Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%2Bdeb11u9?distro=sid
purl pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%2Bdeb11u9?distro=sid
Vulnerabilities affecting this package (0)
Vulnerability Summary Fixed by
This package is not known to be affected by vulnerabilities.
Vulnerabilities fixed by this package (4)
Vulnerability Summary Aliases
VCID-1qxc-4xk5-2feu Asterisk: Asterisk: Arbitrary code execution and file overwrite as root via insecure ast_coredumper file handling CVE-2026-23740
VCID-8kjy-xtm2-bqan Asterisk: Asterisk: Local file disclosure via unsafe XML parsing CVE-2026-23739
VCID-phb4-xaj7-byg2 Asterisk is an open source private branch exchange and telephony toolkit. Prior to versions 20.7-cert9, 20.18.2, 21.12.1, 22.8.2, and 23.2.2, the asterisk/contrib/scripts/ast_coredumper runs as root, as noted by the NOTES tag on line 689 of the ast_coredumper file. The script will source the contents of /etc/asterisk/ast_debug_tools.conf, which resides in a folder that is writeable by the asterisk user:group. Due to the /etc/asterisk/ast_debug_tools.conf file following bash semantics and it being loaded; an attacker with write permissions may add or modify the file such that when the root ast_coredumper is run; it would source and thereby execute arbitrary bash code found in the /etc/asterisk/ast_debug_tools.conf. This issue has been patched in versions 20.7-cert9, 20.18.2, 21.12.1, 22.8.2, and 23.2.2. CVE-2026-23741
VCID-ytty-tbs1-ffc7 Asterisk is an open source private branch exchange and telephony toolkit. Prior to versions 20.7-cert9, 20.18.2, 21.12.1, 22.8.2, and 23.2.2, user supplied/control values for Cookies and any GET variable query Parameter are directly interpolated into the HTML of the page using ast_str_append. The endpoint at GET /httpstatus is the potential vulnerable endpoint relating to asterisk/main /http.c. This issue has been patched in versions 20.7-cert9, 20.18.2, 21.12.1, 22.8.2, and 23.2.2. CVE-2026-23738

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-16T12:03:00.614997+00:00 Debian Importer Fixing VCID-phb4-xaj7-byg2 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:08:05.839682+00:00 Debian Importer Fixing VCID-ytty-tbs1-ffc7 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:51:20.714701+00:00 Debian Importer Fixing VCID-8kjy-xtm2-bqan https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:26:07.896587+00:00 Debian Importer Fixing VCID-1qxc-4xk5-2feu https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-12T17:46:43.519083+00:00 Debian Importer Fixing VCID-phb4-xaj7-byg2 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:43.477795+00:00 Debian Importer Fixing VCID-1qxc-4xk5-2feu https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:43.437899+00:00 Debian Importer Fixing VCID-8kjy-xtm2-bqan https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:43.397498+00:00 Debian Importer Fixing VCID-ytty-tbs1-ffc7 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-02T17:16:51.919097+00:00 Debian Importer Fixing VCID-phb4-xaj7-byg2 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:11:54.386560+00:00 Debian Importer Fixing VCID-8kjy-xtm2-bqan https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:10:30.942682+00:00 Debian Importer Fixing VCID-ytty-tbs1-ffc7 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:09:20.086543+00:00 Debian Importer Fixing VCID-1qxc-4xk5-2feu https://security-tracker.debian.org/tracker/data/json 38.1.0