]> git.ipfire.org Git - thirdparty/asterisk.git/commitdiff
Update for 13.38.3 13.38 13.38.3
authorAsterisk Development Team <asteriskteam@digium.com>
Thu, 22 Jul 2021 22:04:36 +0000 (17:04 -0500)
committerAsterisk Development Team <asteriskteam@digium.com>
Thu, 22 Jul 2021 22:04:36 +0000 (17:04 -0500)
.version
ChangeLog
asterisk-13.38.3-summary.html [moved from asterisk-13.38.2-summary.html with 50% similarity]
asterisk-13.38.3-summary.txt [moved from asterisk-13.38.2-summary.txt with 55% similarity]

index 1abeb686a1d3270224b88e0638ab6a973a10d5ad..80ac558f240a01ee9ad98aabf16e6796271714f7 100644 (file)
--- a/.version
+++ b/.version
@@ -1 +1 @@
-13.38.2
\ No newline at end of file
+13.38.3
\ No newline at end of file
index 3cf238329f8f2d8d596f4e85828199f8045ac1d0..d2b554b09fcd853d84b6da866a26d4d456597a42 100644 (file)
--- a/ChangeLog
+++ b/ChangeLog
@@ -1,3 +1,35 @@
+2021-07-22 22:04 +0000  Asterisk Development Team <asteriskteam@digium.com>
+
+       * asterisk 13.38.3 Released.
+
+2021-06-14 13:28 +0000 [d7499f2eba]  Kevin Harwell <kharwell@sangoma.com>
+
+       * AST-2021-009 - pjproject-bundled: Avoid crash during handshake for TLS
+
+         If an SSL socket parent/listener was destroyed during the handshake,
+         depending on timing, it was possible for the handling callback to
+         attempt access of it after the fact thus causing a crash.
+
+         ASTERISK-29415 #close
+
+         Change-Id: I105dacdcd130ea7fdd4cf2010ccf35b5eaf1432d
+
+2021-05-10 17:59 +0000 [7eb2032386]  Kevin Harwell <kharwell@sangoma.com>
+
+       * AST-2021-008 - chan_iax2: remote crash on unsupported media format
+
+         If chan_iax2 received a packet with an unsupported media format, for
+         example vp9, then it would set the frame's format to NULL. This could
+         then result in a crash later when an attempt was made to access the
+         format.
+
+         This patch makes it so chan_iax2 now ignores/drops frames received
+         with unsupported media format types.
+
+         ASTERISK-29392 #close
+
+         Change-Id: Ifa869a90dafe33eed8fd9463574fe6f1c0ad3eb1
+
 2021-02-18 16:46 +0000  Asterisk Development Team <asteriskteam@digium.com>
 
