Skip to content

Commit 9949c6d

Browse files
committed
Security-Vulnerabilities: Update with additional info
1 parent ed93a79 commit 9949c6d

1 file changed

Lines changed: 29 additions & 25 deletions

File tree

Lines changed: 29 additions & 25 deletions
Original file line numberDiff line numberDiff line change
@@ -1,45 +1,49 @@
1-
---
2-
title: Asterisk Security Vulnerabilities
3-
pageid: 27199866
4-
---
1+
2+
# Asterisk Security Vulnerabilities
53

64
The Asterisk project takes the issue of its users security seriously. If you believe you have found a security vulnerability in the Asterisk software itself, please follow the steps on this wiki page to report the security vulnerability to the Asterisk Development Team.
75

8-
!!! note
9-
The Asterisk project does not produce or work on the underlying tools the project uses, such as Github. For security vulnerabilities found in these the report should be directed to the company or project that creates it. We *will* however accept reports related to the configuration of those tools.
6+
/// note
7+
The Asterisk project does not produce or work on the underlying tools the project uses, such as Github. For security vulnerabilities found in these the report should be directed to the company or project that creates it. We *will* however accept reports related to the configuration of those tools.
8+
///
109

11-
[//]: # (end-note)
10+
## What Can Be Reported?
1211

13-
!!! warning
12+
1. Issues relating to the Asterisk source code or usage.
13+
2. Issues in the configuration of a tool the Asterisk project uses.
1414

15-
The Issue Tracker is Public!
16-
The [Asterisk Issue Tracker](https://github.com/asterisk/asterisk/issues) is a public site, and all bug reports against Asterisk can be viewed openly by the public. While this results in a transparent, open process - which is good - reporting a security vulnerability on the issue tracker without properly selecting "[Report a vulnerability](https://github.com/asterisk/asterisk/security/advisories/new)" on the [New Issue page](https://github.com/asterisk/asterisk/issues/new/choose) makes the entire Asterisk user community vulnerable.
15+
## Reporting a Security Vulnerability
1716

18-
Reporting a vulnerability will automatically restrict who can view the information.
17+
All security vulnerabilities must be reported via the Asterisk GitHub project repository using the
18+
"[Report a vulnerability](https://github.com/asterisk/asterisk/security/advisories/new)" button under the repository's "[Security](https://github.com/asterisk/asterisk/security)" tab.
19+
This method restricts the report to the reporter and Asterisk staff.
1920

20-
[//]: # (end-warning)
21+
/// warning | Do NOT use the public Issue Tracker!
22+
The [Asterisk Issue Tracker](https://github.com/asterisk/asterisk/issues) is a public site, and all bug reports against Asterisk can be viewed openly by the public. While this results in a transparent, open process - which is good - reporting a security vulnerability on the issue tracker without properly selecting "[Report a vulnerability](https://github.com/asterisk/asterisk/security/advisories/new)" makes the report immediately public and makes the entire Asterisk user community vulnerable.
23+
///
2124

22-
What Can Be Reported?
23-
=====================
25+
#### Do NOT use the "Start a temporary private fork" security advisory feature!
2426

25-
1. Issues relating to the Asterisk source code or usage.
26-
2. Issues in the configuration of a tool the Asterisk project uses.
27-
28-
Reporting a Security Vulnerability
29-
==================================
27+
Private forks created from security advisories are severly limited by GitHub
28+
and cannot run the workflows necessary for validation and testing. Once a security
29+
advisory is accepted, reporters will be given instructions on how to submit or test
30+
a fix pull request.
3031

31-
All security vulnerabilities should be reported on the GitHub project. **You must use the "[Report a vulnerability](https://github.com/asterisk/asterisk/security/advisories/new)" option on the [New Issue page](https://github.com/asterisk/asterisk/issues/new/choose) or the information will be publicly disclosed.**
32+
## Release scheduling
3233

3334
Security vulnerabilities are treated seriously by the developer community, and the Asterisk Development Team always attempts to address vulnerabilities in a timely fashion. Sometimes, external influences may impact when a security release can be made; feel free to comment on the security vulnerability to discuss the schedule for a security release for your issue.
3435

35-
Past Security Vulnerabilities
36-
=============================
36+
## Past Security Vulnerabilities
37+
38+
Past security vulnerability reports are available in several places...
3739

38-
Past security vulnerability reports are available on the [asterisk.org web site](http://www.asterisk.org/downloads/security-advisories) and on the [Asterisk downloads](http://downloads.asterisk.org/pub/security/) site.
40+
* On the [asterisk.org web site](http://www.asterisk.org/downloads/security-advisories)
41+
* On the projects GitHub repository unser the "[Security](https://github.com/asterisk/asterisk/security)" tab.
42+
(reports for 2023 and later).
43+
* On the [Asterisk downloads](http://downloads.asterisk.org/pub/security/) site. (reports for 2022 and earlier)
3944

4045
All security vulnerabilities are also issued a CVE number and can be queried in the [CVE](http://cve.mitre.org/) database.
4146

42-
Rewards
43-
=======
47+
## Rewards
4448

4549
The Asterisk project does not provide rewards for the submission of security vulnerabilities. Recognition is provided for Asterisk code security vulnerabilities by being named as part of the release notes and security advisory. For security vulnerabilities in infrastructure or non-Asterisk code recognition is not guaranteed and is determined on a case by case basis.

0 commit comments

Comments
 (0)