileges. CVE-2014-9374
VCID-f1y5-37zk-x3ey The res_pjsip_acl module in Asterisk Open Source 12.x before 12.7.1 and 13.x before 13.0.1 does not properly create and load ACLs defined in pjsip.conf at startup, which allows remote attackers to bypass intended PJSIP ACL rules. CVE-2014-8413
VCID-mcfv-fuk8-cqaq Multiple vulnerabilities have been found in Asterisk, the worst of which could lead to Denial of Service, bypass intended ACL restrictions or allow an authenticated user to gain escalated privileges. CVE-2014-8412
VCID-sqgd-ykvk-2qay Use-after-free vulnerability in the PJSIP channel driver in Asterisk Open Source 12.x before 12.7.1 and 13.x before 13.0.1, when using the res_pjsip_refer module, allows remote attackers to cause a denial of service (crash) via an in-dialog INVITE with Replaces message, which triggers the channel to be hung up. CVE-2014-8416

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-16T12:35:26.488274+00:00 Debian Importer Fixing VCID-f1y5-37zk-x3ey https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:56:38.308949+00:00 Debian Importer Fixing VCID-bbhx-pe8h-fubn https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:49:41.357974+00:00 Debian Importer Fixing VCID-7tjs-ybpe-r7hg https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:46:48.916121+00:00 Debian Importer Fixing VCID-ay1n-kp3k-37db https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:10:50.486579+00:00 Debian Importer Fixing VCID-sqgd-ykvk-2qay https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:02:52.103493+00:00 Debian Importer Fixing VCID-mcfv-fuk8-cqaq https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:20:34.297160+00:00 Debian Importer Fixing VCID-edp8-yh2h-xuck https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:52:45.433612+00:00 Debian Importer Fixing VCID-8shw-ev6h-dqgh https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-12T17:46:40.037191+00:00 Debian Importer Fixing VCID-bbhx-pe8h-fubn https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:40.001828+00:00 Debian Importer Fixing VCID-7tjs-ybpe-r7hg https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:39.963063+00:00 Debian Importer Fixing VCID-sqgd-ykvk-2qay https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:39.932633+00:00 Debian Importer Fixing VCID-ay1n-kp3k-37db https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:39.866974+00:00 Debian Importer Fixing VCID-f1y5-37zk-x3ey https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:39.833692+00:00 Debian Importer Fixing VCID-mcfv-fuk8-cqaq https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:14:28.747751+00:00 Debian Importer Fixing VCID-edp8-yh2h-xuck https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:57:34.595166+00:00 Debian Importer Fixing VCID-8shw-ev6h-dqgh https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-02T17:17:11.284448+00:00 Debian Importer Fixing VCID-f1y5-37zk-x3ey https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:14:01.243280+00:00 Debian Importer Fixing VCID-bbhx-pe8h-fubn https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:13:29.635458+00:00 Debian Importer Fixing VCID-7tjs-ybpe-r7hg https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:09:25.065771+00:00 Debian Importer Fixing VCID-ay1n-kp3k-37db https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:07:13.292659+00:00 Debian Importer Fixing VCID-sqgd-ykvk-2qay https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:06:50.342867+00:00 Debian Importer Fixing VCID-mcfv-fuk8-cqaq https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:04:36.566078+00:00 Debian Importer Fixing VCID-edp8-yh2h-xuck https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:03:00.009195+00:00 Debian Importer Fixing VCID-8shw-ev6h-dqgh https://security-tracker.debian.org/tracker/data/json 38.1.0