From: Asterisk Development Team Date: Thu, 11 Jul 2019 19:22:48 +0000 (-0500) Subject: Update for 15.7.3 X-Git-Tag: 15.7.3^0 X-Git-Url: http://git.ipfire.org/?a=commitdiff_plain;h=c2d9780d3d91fb44804df0db829712cff0340e44;p=thirdparty%2Fasterisk.git Update for 15.7.3 --- diff --git a/.version b/.version index 0b363a8997..65b190b6ca 100644 --- a/.version +++ b/.version @@ -1 +1 @@ -15.7.2 \ No newline at end of file +15.7.3 \ No newline at end of file diff --git a/ChangeLog b/ChangeLog index 221c81df52..a195d717e9 100644 --- a/ChangeLog +++ b/ChangeLog @@ -1,3 +1,37 @@ +2019-07-11 19:22 +0000 Asterisk Development Team + + * asterisk 15.7.3 Released. + +2019-06-12 13:03 +0000 [08cf3516c4] George Joseph + + * res_pjsip_messaging: Check for body in in-dialog message + + We now check that a body exists and it has a length > 0 before + attempting to process it. + + ASTERISK-28447 + Reported-by: Gil Richard + + Change-Id: Ic469544b22ab848734636588d4c93426cc6f4b1f + +2019-06-28 11:15 +0000 [74835b30c8] Francesco Castellano + + * chan_sip: Handle invalid SDP answer to T.38 re-invite + + The chan_sip module performs a T.38 re-invite using a single media + stream of udptl, and expects the SDP answer to be the same. + + If an SDP answer is received instead that contains an additional + media stream with no joint codec a crash will occur as the code + assumes that at least one joint codec will exist in this + scenario. + + This change removes this assumption. + + ASTERISK-28465 + + Change-Id: I8b02845b53344c6babe867a3f0a5231045c7ac87 + 2019-02-28 18:40 +0000 Asterisk Development Team * asterisk 15.7.2 Released. diff --git a/asterisk-15.7.2-summary.html b/asterisk-15.7.2-summary.html deleted file mode 100644 index 0a6e0d8229..0000000000 --- a/asterisk-15.7.2-summary.html +++ /dev/null @@ -1,37 +0,0 @@ -Release Summary - asterisk-15.7.2

Release Summary

asterisk-15.7.2

Date: 2019-02-28

<asteriskteam@digium.com>


Table of Contents

    -
  1. Summary
  2. -
  3. Contributors
  4. -
  5. Closed Issues
  6. -
  7. Other Changes
  8. -
  9. Diffstat
  10. -

Summary

[Back to Top]

This release has been made to address one or more security vulnerabilities that have been identified. A security advisory document has been published for each vulnerability that includes additional information. Users of versions of Asterisk that are affected are strongly encouraged to review the advisories and determine what action they should take to protect their systems from these issues.

Security Advisories:

The data in this summary reflects changes that have been made since the previous release, asterisk-15.7.1.


Contributors

[Back to Top]

This table lists the people who have submitted code, those that have tested patches, as well as those that reported issues on the issue tracker that were resolved in this release. For coders, the number is how many of their patches (of any size) were committed into this release. For testers, the number is the number of times their name was listed as assisting with testing a patch. Finally, for reporters, the number is the number of issues that they reported that were affected by commits that went into this release.

- - -
CodersTestersReporters
2 George Joseph
1 Sotiris Ganouris
1 Sotiris Ganouris

Closed Issues

[Back to Top]

This is a list of all issues from the issue tracker that were closed by changes that went into this release.

Security

Category: Channels/chan_pjsip

ASTERISK-28260: Asterisk segfault when rtp negotiation is wrong or fails
Reported by: Sotiris Ganouris
    -
  • [e436aab179] George Joseph -- res_pjsip_sdp_rtp: Fix return code from apply_negotiated_sdp_stream
  • -


Commits Not Associated with an Issue

[Back to Top]

This is a list of all changes that went into this release that did not reference a JIRA issue.

- - -
RevisionAuthorSummary
735c0a3942George JosephCI: Update jenkinsfiles with new Gerrit URLs

Diffstat Results

[Back to Top]

This is a summary of the changes to the source code that went into this release that was generated using the diffstat utility.