        * asterisk 13.38.2 Released.
similarity index 50%
rename from asterisk-13.38.2-summary.html
rename to asterisk-13.38.3-summary.html
index 5114adeebe954e8621f805dd9080fede15c47de3..3846302c406689700d734956d5241debd6d40f79 100644 (file)
@@ -1,24 +1,18 @@
-<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xmlns="http://www.w3.org/1999/xhtml"><title>Release Summary - asterisk-13.38.2</title><h1 align="center"><a name="top">Release Summary</a></h1><h3 align="center">asterisk-13.38.2</h3><h3 align="center">Date: 2021-02-18</h3><h3 align="center">&lt;asteriskteam@digium.com&gt;</h3><hr><h2 align="center">Table of Contents</h2><ol>
+<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xmlns="http://www.w3.org/1999/xhtml"><title>Release Summary - asterisk-13.38.3</title><h1 align="center"><a name="top">Release Summary</a></h1><h3 align="center">asterisk-13.38.3</h3><h3 align="center">Date: 2021-07-22</h3><h3 align="center">&lt;asteriskteam@digium.com&gt;</h3><hr><h2 align="center">Table of Contents</h2><ol>
 <li><a href="#summary">Summary</a></li>
 <li><a href="#contributors">Contributors</a></li>
 <li><a href="#closed_issues">Closed Issues</a></li>
 <li><a href="#diffstat">Diffstat</a></li>
 </ol><hr><a name="summary"><h2 align="center">Summary</h2></a><center><a href="#top">[Back to Top]</a></center><p>This release has been made to address one or more security vulnerabilities that have been identified. A security advisory document has been published for each vulnerability that includes additional information. Users of versions of Asterisk that are affected are strongly encouraged to review the advisories and determine what action they should take to protect their systems from these issues.</p><p>Security Advisories:</p><ul>
-<li><a href="http://downloads.asterisk.org/pub/security/AST-2021-001,AST-2021-003,AST-2021-005.html">AST-2021-001,AST-2021-003,AST-2021-005</a></li>
-</ul><p>The data in this summary reflects changes that have been made since the previous release, asterisk-13.38.1.</p><hr><a name="contributors"><h2 align="center">Contributors</h2></a><center><a href="#top">[Back to Top]</a></center><p>This table lists the people who have submitted code, those that have tested patches, as well as those that reported issues on the issue tracker that were resolved in this release. For coders, the number is how many of their patches (of any size) were committed into this release. For testers, the number is the number of times their name was listed as assisting with testing a patch. Finally, for reporters, the number is the number of issues that they reported that were affected by commits that went into this release.</p><table width="100%" border="0">
+<li><a href="http://downloads.asterisk.org/pub/security/AST-2021-008,AST-2021-009.html">AST-2021-008,AST-2021-009</a></li>
+</ul><p>The data in this summary reflects changes that have been made since the previous release, asterisk-13.38.2.</p><hr><a name="contributors"><h2 align="center">Contributors</h2></a><center><a href="#top">[Back to Top]</a></center><p>This table lists the people who have submitted code, those that have tested patches, as well as those that reported issues on the issue tracker that were resolved in this release. For coders, the number is how many of their patches (of any size) were committed into this release. For testers, the number is the number of times their name was listed as assisting with testing a patch. Finally, for reporters, the number is the number of issues that they reported that were affected by commits that went into this release.</p><table width="100%" border="0">
 <tr><th width="33%">Coders</th><th width="33%">Testers</th><th width="33%">Reporters</th></tr>
-<tr valign="top"><td width="33%">1 Ivan Poddubnyi <ivan.poddubny@gmail.com><br/>1 Joshua C. Colp <jcolp@sangoma.com><br/>1 Alexander Traud <pabstraud@compuserve.com><br/></td><td width="33%"><td width="33%">1 Ivan Poddubny<br/>1 Ivan Poddubny <ivan.poddubny@gmail.com><br/>1 Alexander Traud<br/>1 Mauri de Souza Meneguzzo (3CPlus) <mauri.nunes@fluxoti.com><br/>1 Alexander Traud <pabstraud@compuserve.com><br/></td></tr>
