------------------------------------------------------------------------- Debian LTS Advisory DLA-4326-1 debian-lts@lists.debian.org https://www.debian.org/lts/security/ Markus Koschany October 10, 2025 https://wiki.debian.org/LTS ------------------------------------------------------------------------- Package : asterisk Version : 1:16.28.0~dfsg-0+deb11u8 CVE ID : CVE-2025-1131 CVE-2025-54995 Two security vulnerabilities have been discovered in Asterisk, an Open Source Private Branch Exchange. CVE-2025-1131 A local privilege escalation vulnerability exists in the safe_asterisk script included with the Asterisk toolkit package. When Asterisk is started via this script, it sources all .sh files located in /etc/asterisk/startup.d/ as root, without validating ownership or permissions. Non-root users with legitimate write access to /etc/asterisk can exploit this behaviour by placing malicious scripts in the startup.d directory, which will then execute with root privileges upon service restart. Default Debian installations are not affected by this problem. CVE-2025-54995 Prior to this version, RTP UDP ports and internal resources can leak due to a lack of session termination. This could result in resource exhaustion. For Debian 11 bullseye, these problems have been fixed in version 1:16.28.0~dfsg-0+deb11u8. We recommend that you upgrade your asterisk packages. For the detailed security status of asterisk please refer to its security tracker page at: https://security-tracker.debian.org/tracker/asterisk Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS
Attachment:
signature.asc
Description: This is a digitally signed message part