asterisk-15.7.1-summary.html                           |   27
-asterisk-15.7.1-summary.txt                            |   97 --
-b/.version                                             |    2
-b/ChangeLog                                            |   22
-b/asterisk-15.7.0-rc1-summary.html                     |  269 +++++++
-b/asterisk-15.7.0-rc1-summary.txt                      |  598 +++++++++++++++++
-b/contrib/realtime/mssql/mssql_cdr.sql                 |    3
-b/contrib/realtime/mssql/mssql_config.sql              |    3
-b/contrib/realtime/mssql/mssql_voicemail.sql           |    3
-b/contrib/realtime/mysql/mysql_cdr.sql                 |    3
-b/contrib/realtime/mysql/mysql_config.sql              |    3
-b/contrib/realtime/mysql/mysql_voicemail.sql           |    3
-b/contrib/realtime/oracle/oracle_cdr.sql               |    3
-b/contrib/realtime/oracle/oracle_config.sql            |    3
-b/contrib/realtime/oracle/oracle_voicemail.sql         |    3
-b/contrib/realtime/postgresql/postgresql_cdr.sql       |    3
-b/contrib/realtime/postgresql/postgresql_config.sql    |    3
-b/contrib/realtime/postgresql/postgresql_voicemail.sql |    3
-b/res/res_pjsip_sdp_rtp.c                              |    2
-b/tests/CI/gates.jenkinsfile                           |    3
-20 files changed, 882 insertions(+), 174 deletions(-)

\ No newline at end of file diff --git a/asterisk-15.7.2-summary.txt b/asterisk-15.7.2-summary.txt deleted file mode 100644 index f7dbcc8f4e..0000000000 --- a/asterisk-15.7.2-summary.txt +++ /dev/null @@ -1,121 +0,0 @@ - Release Summary - - asterisk-15.7.2 - - Date: 2019-02-28 - - - - ---------------------------------------------------------------------- - - Table of Contents - - 1. Summary - 2. Contributors - 3. Closed Issues - 4. Other Changes - 5. Diffstat - - ---------------------------------------------------------------------- - - Summary - - [Back to Top] - - This release has been made to address one or more security vulnerabilities - that have been identified. A security advisory document has been published - for each vulnerability that includes additional information. Users of - versions of Asterisk that are affected are strongly encouraged to review - the advisories and determine what action they should take to protect their - systems from these issues. - - Security Advisories: - - * AST-2019-001 - - The data in this summary reflects changes that have been made since the - previous release, asterisk-15.7.1. - - ---------------------------------------------------------------------- - - Contributors - - [Back to Top] - - This table lists the people who have submitted code, those that have - tested patches, as well as those that reported issues on the issue tracker - that were resolved in this release. For coders, the number is how many of - their patches (of any size) were committed into this release. For testers, - the number is the number of times their name was listed as assisting with - testing a patch. Finally, for reporters, the number is the number of - issues that they reported that were affected by commits that went into - this release. - - Coders Testers Reporters - 2 George Joseph 1 Sotiris Ganouris - 1 Sotiris Ganouris - - ---------------------------------------------------------------------- - - Closed Issues - - [Back to Top] - - This is a list of all issues from the issue tracker that were closed by - changes that went into this release. - - Security - - Category: Channels/chan_pjsip - - ASTERISK-28260: Asterisk segfault when rtp negotiation is wrong or fails - Reported by: Sotiris Ganouris - * [e436aab179] George Joseph -- res_pjsip_sdp_rtp: Fix return code from - apply_negotiated_sdp_stream - - ---------------------------------------------------------------------- - - Commits Not Associated with an Issue - - [Back to Top] - - This is a list of all changes that went into this release that did not - reference a JIRA issue. - - +------------------------------------------------------------------------+ - | Revision | Author | Summary | - |------------+---------------+-------------------------------------------| - | 735c0a3942 | George Joseph | CI: Update jenkinsfiles with new Gerrit | - | | | URLs | - +------------------------------------------------------------------------+ - - ---------------------------------------------------------------------- - - Diffstat Results - - [Back to Top] - - This is a summary of the changes to the source code that went into this - release that was generated using the diffstat utility. - - asterisk-15.7.1-summary.html | 27 - asterisk-15.7.1-summary.txt | 97 -- - b/.version | 2 - b/ChangeLog | 22 - b/asterisk-15.7.0-rc1-summary.html | 269 +++++++ - b/asterisk-15.7.0-rc1-summary.txt | 598 +++++++++++++++++ - b/contrib/realtime/mssql/mssql_cdr.sql | 3 - b/contrib/realtime/mssql/mssql_config.sql | 3 - b/contrib/realtime/mssql/mssql_voicemail.sql | 3 - b/contrib/realtime/mysql/mysql_cdr.sql | 3 - b/contrib/realtime/mysql/mysql_config.sql | 3 - b/contrib/realtime/mysql/mysql_voicemail.sql | 3 - b/contrib/realtime/oracle/oracle_cdr.sql | 3 - b/contrib/realtime/oracle/oracle_config.sql | 3 - b/contrib/realtime/oracle/oracle_voicemail.sql | 3 - b/contrib/realtime/postgresql/postgresql_cdr.sql | 3 - b/contrib/realtime/postgresql/postgresql_config.sql | 3 - b/contrib/realtime/postgresql/postgresql_voicemail.sql | 3 - b/res/res_pjsip_sdp_rtp.c | 2 - b/tests/CI/gates.jenkinsfile | 3 - 20 files changed, 882 insertions(+), 174 deletions(-) diff --git a/asterisk-15.7.3-summary.html b/asterisk-15.7.3-summary.html new file mode 100644 index 0000000000..8203564b33 --- /dev/null +++ b/asterisk-15.7.3-summary.html @@ -0,0 +1,15 @@ +Release Summary - asterisk-15.7.3