-</table><hr><a name="closed_issues"><h2 align="center">Closed Issues</h2></a><center><a href="#top">[Back to Top]</a></center><p>This is a list of all issues from the issue tracker that were closed by changes that went into this release.</p><h3>Security</h3><h4>Category: Resources/res_srtp</h4><a href="https://issues.asterisk.org/jira/browse/ASTERISK-29260">ASTERISK-29260</a>: sRTP Replay Protection ignored; even tears down long calls<br/>Reported by: Alexander Traud<ul>
-<li><a href="https://code.asterisk.org/code/changelog/asterisk?cs=b77dcbd905553ea903553d42b89866d5d1b149e6">[b77dcbd905]</a> Alexander Traud -- rtp:  Enable srtp replay protection</li>
-</ul><br><h4>Category: pjproject/pjsip</h4><a href="https://issues.asterisk.org/jira/browse/ASTERISK-29227">ASTERISK-29227</a>: res_pjsip_diversion: sending multiple 181 responses causes memory corruption and crash<br/>Reported by: Ivan Poddubny<ul>
-<li><a href="https://code.asterisk.org/code/changelog/asterisk?cs=a86d326b5ee4e87bd86f1d83801fbf51a73a158a">[a86d326b5e]</a> Ivan Poddubnyi -- res_pjsip_diversion: Fix adding more than one histinfo to Supported</li>
-</ul><br><h3>Bug</h3><h4>Category: Resources/res_pjsip</h4><a href="https://issues.asterisk.org/jira/browse/ASTERISK-29196">ASTERISK-29196</a>: res_pjsip: Segmentation fault<br/>Reported by: Mauri de Souza Meneguzzo (3CPlus)<ul>
-<li><a href="https://code.asterisk.org/code/changelog/asterisk?cs=5016b84076171bc690092e16dd740b3f44d5c4d9">[5016b84076]</a> Joshua C. Colp -- pjsip: Make modify_local_offer2 tolerate previous failed SDP.</li>
-</ul><br><hr><a name="diffstat"><h2 align="center">Diffstat Results</h2></a><center><a href="#top">[Back to Top]</a></center><p>This is a summary of the changes to the source code that went into this release that was generated using the diffstat utility.</p><pre>configs/samples/rtp.conf.sample                |   12 ++++++++++++
-doc/CHANGES-staging/srtp_replay_protection.txt |    9 +++++++++
-doc/UPGRADE-staging/srtp_replay_protection.txt |    9 +++++++++
-res/res_pjsip_diversion.c                      |   14 ++++++++++++++
-res/res_pjsip_outbound_registration.c          |   12 ++++++++++++
-res/res_pjsip_path.c                           |   12 ++++++++++++
-res/res_rtp_asterisk.c                         |   12 +++++++++++-
-7 files changed, 79 insertions(+), 1 deletion(-)</pre><br></html>
\ No newline at end of file
+<tr valign="top"><td width="33%">2 Kevin Harwell <kharwell@sangoma.com><br/></td><td width="33%"><td width="33%">1 Michael Welk <dl5ocd@darc.de><br/>1 Andrew Yager <andrew@rwts.com.au><br/></td></tr>
+</table><hr><a name="closed_issues"><h2 align="center">Closed Issues</h2></a><center><a href="#top">[Back to Top]</a></center><p>This is a list of all issues from the issue tracker that were closed by changes that went into this release.</p><h3>Security</h3><h4>Category: Channels/chan_pjsip</h4><a href="https://issues.asterisk.org/jira/browse/ASTERISK-29415">ASTERISK-29415</a>: Crash in PJSIP TLS transport <br/>Reported by: Andrew Yager<ul>
+<li><a href="https://code.asterisk.org/code/changelog/asterisk?cs=d7499f2eba44f4941fb550de150ae4870818cc65">[d7499f2eba]</a> Kevin Harwell -- AST-2021-009 - pjproject-bundled: Avoid crash during handshake for TLS</li>
+</ul><br><h3>Bug</h3><h4>Category: Channels/chan_iax2</h4><a href="https://issues.asterisk.org/jira/browse/ASTERISK-29392">ASTERISK-29392</a>: chan_iax2: Asterisk crashes when queueing video with format<br/>Reported by: Michael Welk<ul>
+<li><a href="https://code.asterisk.org/code/changelog/asterisk?cs=7eb20323866098804e98aedfc8a8078971ddd38f">[7eb2032386]</a> Kevin Harwell -- AST-2021-008 - chan_iax2: remote crash on unsupported media format</li>
+</ul><br><hr><a name="diffstat"><h2 align="center">Diffstat Results</h2></a><center><a href="#top">[Back to Top]</a></center><p>This is a summary of the changes to the source code that went into this release that was generated using the diffstat utility.</p><pre>channels/chan_iax2.c                                                   |   40 +-
+third-party/pjproject/patches/0110-tls-parent-listener-destroyed.patch |  166 ++++++++++
+third-party/pjproject/patches/0111-ssl-premature-destroy.patch         |   36 ++
+3 files changed, 233 insertions(+), 9 deletions(-)</pre><br></html>
\ No newline at end of file
similarity index 55%
rename from asterisk-13.38.2-summary.txt
rename to asterisk-13.38.3-summary.txt
index 6b51f3e7aee290bcc439b8ee26c62cbd255e7868..aa0a23cc0bcad10c61f328b033d6e4b79ae7c438 100644 (file)
@@ -1,8 +1,8 @@
                                 Release Summary
 
