ELA-1217-1 asterisk security update

privilege escalation and crash

2024-10-27
Packageasterisk
Version1:16.28.0~dfsg-0+deb10u5 (buster)
Related CVEs CVE-2024-42365 CVE-2024-42491


Two issues have been found in asterisk, an Open Source Private Branch Exchange.

CVE-2024-42365

Due to a privilege escalation, remote code execution and/or
blind server-side request forgery with arbitrary protocol are
possible.

CVE-2024-42491

Due to bad handling of malformed Contact or Record-Route URI in an
incoming  SIP request, Asterisk might crash when res_resolver_unbound
is used.

Thanks to Niels Galjaard, a minor privilege escalation has been fixed. More information about ths can be found at: https://alioth-lists.debian.net/pipermail/pkg-voip-maintainers/2024-July/038664.html

Please be aware that this fix explicitly sets the gid of the asterisk process to “asterisk”. In case you added the user asterisk to other groups, please update your systemd service file accordingly.



For Debian 10 buster, these problems have been fixed in version 1:16.28.0~dfsg-0+deb10u5.

We recommend that you upgrade your asterisk packages.

Further information about Extended LTS security advisories can be found in the dedicated section of our website.