Release Summary

asterisk-15.7.3

Date: 2019-07-11

<asteriskteam@digium.com>


Table of Contents

    +
  1. Summary
  2. +
  3. Contributors
  4. +
  5. Closed Issues
  6. +
  7. Diffstat
  8. +

Summary

[Back to Top]

This release has been made to address one or more security vulnerabilities that have been identified. A security advisory document has been published for each vulnerability that includes additional information. Users of versions of Asterisk that are affected are strongly encouraged to review the advisories and determine what action they should take to protect their systems from these issues.

Security Advisories:

The data in this summary reflects changes that have been made since the previous release, asterisk-15.7.2.


Contributors

[Back to Top]

This table lists the people who have submitted code, those that have tested patches, as well as those that reported issues on the issue tracker that were resolved in this release. For coders, the number is how many of their patches (of any size) were committed into this release. For testers, the number is the number of times their name was listed as assisting with testing a patch. Finally, for reporters, the number is the number of issues that they reported that were affected by commits that went into this release.

+ + +
CodersTestersReporters
1 Francesco Castellano
1 George Joseph
1 Gil Richard
1 Gil Richard
1 Francesco Castellano

Closed Issues

[Back to Top]

This is a list of all issues from the issue tracker that were closed by changes that went into this release.

Security

Category: Channels/chan_sip/Interoperability

ASTERISK-28465: Broken SDP can cause a segfault in a T.38 reINVITE
Reported by: Francesco Castellano
    +
  • [74835b30c8] Francesco Castellano -- chan_sip: Handle invalid SDP answer to T.38 re-invite
  • +

Category: Resources/res_pjsip_messaging

ASTERISK-28447: res_pjsip_messaging: In-dialog MESSAGE with no body causes crash
Reported by: Gil Richard
    +
  • [08cf3516c4] George Joseph -- res_pjsip_messaging: Check for body in in-dialog message
  • +


Diffstat Results

[Back to Top]

This is a summary of the changes to the source code that went into this release that was generated using the diffstat utility.

0 files changed

\ No newline at end of file diff --git a/asterisk-15.7.3-summary.txt b/asterisk-15.7.3-summary.txt new file mode 100644 index 0000000000..5f0e19b940 --- /dev/null +++ b/asterisk-15.7.3-summary.txt @@ -0,0 +1,93 @@ + Release Summary + + asterisk-15.7.3 + + Date: 2019-07-11 + + + + ---------------------------------------------------------------------- + + Table of Contents + + 1. Summary + 2. Contributors + 3. Closed Issues + 4. Diffstat + + ---------------------------------------------------------------------- + + Summary + + [Back to Top] + + This release has been made to address one or more security vulnerabilities + that have been identified. A security advisory document has been published + for each vulnerability that includes additional information. Users of + versions of Asterisk that are affected are strongly encouraged to review + the advisories and determine what action they should take to protect their + systems from these issues. + + Security Advisories: + + * AST-2019-002,AST-2019-003 + + The data in this summary reflects changes that have been made since the + previous release, asterisk-15.7.2. + + ---------------------------------------------------------------------- + + Contributors + + [Back to Top] + + This table lists the people who have submitted code, those that have + tested patches, as well as those that reported issues on the issue tracker + that were resolved in this release. For coders, the number is how many of + their patches (of any size) were committed into this release. For testers, + the number is the number of times their name was listed as assisting with + testing a patch. Finally, for reporters, the number is the number of + issues that they reported that were affected by commits that went into + this release. + + Coders Testers Reporters + 1 Francesco Castellano 1 Gil Richard + 1 George Joseph 1 Gil Richard + 1 Francesco Castellano + + ---------------------------------------------------------------------- + + Closed Issues + + [Back to Top] + + This is a list of all issues from the issue tracker that were closed by + changes that went into this release. + + Security + + Category: Channels/chan_sip/Interoperability + + ASTERISK-28465: Broken SDP can cause a segfault in a T.38 reINVITE + Reported by: Francesco Castellano + * [74835b30c8] Francesco Castellano -- chan_sip: Handle invalid SDP + answer to T.38 re-invite + + Category: Resources/res_pjsip_messaging + + ASTERISK-28447: res_pjsip_messaging: In-dialog MESSAGE with no body causes + crash + Reported by: Gil Richard + * [08cf3516c4] George Joseph -- res_pjsip_messaging: Check for body in + in-dialog message + + ---------------------------------------------------------------------- + + Diffstat Results + + [Back to Top] + + This is a summary of the changes to the source code that went into this + release that was generated using the diffstat utility. + + 0 files changed