-                                asterisk-13.38.2
+                                asterisk-13.38.3
 
-                                Date: 2021-02-18
+                                Date: 2021-07-22
 
                            <asteriskteam@digium.com>
 
 
    Security Advisories:
 
-     * AST-2021-001,AST-2021-003,AST-2021-005
+     * AST-2021-008,AST-2021-009
 
    The data in this summary reflects changes that have been made since the
-   previous release, asterisk-13.38.1.
+   previous release, asterisk-13.38.2.
 
      ----------------------------------------------------------------------
 
    issues that they reported that were affected by commits that went into
    this release.
 
-   Coders                   Testers       Reporters                           
-   1 Ivan Poddubnyi                       1 Ivan Poddubny                     
-   1 Joshua C. Colp                       1 Ivan Poddubny                     
-   1 Alexander Traud                      1 Alexander Traud                   
-                                          1 Mauri de Souza Meneguzzo (3CPlus) 
-                                          1 Alexander Traud                   
+   Coders                   Testers                  Reporters                
+   2 Kevin Harwell                                   1 Michael Welk           
+                                                     1 Andrew Yager           
 
      ----------------------------------------------------------------------
 
 
   Security
 
-    Category: Resources/res_srtp
+    Category: Channels/chan_pjsip
 
-   ASTERISK-29260: sRTP Replay Protection ignored; even tears down long calls
-   Reported by: Alexander Traud
-     * [b77dcbd905] Alexander Traud -- rtp: Enable srtp replay protection
-
-    Category: pjproject/pjsip
-
-   ASTERISK-29227: res_pjsip_diversion: sending multiple 181 responses causes
-   memory corruption and crash
-   Reported by: Ivan Poddubny
-     * [a86d326b5e] Ivan Poddubnyi -- res_pjsip_diversion: Fix adding more
-       than one histinfo to Supported
+   ASTERISK-29415: Crash in PJSIP TLS transport
+   Reported by: Andrew Yager
+     * [d7499f2eba] Kevin Harwell -- AST-2021-009 - pjproject-bundled: Avoid
+       crash during handshake for TLS
 
   Bug
 
-    Category: Resources/res_pjsip
+    Category: Channels/chan_iax2
 
-   ASTERISK-29196: res_pjsip: Segmentation fault
-   Reported by: Mauri de Souza Meneguzzo (3CPlus)
-     * [5016b84076] Joshua C. Colp -- pjsip: Make modify_local_offer2
-       tolerate previous failed SDP.
+   ASTERISK-29392: chan_iax2: Asterisk crashes when queueing video with
+   format
+   Reported by: Michael Welk
+     * [7eb2032386] Kevin Harwell -- AST-2021-008 - chan_iax2: remote crash
+       on unsupported media format
 
      ----------------------------------------------------------------------
 
    This is a summary of the changes to the source code that went into this
    release that was generated using the diffstat utility.
 
- configs/samples/rtp.conf.sample                |   12 ++++++++++++
- doc/CHANGES-staging/srtp_replay_protection.txt |    9 +++++++++
- doc/UPGRADE-staging/srtp_replay_protection.txt |    9 +++++++++
- res/res_pjsip_diversion.c                      |   14 ++++++++++++++
- res/res_pjsip_outbound_registration.c          |   12 ++++++++++++
- res/res_pjsip_path.c                           |   12 ++++++++++++
- res/res_rtp_asterisk.c                         |   12 +++++++++++-
- 7 files changed, 79 insertions(+), 1 deletion(-)
+ channels/chan_iax2.c                                                   |   40 +-
+ third-party/pjproject/patches/0110-tls-parent-listener-destroyed.patch |  166 ++++++++++
+ third-party/pjproject/patches/0111-ssl-premature-destroy.patch         |   36 ++
+ 3 files changed, 233 insertions(+), 9 deletions(-)