Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%2Bdeb11u7?distro=sid
purl pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%2Bdeb11u7?distro=sid
Vulnerabilities affecting this package (0)
Vulnerability Summary Fixed by
This package is not known to be affected by vulnerabilities.
Vulnerabilities fixed by this package (2)
Vulnerability Summary Aliases
VCID-2qjc-yspn-xydj Asterisk is an open-source private branch exchange (PBX). Prior to versions 18.26.2, 20.14.1, 21.9.1, and 22.4.1 of Asterisk and versions 18.9-cert14 and 20.7-cert5 of certified-asterisk, trying to disallow shell commands to be run via the Asterisk command line interface (CLI) by configuring `cli_permissions.conf` (e.g. with the config line `deny=!*`) does not work which could lead to a security risk. If an administrator running an Asterisk instance relies on the `cli_permissions.conf` file to work and expects it to deny all attempts to execute shell commands, then this could lead to a security vulnerability. Versions 18.26.2, 20.14.1, 21.9.1, and 22.4.1 of Asterisk and versions 18.9-cert14 and 20.7-cert5 of certified-asterisk fix the issue. CVE-2025-47780
VCID-u91b-9huy-43hn Asterisk is an open-source private branch exchange (PBX). Prior to versions 18.26.2, 20.14.1, 21.9.1, and 22.4.1 of Asterisk and versions 18.9-cert14 and 20.7-cert5 of certified-asterisk, SIP requests of the type MESSAGE (RFC 3428) authentication do not get proper alignment. An authenticated attacker can spoof any user identity to send spam messages to the user with their authorization token. Abuse of this security issue allows authenticated attackers to send fake chat messages can be spoofed to appear to come from trusted entities. Even administrators who follow Security best practices and Security Considerations can be impacted. Therefore, abuse can lead to spam and enable social engineering, phishing and similar attacks. Versions 18.26.2, 20.14.1, 21.9.1, and 22.4.1 of Asterisk and versions 18.9-cert14 and 20.7-cert5 of certified-asterisk fix the issue. CVE-2025-47779

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-16T10:56:10.433615+00:00 Debian Importer Fixing VCID-u91b-9huy-43hn https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:27:13.985996+00:00 Debian Importer Fixing VCID-2qjc-yspn-xydj https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-12T17:46:43.244240+00:00 Debian Importer Fixing VCID-2qjc-yspn-xydj https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:43.201084+00:00 Debian Importer Fixing VCID-u91b-9huy-43hn https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-02T17:15:22.448524+00:00 Debian Importer Fixing VCID-2qjc-yspn-xydj https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:10:52.012821+00:00 Debian Importer Fixing VCID-u91b-9huy-43hn https://security-tracker.debian.org/tracker/data/json 38.1.0